Search for packages
purl | pkg:nuget/Microsoft.NETCore.App.Runtime.win-arm@6.0.1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-75cy-7mx4-aaae
Aliases: CVE-2022-24512 GHSA-c6w8-7mp3-34j9 |
.NET and Visual Studio Remote Code Execution Vulnerability. |
Affected by 8 other vulnerabilities. |
VCID-auss-439k-aaaj
Aliases: CVE-2024-21392 GHSA-5fxj-whcv-crrc |
.NET and Visual Studio Denial of Service Vulnerability |
Affected by 1 other vulnerability. Affected by 0 other vulnerabilities. |
VCID-c7kh-duun-aaag
Aliases: CVE-2023-21538 GHSA-8f7f-vqg5-jrv9 |
.NET Denial of Service Vulnerability |
Affected by 7 other vulnerabilities. Affected by 10 other vulnerabilities. |
VCID-f6uj-f44e-aaan
Aliases: CVE-2023-33126 GHSA-gh24-9qjj-mr67 |
.NET and Visual Studio Remote Code Execution Vulnerability |
Affected by 1 other vulnerability. Affected by 3 other vulnerabilities. |
VCID-krnk-d2kv-aaab
Aliases: CVE-2023-28260 GHSA-w4m3-43gp-x8hx |
.NET Remote Code Execution vulnerability |
Affected by 5 other vulnerabilities. Affected by 8 other vulnerabilities. |
VCID-pee3-k6u1-aaaj
Aliases: CVE-2023-24897 GHSA-88q2-h5g3-p4pg |
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability |
Affected by 1 other vulnerability. Affected by 3 other vulnerabilities. |
VCID-pmbw-dfpp-aaaf
Aliases: CVE-2023-29331 GHSA-555c-2p6r-68mm |
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability |
Affected by 1 other vulnerability. Affected by 3 other vulnerabilities. |
VCID-r5cn-9y1y-aaah
Aliases: CVE-2023-24936 GHSA-jx7q-xxmw-44vf |
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability |
Affected by 1 other vulnerability. Affected by 3 other vulnerabilities. |
VCID-s5at-bff3-aaaq
Aliases: CVE-2023-21808 GHSA-824j-wqm8-89mj |
.NET Remote Code Execution Vulnerability |
Affected by 6 other vulnerabilities. Affected by 9 other vulnerabilities. |
VCID-zv7x-wujr-aaaa
Aliases: BIT-2020-8927 BIT-brotli-2020-8927 BIT-dotnet-2020-8927 BIT-dotnet-sdk-2020-8927 CVE-2020-8927 GHSA-5v8v-66v8-mwm7 PYSEC-2020-29 RUSTSEC-2021-0131 RUSTSEC-2021-0132 |
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. |
Affected by 8 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |