Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft powershell core 6.1 vulnerabilities and exploits
(subscribe to this query)
169
VMScore
CVE-2019-1167
A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an malicious user to bypass WDAC enforcement, aka 'Windows Defender Application Control Security Feature Bypass Vulnerability'.
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.2
446
VMScore
CVE-2019-1301
A denial of service vulnerability exists when .NET Core improperly handles web requests, aka '.NET Core Denial of Service Vulnerability'.
Microsoft Powershell Core 6.2
Microsoft .net Core 2.1
Microsoft .net Core 2.2
Microsoft Powershell Core 6.1
2 Github repositories
1 Article
187
VMScore
CVE-2018-8356
A security feature bypass vulnerability exists when Microsoft .NET Framework components do not correctly validate certificates, aka ".NET Framework Security Feature Bypass Vulnerability." This affects .NET Framework 4.7.2, Microsoft .NET Framework 3.0, Microsoft .NET Fr...
Microsoft .net Framework 3.0
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.5.2
Microsoft .net Framework 4.6
Microsoft .net Framework 4.6.2
Microsoft .net Framework 4.7
Microsoft .net Framework 4.7.1
Microsoft .net Framework 4.7.2
Microsoft .net Framework 4.6.1
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.0
Microsoft .net Core 2.0
Microsoft .net Core 1.0
Microsoft .net Core 1.1
Microsoft .net Framework Developer Pack 4.7.2
Microsoft Asp.net Core 1.0
Microsoft Asp.net Core 1.1
Microsoft Asp.net Core 2.0
383
VMScore
CVE-2019-0657
A vulnerability exists in certain .Net Framework API's and Visual Studio in the way they parse URL's, aka '.NET Framework and Visual Studio Spoofing Vulnerability'.
Microsoft .net Core 1.0
Microsoft .net Core 2.1
Microsoft .net Core 2.2
Microsoft Visual Studio 2017 -
Microsoft Visual Studio 2017 15.9
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.0
Microsoft .net Framework 2.0
Microsoft .net Framework 3.0
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.5.2
Microsoft .net Framework 4.6
Microsoft .net Framework 4.6.2
Microsoft .net Framework 4.7.1
Microsoft .net Framework 4.7
Microsoft .net Framework 4.7.2
Microsoft .net Framework 4.6.1
1 Article
409
VMScore
CVE-2019-0627
A security feature bypass vulnerability exists in Windows which could allow an malicious user to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0631, CVE-2019-0632.
Microsoft Windows 10 -
Microsoft Powershell Core 6.1
Microsoft Windows Server 2019 -
Microsoft Windows 10 1803
Microsoft Windows 10 1703
Microsoft Windows Server 2016 1709
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2016 -
Microsoft Windows 10 1809
Microsoft Powershell Core 6.2
Microsoft Windows 10 1709
Microsoft Windows 10 1607
1 Article
409
VMScore
CVE-2019-0631
A security feature bypass vulnerability exists in Windows which could allow an malicious user to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0627, CVE-2019-0632.
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2016 -
Microsoft Windows 10 1809
Microsoft Windows 10 1803
Microsoft Powershell Core 6.2
Microsoft Windows Server 2016 1709
Microsoft Windows 10 1709
Microsoft Windows 10 1607
Microsoft Powershell Core 6.1
Microsoft Windows Server 2019 -
Microsoft Windows 10 1703
Microsoft Windows 10 -
1 Article
409
VMScore
CVE-2019-0632
A security feature bypass vulnerability exists in Windows which could allow an malicious user to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0627, CVE-2019-0631.
Microsoft Windows 10 1803
Microsoft Windows 10 1709
Microsoft Windows 10 1703
Microsoft Windows 10 1607
Microsoft Windows Server 2016 1803
Microsoft Windows 10 1809
Microsoft Windows 10 -
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.2
Microsoft Windows Server 2019 -
Microsoft Windows Server 2016 1709
Microsoft Windows Server 2016 -
1 Article
409
VMScore
CVE-2018-8415
A tampering vulnerability exists in PowerShell that could allow an malicious user to execute unlogged code, aka "Microsoft PowerShell Tampering Vulnerability." This affects Windows 7, PowerShell Core 6.1, Windows Server 2012 R2, Windows RT 8.1, PowerShell Core 6.0, Wind...
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 10 -
Microsoft Windows 10 1607
Microsoft Windows 10 1703
Microsoft Windows 10 1709
Microsoft Powershell Core 6.0
Microsoft Windows 10 1809
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Server 2016 1803
Microsoft Powershell Core 6.1
Microsoft Windows 10 1803
Microsoft Windows 7 -
Microsoft Windows Server 2016 1709
Microsoft Windows Server 2019 -
828
VMScore
CVE-2018-8256
A remote code execution vulnerability exists when PowerShell improperly handles specially crafted files, aka "Microsoft PowerShell Remote Code Execution Vulnerability." This affects Windows RT 8.1, PowerShell Core 6.0, Microsoft.PowerShell.Archive 1.2.2.0, Windows Serve...
Microsoft Powershell Core 6.0
Microsoft Powershell Core 6.1
Microsoft Windows 10 -
Microsoft Windows 10 1607
Microsoft Windows Server 2016 1709
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2019 -
Microsoft Windows 7 -
Microsoft Windows 8.1 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2008 R2
Microsoft Windows 10 1709
Microsoft Windows 10 1809
Microsoft Windows Server 2012 R2
Microsoft Microsoft.powershell.archive 1.2.2.0
Microsoft Windows 10 1703
Microsoft Windows 10 1803
Microsoft Windows Server 2012 -
Microsoft Windows Server 2016 -
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3661
open redirect
CVE-2024-25512
CVE-2024-33788
command injection
SSTI
CVE-2024-0043
CVE-2024-29210
CVE-2024-25510
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started