Search for packages
| purl | pkg:nuget/Microsoft.NETCore.App.Runtime.browser-wasm@5.0.2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-69ua-s6h2-3uhc
Aliases: BIT-brotli-2020-8927 BIT-dotnet-2020-8927 BIT-dotnet-sdk-2020-8927 BIT-powershell-2020-8927 CVE-2020-36846 CVE-2020-8927 GHSA-5v8v-66v8-mwm7 GO-2025-3726 PYSEC-2020-29 RUSTSEC-2021-0131 RUSTSEC-2021-0132 |
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. |
Affected by 0 other vulnerabilities. |
|
VCID-757k-8968-xkbx
Aliases: CVE-2021-1721 GHSA-3gp9-h8hw-pxpw |
Denial of service in .NET core .NET Core and Visual Studio Denial of Service Vulnerability due to a vulnerability which exists when creating HTTPS web request during X509 certificate chain building. |
Affected by 1 other vulnerability. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||