Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:microsoft:.net:7.0.0:preview.5:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2024-21392 |
.NET and Visual Studio Denial of Service Vulnerability Published: March 12, 2024; 1:15:49 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-21319 |
Microsoft Identity Denial of service vulnerability Published: January 09, 2024; 2:15:12 PM -0500 |
V4.0:(not available) V3.1: 6.8 MEDIUM V2.0:(not available) |
CVE-2024-20672 |
.NET Denial of Service Vulnerability Published: January 09, 2024; 1:15:50 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2024-0057 |
NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability Published: January 09, 2024; 1:15:46 PM -0500 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-0056 |
Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability Published: January 09, 2024; 1:15:46 PM -0500 |
V4.0:(not available) V3.1: 8.7 HIGH V2.0:(not available) |
CVE-2023-36558 |
ASP.NET Core - Security Feature Bypass Vulnerability Published: November 14, 2023; 5:15:29 PM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-36049 |
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability Published: November 14, 2023; 4:15:10 PM -0500 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-38171 |
Microsoft QUIC Denial of Service Vulnerability Published: October 10, 2023; 2:15:18 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-36435 |
Microsoft QUIC Denial of Service Vulnerability Published: October 10, 2023; 2:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-44487 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. Published: October 10, 2023; 10:15:10 AM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-36799 |
.NET Core and Visual Studio Denial of Service Vulnerability Published: September 12, 2023; 1:15:15 PM -0400 |
V4.0:(not available) V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-36796 |
Visual Studio Remote Code Execution Vulnerability Published: September 12, 2023; 1:15:15 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36794 |
Visual Studio Remote Code Execution Vulnerability Published: September 12, 2023; 1:15:14 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36793 |
Visual Studio Remote Code Execution Vulnerability Published: September 12, 2023; 1:15:14 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36792 |
Visual Studio Remote Code Execution Vulnerability Published: September 12, 2023; 1:15:14 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-38180 |
.NET and Visual Studio Denial of Service Vulnerability Published: August 08, 2023; 3:15:10 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2023-35391 |
ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability Published: August 08, 2023; 3:15:09 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-35390 |
.NET and Visual Studio Remote Code Execution Vulnerability Published: August 08, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-33170 |
ASP.NET and Visual Studio Security Feature Bypass Vulnerability Published: July 11, 2023; 2:15:15 PM -0400 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-33127 |
.NET and Visual Studio Elevation of Privilege Vulnerability Published: July 11, 2023; 2:15:14 PM -0400 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |