7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.1 High
AI Score
Confidence
High
9 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
0.003 Low
EPSS
Percentile
68.0%
05/14/2019
High
Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, gain privileges, bypass security restrictions, obtain sensitive information.
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.5.2
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2
.NET Core 2.2
.NET Core 1.1
Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2
Microsoft .NET Framework 3.5
Microsoft .NET Framework 4.7.2
Microsoft .NET Framework 4.6
Microsoft .NET Framework 4.8
.NET Core 2.1
Microsoft .NET Framework 3.0 Service Pack 2
Microsoft .NET Framework 2.0 Service Pack 2
.NET Core 1.0
Nuget 5.0.2
Microsoft .NET Framework 4.7/4.7.1/4.7.2
Microsoft .NET Framework 4.7.1/4.7.2
Microsoft .NET Framework 4.6.2
ASP.NET Core 2.2
ASP.NET Core 2.1
Microsoft Azure Active Directory Connect
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1903 for x64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Microsoft Visual Studio 2017 version 15.0
Windows 10 Version 1703 for x64-based Systems
Windows 10 Version 1803 for 32-bit Systems
Windows Server, version 1903 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Microsoft Visual Studio 2015 Update 3
Windows Server 2019
Windows 10 Version 1903 for ARM64-based Systems
Windows 10 for x64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Microsoft Visual Studio 2019 version 16.0
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1703 for 32-bit Systems
Azure DevOps Server 2019
Team Foundation Server 2018 Update 3.2
Team Foundation Server 2017 Update 3.1
Team Foundation Server 2018 Update 1.2
Team Foundation Server 2015 Update 4.2
Windows Server 2016 (Server Core installation)
Windows 10 Version 1709 for x64-based Systems
PowerShell Core 6.1
Windows Server 2019 (Server Core installation)
PowerShell Core 6.2
Windows Server, version 1803 (Server Core Installation)
Microsoft Visual Studio 2017 version 15.9 (includes 15.1 - 15.8)
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2019-0864
CVE-2019-0979
CVE-2019-0727
CVE-2019-0820
CVE-2019-0976
CVE-2019-1000
CVE-2019-0982
CVE-2019-0980
CVE-2019-0733
CVE-2019-0872
CVE-2019-0971
CVE-2019-0981
OSI
CVE-2019-07277.2High
CVE-2019-07334.6Warning
CVE-2019-08205.0Warning
CVE-2019-09762.1Warning
CVE-2019-09815.0Warning
CVE-2019-09825.0Warning
CVE-2019-10003.5Warning
CVE-2019-09719.0Critical
CVE-2019-09793.5Warning
CVE-2019-09805.0Warning
CVE-2019-08642.1Warning
CVE-2019-08723.5Warning
4499179
4499181
4499167
4494440
4499154
4489639
4499405
4499408
4495616
4498964
4495620
4498963
4499407
4499409
4498961
4499406
4498962
4495610
4495613
4495611
support.microsoft.com/kb/4489639
support.microsoft.com/kb/4494440
support.microsoft.com/kb/4495610
support.microsoft.com/kb/4495611
support.microsoft.com/kb/4495613
support.microsoft.com/kb/4495616
support.microsoft.com/kb/4495620
support.microsoft.com/kb/4498961
support.microsoft.com/kb/4498962
support.microsoft.com/kb/4498963
support.microsoft.com/kb/4498964
support.microsoft.com/kb/4499154
support.microsoft.com/kb/4499167
support.microsoft.com/kb/4499179
support.microsoft.com/kb/4499181
support.microsoft.com/kb/4499405
support.microsoft.com/kb/4499406
support.microsoft.com/kb/4499407
support.microsoft.com/kb/4499408
support.microsoft.com/kb/4499409
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0727
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0733
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0820
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0864
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0872
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0971
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0976
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0979
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0980
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0981
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0982
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1000
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0727
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0733
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0820
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0864
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0872
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0971
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0976
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0979
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0980
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0981
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0982
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1000
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/product/Microsoft-.NET-Framework/
threats.kaspersky.com/en/product/Microsoft-Active-Directory/
threats.kaspersky.com/en/product/Microsoft-Azure/
threats.kaspersky.com/en/product/Microsoft-Visual-Studio/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Team-Foundation-Server/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.1 High
AI Score
Confidence
High
9 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
0.003 Low
EPSS
Percentile
68.0%