This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote Windows host contains a development application that is
affected by a privilege escalation vulnerability.
The installed version of Microsoft Visual Studio does not properly
validate add-ins in the path before loading them into the application.
An attacker can elevate his privileges by placing a specially crafted
add-in in the path used by Visual Studio and convincing a user with
higher privileges to start Visual Studio.
See also :
Microsoft has released a set of patches for Microsoft Visual Studio
2008 SP1, 2010, and 2010 SP1.
Risk factor :
Medium / CVSS Base Score : 6.9
CVSS Temporal Score : 5.1
Public Exploit Available : true
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 58333 ()
Bugtraq ID: 52329
CVE ID: CVE-2012-0008
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.