Page 3 of 296 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 16EXPL: 1

.NET Framework Information Disclosure Vulnerability Vulnerabilidad de divulgación de información de .NET Framework • https://github.com/codewhitesec/HttpRemotingObjRefLeak https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29059 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 0

Microsoft QUIC Denial of Service Vulnerability Vulnerabilidad de denegación de servicio de Microsoft QUIC • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26190 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

.NET and Visual Studio Denial of Service Vulnerability Vulnerabilidad de denegación de servicio en .NET y Visual Studio A vulnerability was found in dotnet. The YARP HTTP/2 WebSocket support in .NET Core can cause a denial of service (DoS). • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21392 https://access.redhat.com/security/cve/CVE-2024-21392 https://bugzilla.redhat.com/show_bug.cgi?id=2268266 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

.NET Denial of Service Vulnerability Vulnerabilidad de denegación de servicio de .NET A denial of service vulnerability exists in .NET applications with OpenSSL support when parsing X509 certificates. The issue arises from inadequate validation of user-supplied input in .NET. This flaw allows a remote attacker to trigger a denial of service (DoS) attack by providing specially crafted input. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21404 https://access.redhat.com/security/cve/CVE-2024-21404 https://bugzilla.redhat.com/show_bug.cgi?id=2263086 • CWE-400: Uncontrolled Resource Consumption CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

.NET Denial of Service Vulnerability Vulnerabilidad de denegación de servicio de .NET A denial of service vulnerability is present in the .NET applications utilizing SignalR, which a malicious client can exploit. The issue arises from inadequate validation of user-supplied input in .NET. This flaw allows a remote attacker to trigger a denial of service (DoS) attack by providing specially crafted input. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21386 https://access.redhat.com/security/cve/CVE-2024-21386 https://bugzilla.redhat.com/show_bug.cgi?id=2263085 • CWE-400: Uncontrolled Resource Consumption •