| CVE ID | Publié | Description | Score | Gravité |
|---|---|---|---|---|
| .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability | 7.3 |
Haute |
||
| NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability | 9.8 |
Critique |
||
| PowerShell Information Disclosure Vulnerability | 6.5 |
Moyen |
||
| .NET Denial of Service Vulnerability | 7.5 |
Haute |
||
| .NET Spoofing Vulnerability | 5.9 |
Moyen |
||
| .NET and Visual Studio Denial of Service Vulnerability | 7.5 |
Haute |
||
| PowerShell Elevation of Privilege Vulnerability | 7.8 |
Haute |
||
| .NET and Visual Studio Remote Code Execution Vulnerability | 6.3 |
Moyen |
||
| Microsoft PowerShell Spoofing Vulnerability | 5.5 |
Moyen |
||
| A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. | 6.5 |
Moyen |