7 results (0.015 seconds)

CVSS: 7.1EPSS: 1%CPEs: 6EXPL: 0

NuGet Client Remote Code Execution Vulnerability A vulnerability was found in dotnet. This issue exists in NuGet where a potential race condition can lead to a symlink attack. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29337 https://access.redhat.com/security/cve/CVE-2023-29337 https://bugzilla.redhat.com/show_bug.cgi?id=2213703 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 5.8EPSS: 0%CPEs: 76EXPL: 0

.NET Framework Information Disclosure Vulnerability Vulnerabilidad de divulgación de información de .NET Framework • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41064 •

CVSS: 5.5EPSS: 0%CPEs: 12EXPL: 0

.NET and Visual Studio Information Disclosure Vulnerability Una Vulnerabilidad de Divulgación de Información en .NET y Visual Studio • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMP34G53EA2DBTBLFOAQCDZRRENE2EA2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWNH4AC3LFVX35MDRX5OBZDGD2AMH66K https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30184 https://access.redhat.com/security/cve/CVE-2022-30184 https://bugzilla.redhat.com/show_bug.cgi?id=2096963 • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

Jenkins Nuget Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. Jenkins Nuget Plugin versiones 1.0 y anteriores, no configuran su analizador XML para impedir ataques de entidad externa XML (XXE) • http://www.openwall.com/lists/oss-security/2021/05/25/3 https://www.jenkins.io/security/advisory/2021-05-25/#SECURITY-2340 •

CVSS: 8.8EPSS: 0%CPEs: 6EXPL: 0

An elevation of privilege vulnerability exists in Azure Active Directory Authentication Library On-Behalf-Of flow, in the way the library caches tokens. This vulnerability allows an authenticated attacker to perform actions in context of another user. The authenticated attacker can exploit this vulneraiblity by accessing a service configured for On-Behalf-Of flow that assigns incorrect tokens. This security update addresses the vulnerability by removing fallback cache look-up for On-Behalf-Of scenarios. Existe una vulnerabilidad de elevación de privilegios en Azure Active Directory Authentication Library del lado de la transmisión, en la manera en que la biblioteca almacena en caché los tokens, también se conoce como "Azure Active Directory Authentication Library Elevation of Privilege Vulnerability". • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1258 •