Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft powershell core 6.1 vulnerabilities and exploits
(subscribe to this query)
1.9
CVSSv2
CVE-2019-1167
A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an malicious user to bypass WDAC enforcement, aka 'Windows Defender Application Control Security Feature Bypass Vulnerability'.
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.2
5
CVSSv2
CVE-2019-1301
A denial of service vulnerability exists when .NET Core improperly handles web requests, aka '.NET Core Denial of Service Vulnerability'.
Microsoft Powershell Core 6.2
Microsoft .net Core 2.1
Microsoft .net Core 2.2
Microsoft Powershell Core 6.1
2 Github repositories
1 Article
2.1
CVSSv2
CVE-2018-8356
A security feature bypass vulnerability exists when Microsoft .NET Framework components do not correctly validate certificates, aka ".NET Framework Security Feature Bypass Vulnerability." This affects .NET Framework 4.7.2, Microsoft .NET Framework 3.0, Microsoft .NET Fr...
Microsoft .net Framework 3.0
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.5.2
Microsoft .net Framework 4.6
Microsoft .net Framework 4.6.2
Microsoft .net Framework 4.7
Microsoft .net Framework 4.7.1
Microsoft .net Framework 4.7.2
Microsoft .net Framework 4.6.1
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.0
Microsoft .net Core 2.0
Microsoft .net Core 1.0
Microsoft .net Core 1.1
Microsoft .net Framework Developer Pack 4.7.2
Microsoft Asp.net Core 1.0
Microsoft Asp.net Core 1.1
Microsoft Asp.net Core 2.0
4.3
CVSSv2
CVE-2019-0657
A vulnerability exists in certain .Net Framework API's and Visual Studio in the way they parse URL's, aka '.NET Framework and Visual Studio Spoofing Vulnerability'.
Microsoft .net Core 1.0
Microsoft .net Core 2.1
Microsoft .net Core 2.2
Microsoft Visual Studio 2017 -
Microsoft Visual Studio 2017 15.9
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.0
Microsoft .net Framework 2.0
Microsoft .net Framework 3.0
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.5.2
Microsoft .net Framework 4.6
Microsoft .net Framework 4.6.2
Microsoft .net Framework 4.7.1
Microsoft .net Framework 4.7
Microsoft .net Framework 4.7.2
Microsoft .net Framework 4.6.1
1 Article
4.6
CVSSv2
CVE-2019-0627
A security feature bypass vulnerability exists in Windows which could allow an malicious user to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0631, CVE-2019-0632.
Microsoft Windows 10 -
Microsoft Powershell Core 6.1
Microsoft Windows Server 2019 -
Microsoft Windows 10 1803
Microsoft Windows 10 1703
Microsoft Windows Server 2016 1709
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2016 -
Microsoft Windows 10 1809
Microsoft Powershell Core 6.2
Microsoft Windows 10 1709
Microsoft Windows 10 1607
1 Article
4.6
CVSSv2
CVE-2019-0631
A security feature bypass vulnerability exists in Windows which could allow an malicious user to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0627, CVE-2019-0632.
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2016 -
Microsoft Windows 10 1809
Microsoft Windows 10 1803
Microsoft Powershell Core 6.2
Microsoft Windows Server 2016 1709
Microsoft Windows 10 1709
Microsoft Windows 10 1607
Microsoft Powershell Core 6.1
Microsoft Windows Server 2019 -
Microsoft Windows 10 1703
Microsoft Windows 10 -
1 Article
4.6
CVSSv2
CVE-2019-0632
A security feature bypass vulnerability exists in Windows which could allow an malicious user to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0627, CVE-2019-0631.
Microsoft Windows 10 1803
Microsoft Windows 10 1709
Microsoft Windows 10 1703
Microsoft Windows 10 1607
Microsoft Windows Server 2016 1803
Microsoft Windows 10 1809
Microsoft Windows 10 -
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.2
Microsoft Windows Server 2019 -
Microsoft Windows Server 2016 1709
Microsoft Windows Server 2016 -
1 Article
4.6
CVSSv2
CVE-2018-8415
A tampering vulnerability exists in PowerShell that could allow an malicious user to execute unlogged code, aka "Microsoft PowerShell Tampering Vulnerability." This affects Windows 7, PowerShell Core 6.1, Windows Server 2012 R2, Windows RT 8.1, PowerShell Core 6.0, Wind...
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 10 -
Microsoft Windows 10 1607
Microsoft Windows 10 1703
Microsoft Windows 10 1709
Microsoft Powershell Core 6.0
Microsoft Windows 10 1809
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Server 2016 1803
Microsoft Powershell Core 6.1
Microsoft Windows 10 1803
Microsoft Windows 7 -
Microsoft Windows Server 2016 1709
Microsoft Windows Server 2019 -
9.3
CVSSv2
CVE-2018-8256
A remote code execution vulnerability exists when PowerShell improperly handles specially crafted files, aka "Microsoft PowerShell Remote Code Execution Vulnerability." This affects Windows RT 8.1, PowerShell Core 6.0, Microsoft.PowerShell.Archive 1.2.2.0, Windows Serve...
Microsoft Powershell Core 6.0
Microsoft Powershell Core 6.1
Microsoft Windows 10 -
Microsoft Windows 10 1607
Microsoft Windows Server 2016 1709
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2019 -
Microsoft Windows 7 -
Microsoft Windows 8.1 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2008 R2
Microsoft Windows 10 1709
Microsoft Windows 10 1809
Microsoft Windows Server 2012 R2
Microsoft Microsoft.powershell.archive 1.2.2.0
Microsoft Windows 10 1703
Microsoft Windows 10 1803
Microsoft Windows Server 2012 -
Microsoft Windows Server 2016 -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started