CVE ID | Publié | Description | Score | Gravité |
---|---|---|---|---|
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability | 7.3 |
Haute |
||
NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability | 9.8 |
Critique |
||
PowerShell Information Disclosure Vulnerability | 6.5 |
Moyen |
||
.NET Denial of Service Vulnerability | 7.5 |
Haute |
||
.NET Spoofing Vulnerability | 5.9 |
Moyen |
||
.NET and Visual Studio Denial of Service Vulnerability | 7.5 |
Haute |
||
PowerShell Elevation of Privilege Vulnerability | 7.8 |
Haute |
||
.NET and Visual Studio Remote Code Execution Vulnerability | 6.3 |
Moyen |
||
Microsoft PowerShell Spoofing Vulnerability | 5.5 |
Moyen |
||
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. | 6.5 |
Moyen |