CVE ID | Publié | Description | Score | Gravité |
---|---|---|---|---|
.NET Spoofing Vulnerability | 5.9 |
Moyen |
||
.NET and Visual Studio Denial of Service Vulnerability | 7.5 |
Haute |
||
.NET Core and Visual Studio Information Disclosure Vulnerability | 5.5 |
Moyen |
||
.NET Core and Visual Studio Denial of Service Vulnerability | 7.5 |
Haute |
||
ASP.NET Core Denial of Service Vulnerability | 7.5 |
Haute |
||
.NET and Visual Studio Elevation of Privilege Vulnerability | 7.8 |
Haute |
||
.NET Core Remote Code Execution Vulnerability | 9.8 |
Critique |
||
.NET Core Remote Code Execution Vulnerability | 9.8 |
Critique |
||
.NET Core and Visual Studio Denial of Service Vulnerability | 6.5 |
Moyen |
||
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. | 6.5 |
Moyen |
||
A denial of service vulnerability exists when .NET Core or .NET Framework improperly handles web requests, aka '.NET Core & .NET Framework Denial of Service Vulnerability'. | 7.5 |
Haute |