Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft powershell core 6.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2019-1301
A denial of service vulnerability exists when .NET Core improperly handles web requests, aka '.NET Core Denial of Service Vulnerability'.
Microsoft Powershell Core 6.1
Microsoft .net Core 2.1
Microsoft .net Core 2.2
Microsoft Powershell Core 6.2
2 Github repositories
1 Article
4.1
CVSSv3
CVE-2019-1167
A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an malicious user to bypass WDAC enforcement, aka 'Windows Defender Application Control Security Feature Bypass Vulnerability'.
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.2
7.8
CVSSv3
CVE-2019-0631
A security feature bypass vulnerability exists in Windows which could allow an malicious user to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0627, CVE-2019-0632.
Microsoft Windows 10 1607
Microsoft Windows Server 2016 -
Microsoft Windows 10 1703
Microsoft Windows 10 -
Microsoft Windows 10 1709
Microsoft Windows Server 2016 1709
Microsoft Windows 10 1803
Microsoft Windows Server 2016 1803
Microsoft Powershell Core 6.1
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Powershell Core 6.2
1 Article
7.8
CVSSv3
CVE-2019-0632
A security feature bypass vulnerability exists in Windows which could allow an malicious user to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0627, CVE-2019-0631.
Microsoft Windows 10 1607
Microsoft Windows Server 2016 -
Microsoft Windows 10 1703
Microsoft Windows 10 -
Microsoft Windows 10 1709
Microsoft Windows Server 2016 1709
Microsoft Windows 10 1803
Microsoft Windows Server 2016 1803
Microsoft Powershell Core 6.1
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Powershell Core 6.2
1 Article
7.8
CVSSv3
CVE-2019-0627
A security feature bypass vulnerability exists in Windows which could allow an malicious user to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0631, CVE-2019-0632.
Microsoft Windows 10 1607
Microsoft Windows Server 2016 -
Microsoft Windows 10 1703
Microsoft Windows 10 -
Microsoft Windows 10 1709
Microsoft Windows Server 2016 1709
Microsoft Windows 10 1803
Microsoft Windows Server 2016 1803
Microsoft Powershell Core 6.1
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Powershell Core 6.2
1 Article
5.9
CVSSv3
CVE-2019-0657
A vulnerability exists in certain .Net Framework API's and Visual Studio in the way they parse URL's, aka '.NET Framework and Visual Studio Spoofing Vulnerability'.
Microsoft .net Core 1.0
Microsoft Visual Studio 2017 -
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.0
Microsoft .net Core 2.1
Microsoft Visual Studio 2017 15.9
Microsoft .net Core 2.2
Microsoft .net Framework 2.0
Microsoft .net Framework 3.0
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.5.2
Microsoft .net Framework 4.6
Microsoft .net Framework 4.6.2
Microsoft .net Framework 4.7
Microsoft .net Framework 4.7.1
Microsoft .net Framework 4.7.2
Microsoft .net Framework 4.6.1
1 Article
7.8
CVSSv3
CVE-2018-8415
A tampering vulnerability exists in PowerShell that could allow an malicious user to execute unlogged code, aka "Microsoft PowerShell Tampering Vulnerability." This affects Windows 7, PowerShell Core 6.1, Windows Server 2012 R2, Windows RT 8.1, PowerShell Core 6.0, Wind...
Microsoft Windows Server 2012 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Server 2008 R2
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows 10 1703
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows 10 1709
Microsoft Windows Server 2016 1709
Microsoft Windows 10 1803
Microsoft Windows Server 2016 1803
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.0
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
8.8
CVSSv3
CVE-2018-8256
A remote code execution vulnerability exists when PowerShell improperly handles specially crafted files, aka "Microsoft PowerShell Remote Code Execution Vulnerability." This affects Windows RT 8.1, PowerShell Core 6.0, Microsoft.PowerShell.Archive 1.2.2.0, Windows Serve...
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows 10 1703
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows 10 1709
Microsoft Windows Server 2016 1709
Microsoft Windows 10 1803
Microsoft Windows Server 2016 1803
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.0
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Microsoft.powershell.archive 1.2.2.0
5.5
CVSSv3
CVE-2018-8356
A security feature bypass vulnerability exists when Microsoft .NET Framework components do not correctly validate certificates, aka ".NET Framework Security Feature Bypass Vulnerability." This affects .NET Framework 4.7.2, Microsoft .NET Framework 3.0, Microsoft .NET Fr...
Microsoft .net Framework 3.0
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.5.2
Microsoft .net Framework 4.6
Microsoft .net Framework 4.6.2
Microsoft .net Framework 4.7
Microsoft .net Framework 4.7.1
Microsoft .net Framework 4.7.2
Microsoft .net Framework 4.6.1
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.0
Microsoft .net Core 2.0
Microsoft .net Core 1.0
Microsoft .net Core 1.1
Microsoft .net Framework Developer Pack 4.7.2
Microsoft Asp.net Core 1.0
Microsoft Asp.net Core 1.1
Microsoft Asp.net Core 2.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started