NCSC-2026-0143

Vulnerability from csaf_ncscnl - Published: 2026-05-12 17:53 - Updated: 2026-05-12 17:53
Summary
Kwetsbaarheden verholpen in Microsoft Developer Tools
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions: NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein. NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory. This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten: Microsoft heeft kwetsbaarheden verholpen in diverse Developer Tools.
Interpretaties: Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade: - Denial-of-Service (DoS) - Omzeilen van een beveiligingsmaatregel - Uitvoeren van willekeurige code (gebruikersrechten) - Toegang tot gevoelige gegevens De kwetsbaarheid met kenmerk CVE-2026-42826 is centraal verholpen door Microsoft en slechts toegevoegd ter informatie. Er zijn hiervoor geen verdere acties benodigd. ``` Azure DevOps: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2026-42826 | 10.00 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Visual Studio Code: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2026-41610 | 6.30 | Omzeilen van beveiligingsmaatregel | | CVE-2026-41611 | 7.80 | Uitvoeren van willekeurige code | | CVE-2026-41612 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2026-41613 | 8.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Microsoft Data Formulator: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2026-41094 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| ASP.NET Core: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2026-42899 | 7.50 | Denial-of-Service | |----------------|------|-------------------------------------| .NET: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2026-32177 | 7.30 | Denial-of-Service | | CVE-2026-35433 | 7.30 | Verkrijgen van verhoogde rechten | | CVE-2026-32175 | 4.30 | <Vertaal: Tampering> | |----------------|------|-------------------------------------| GitHub Copilot and Visual Studio: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2026-41109 | 8.80 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| ```
Oplossingen: Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op: https://portal.msrc.microsoft.com/en-us/security-guidance
Kans: medium
Schade: high
CWE-59: Improper Link Resolution Before File Access ('Link Following')
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CWE-94: Improper Control of Generation of Code ('Code Injection')
CWE-122: Heap-based Buffer Overflow
CWE-190: Integer Overflow or Wraparound
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE-384: Session Fixation
CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
CWE-20: Improper Input Validation
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-23: Relative Path Traversal
CWE-36: Absolute Path Traversal

A heap-based buffer overflow vulnerability in the .NET framework allows an unauthorized local attacker to elevate privileges by exploiting memory corruption.

CWE-122 - Heap-based Buffer Overflow
Affected products
Product Identifier Version Remediation
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / Azure
vers:unknown/*
vers:unknown/*
Microsoft / Azure DevOps
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Data Formulator
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
vers:unknown/*
vers:unknown/*
Microsoft / Visual Studio Code
vers:unknown/*

Improper input validation in the .NET framework allows unauthorized local users to escalate privileges, potentially compromising system security.

CWE-190 - Integer Overflow or Wraparound
Affected products
Product Identifier Version Remediation
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / Azure
vers:unknown/*
vers:unknown/*
Microsoft / Azure DevOps
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Data Formulator
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
vers:unknown/*
vers:unknown/*
Microsoft / Visual Studio Code
vers:unknown/*

A tampering vulnerability in .NET Core allows attackers to write arbitrary files and directories to certain system locations via specially crafted files, fixed by a security update ensuring proper file handling.

CWE-36 - Absolute Path Traversal
Affected products
Product Identifier Version Remediation
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / Azure
vers:unknown/*
vers:unknown/*
Microsoft / Azure DevOps
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Data Formulator
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
vers:unknown/*
vers:unknown/*
Microsoft / Visual Studio Code
vers:unknown/*

An infinite loop vulnerability in ASP.NET Core allows unauthorized attackers to cause denial of service over a network by exploiting a loop with an unreachable exit condition.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Affected products
Product Identifier Version Remediation
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / Azure
vers:unknown/*
vers:unknown/*
Microsoft / Azure DevOps
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Data Formulator
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
vers:unknown/*
vers:unknown/*
Microsoft / Visual Studio Code
vers:unknown/*

An improper control of code generation vulnerability in Microsoft Data Formulator allows unauthorized remote code execution by attackers.

CWE-94 - Improper Control of Generation of Code ('Code Injection')
Affected products
Product Identifier Version Remediation
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / Azure
vers:unknown/*
vers:unknown/*
Microsoft / Azure DevOps
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Data Formulator
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
vers:unknown/*
vers:unknown/*
Microsoft / Visual Studio Code
vers:unknown/*

Improper neutralization of special elements in output within GitHub Copilot and Visual Studio allows unauthorized attackers to bypass security features over a network.

Affected products
Product Identifier Version Remediation
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / Azure
vers:unknown/*
vers:unknown/*
Microsoft / Azure DevOps
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Data Formulator
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
vers:unknown/*
vers:unknown/*
Microsoft / Visual Studio Code
vers:unknown/*

Visual Studio Code contains a vulnerability where improper input neutralization during web page generation allows a local unauthorized attacker to bypass security features via cross-site scripting.

CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Affected products
Product Identifier Version Remediation
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / Azure
vers:unknown/*
vers:unknown/*
Microsoft / Azure DevOps
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Data Formulator
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
vers:unknown/*
vers:unknown/*
Microsoft / Visual Studio Code
vers:unknown/*

An XSS vulnerability in Visual Studio Code caused by improper neutralization of script-related HTML tags enables unauthorized local code execution.

CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Affected products
Product Identifier Version Remediation
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / Azure
vers:unknown/*
vers:unknown/*
Microsoft / Azure DevOps
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Data Formulator
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
vers:unknown/*
vers:unknown/*
Microsoft / Visual Studio Code
vers:unknown/*

A relative path traversal vulnerability in Visual Studio Code allows unauthorized local information disclosure by enabling access to files outside the intended directory scope.

CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Affected products
Product Identifier Version Remediation
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / Azure
vers:unknown/*
vers:unknown/*
Microsoft / Azure DevOps
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Data Formulator
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
vers:unknown/*
vers:unknown/*
Microsoft / Visual Studio Code
vers:unknown/*

A session fixation vulnerability in Visual Studio Code enables unauthorized attackers to elevate privileges over a network, potentially compromising user sessions.

CWE-384 - Session Fixation
Affected products
Product Identifier Version Remediation
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / Azure
vers:unknown/*
vers:unknown/*
Microsoft / Azure DevOps
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Data Formulator
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
vers:unknown/*
vers:unknown/*
Microsoft / Visual Studio Code
vers:unknown/*

A vulnerability in Azure DevOps allows unauthorized actors to access and disclose sensitive information over a network, posing a significant security risk.

Affected products
Product Identifier Version Remediation
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
vers:unknown/*
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
vers:unknown/*
vers:unknown/*
Microsoft / Azure
vers:unknown/*
vers:unknown/*
Microsoft / Azure DevOps
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Data Formulator
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
vers:unknown/*
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
vers:unknown/*
vers:unknown/*
Microsoft / Visual Studio Code
vers:unknown/*

