CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
.NET and Visual Studio Denial of Service Vulnerability | 7.5 |
High |
||
.NET and Visual Studio Denial of Service Vulnerability | 7.5 |
High |
||
.NET and Visual Studio Denial of Service Vulnerability | 7.5 |
High |
||
.NET and Visual Studio Remote Code Execution Vulnerability | 6.3 |
Medium |
||
.NET and Visual Studio Denial of Service Vulnerability | 7.5 |
High |
||
.NET Denial of Service Vulnerability | 7.5 |
High |
||
.NET Core and Visual Studio Information Disclosure Vulnerability | 5.7 |
Medium |
||
.NET Core and Visual Studio Information Disclosure Vulnerability | 5.5 |
Medium |
||
.NET Core and Visual Studio Denial of Service Vulnerability | 7.5 |
High |
||
ASP.NET Core Denial of Service Vulnerability | 7.5 |
High |
||
.NET and Visual Studio Elevation of Privilege Vulnerability | 7.8 |
High |
||
.NET Core Remote Code Execution Vulnerability | 9.8 |
Critical |
||
.NET Core Remote Code Execution Vulnerability | 9.8 |
Critical |
||
.NET Core and Visual Studio Denial of Service Vulnerability | 6.5 |
Medium |
||
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. | 6.5 |
Medium |
||
A denial of service vulnerability exists when .NET Core or .NET Framework improperly handles web requests, aka '.NET Core & .NET Framework Denial of Service Vulnerability'. | 7.5 |
High |