{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Microsoft heeft kwetsbaarheden verholpen in diverse Developer Tools.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van een beveiligingsmaatregel\n- Uitvoeren van willekeurige code (gebruikersrechten)\n- Toegang tot gevoelige gegevens\n\nDe kwetsbaarheid met kenmerk CVE-2026-42826 is centraal verholpen door Microsoft en slechts toegevoegd ter informatie. Er zijn hiervoor geen verdere acties benodigd.\n\n```\nAzure DevOps: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-42826 | 10.00 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nVisual Studio Code: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-41610 | 6.30 | Omzeilen van beveiligingsmaatregel  | \n| CVE-2026-41611 | 7.80 | Uitvoeren van willekeurige code     | \n| CVE-2026-41612 | 5.50 | Toegang tot gevoelige gegevens      | \n| CVE-2026-41613 | 8.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nMicrosoft Data Formulator: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-41094 | 8.80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nASP.NET Core: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-42899 | 7.50 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\n.NET: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32177 | 7.30 | Denial-of-Service                   | \n| CVE-2026-35433 | 7.30 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32175 | 4.30 | \u003cVertaal: Tampering\u003e                | \n|----------------|------|-------------------------------------|\n\nGitHub Copilot and Visual Studio: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-41109 | 8.80 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n```\n",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
        "title": "CWE-59"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
        "title": "CWE-74"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
        "title": "CWE-77"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
        "title": "CWE-78"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
        "title": "CWE-79"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
        "title": "CWE-80"
      },
      {
        "category": "general",
        "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
        "title": "CWE-94"
      },
      {
        "category": "general",
        "text": "Heap-based Buffer Overflow",
        "title": "CWE-122"
      },
      {
        "category": "general",
        "text": "Integer Overflow or Wraparound",
        "title": "CWE-190"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      },
      {
        "category": "general",
        "text": "Session Fixation",
        "title": "CWE-384"
      },
      {
        "category": "general",
        "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
        "title": "CWE-835"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      },
      {
        "category": "general",
        "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
        "title": "CWE-22"
      },
      {
        "category": "general",
        "text": "Relative Path Traversal",
        "title": "CWE-23"
      },
      {
        "category": "general",
        "text": "Absolute Path Traversal",
        "title": "CWE-36"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "title": "Kwetsbaarheden verholpen in Microsoft Developer Tools",
    "tracking": {
      "current_release_date": "2026-05-12T17:53:17.575333Z",
      "generator": {
        "date": "2025-08-04T16:30:00Z",
        "engine": {
          "name": "V.A.",
          "version": "1.3"
        }
      },
      "id": "NCSC-2026-0143",
      "initial_release_date": "2026-05-12T17:53:17.575333Z",
      "revision_history": [
        {
          "date": "2026-05-12T17:53:17.575333Z",
          "number": "1.0.0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-1"
                }
              }
            ],
            "category": "product_name",
            "name": ".NET 10.0 installed on Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-2"
                }
              }
            ],
            "category": "product_name",
            "name": ".NET 10.0 installed on Mac OS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-3"
                }
              }
            ],
            "category": "product_name",
            "name": ".NET 8.0 installed on Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-4"
                }
              }
            ],
            "category": "product_name",
            "name": ".NET 8.0 installed on Mac OS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-5"
                }
              }
            ],
            "category": "product_name",
            "name": ".NET 8.0 installed on Windows"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-6"
                }
              }
            ],
            "category": "product_name",
            "name": ".NET 9.0 installed on Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-7"
                }
              }
            ],
            "category": "product_name",
            "name": ".NET 9.0 installed on Mac OS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-8"
                }
              }
            ],
            "category": "product_name",
            "name": ".NET 9.0 installed on Windows"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-9"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-10"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure DevOps"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-11"
                }
              }
            ],
            "category": "product_name",
            "name": "Microsoft Data Formulator"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-12"
                }
              }
            ],
            "category": "product_name",
            "name": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-13"
                }
              }
            ],
            "category": "product_name",
            "name": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-14"
                }
              }
            ],
            "category": "product_name",
            "name": "Microsoft Visual Studio 2022 version 17.12"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-15"
                }
              }
            ],
            "category": "product_name",
            "name": "Microsoft Visual Studio 2022 version 17.14"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-16"
                }
              }
            ],
            "category": "product_name",
            "name": "Microsoft Visual Studio 2026 version 18.5"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-17"
                }
              }
            ],
            "category": "product_name",
            "name": "Visual Studio Code"
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-32177",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        },
        {
          "category": "description",
          "text": "A heap-based buffer overflow vulnerability in the .NET framework allows an unauthorized local attacker to elevate privileges by exploiting memory corruption.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-32177 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-32177.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17"
          ]
        }
      ],
      "title": "CVE-2026-32177"
    },
    {
      "cve": "CVE-2026-35433",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        },
        {
          "category": "description",
          "text": "Improper input validation in the .NET framework allows unauthorized local users to escalate privileges, potentially compromising system security.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-35433 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-35433.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17"
          ]
        }
      ],
      "title": "CVE-2026-35433"
    },
    {
      "cve": "CVE-2026-32175",
      "cwe": {
        "id": "CWE-36",
        "name": "Absolute Path Traversal"
      },
      "notes": [
        {
          "category": "other",
          "text": "Absolute Path Traversal",
          "title": "CWE-36"
        },
        {
          "category": "description",
          "text": "A tampering vulnerability in .NET Core allows attackers to write arbitrary files and directories to certain system locations via specially crafted files, fixed by a security update ensuring proper file handling.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-32175 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-32175.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17"
          ]
        }
      ],
      "title": "CVE-2026-32175"
    },
    {
      "cve": "CVE-2026-42899",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        },
        {
          "category": "description",
          "text": "An infinite loop vulnerability in ASP.NET Core allows unauthorized attackers to cause denial of service over a network by exploiting a loop with an unreachable exit condition.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-42899 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42899.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17"
          ]
        }
      ],
      "title": "CVE-2026-42899"
    },
    {
      "cve": "CVE-2026-41094",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        },
        {
          "category": "description",
          "text": "An improper control of code generation vulnerability in Microsoft Data Formulator allows unauthorized remote code execution by attackers.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41094 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41094.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17"
          ]
        }
      ],
      "title": "CVE-2026-41094"
    },
    {
      "cve": "CVE-2026-41109",
      "notes": [
        {
          "category": "description",
          "text": "Improper neutralization of special elements in output within GitHub Copilot and Visual Studio allows unauthorized attackers to bypass security features over a network.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41109 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41109.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17"
          ]
        }
      ],
      "title": "CVE-2026-41109"
    },
    {
      "cve": "CVE-2026-41610",
      "cwe": {
        "id": "CWE-59",
        "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
          "title": "CWE-59"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        },
        {
          "category": "description",
          "text": "Visual Studio Code contains a vulnerability where improper input neutralization during web page generation allows a local unauthorized attacker to bypass security features via cross-site scripting.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41610 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41610.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17"
          ]
        }
      ],
      "title": "CVE-2026-41610"
    },
    {
      "cve": "CVE-2026-41611",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
          "title": "CWE-77"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
          "title": "CWE-80"
        },
        {
          "category": "description",
          "text": "An XSS vulnerability in Visual Studio Code caused by improper neutralization of script-related HTML tags enables unauthorized local code execution.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41611 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41611.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17"
          ]
        }
      ],
      "title": "CVE-2026-41611"
    },
    {
      "cve": "CVE-2026-41612",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        },
        {
          "category": "other",
          "text": "Relative Path Traversal",
          "title": "CWE-23"
        },
        {
          "category": "description",
          "text": "A relative path traversal vulnerability in Visual Studio Code allows unauthorized local information disclosure by enabling access to files outside the intended directory scope.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41612 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41612.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17"
          ]
        }
      ],
      "title": "CVE-2026-41612"
    },
    {
      "cve": "CVE-2026-41613",
      "cwe": {
        "id": "CWE-384",
        "name": "Session Fixation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Session Fixation",
          "title": "CWE-384"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        },
        {
          "category": "description",
          "text": "A session fixation vulnerability in Visual Studio Code enables unauthorized attackers to elevate privileges over a network, potentially compromising user sessions.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41613 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41613.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17"
          ]
        }
      ],
      "title": "CVE-2026-41613"
    },
    {
      "cve": "CVE-2026-42826",
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability in Azure DevOps allows unauthorized actors to access and disclose sensitive information over a network, posing a significant security risk.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-42826 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42826.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 10.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17"
          ]
        }
      ],
      "title": "CVE-2026-42826"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…