aspnetcore-targeting-pack-8.0

Direct Vulnerabilities

Known vulnerabilities in the aspnetcore-targeting-pack-8.0 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-bounds Write

<0:8.0.26-1.el9_7
  • H
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:8.0.26-1.el9_7
  • H
Improper Neutralization of Special Elements

<0:8.0.26-1.el9_7
  • H
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:8.0.26-1.el9_7
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Allocation of Resources Without Limits or Throttling

<0:8.0.25-1.el9_7
  • H
Insecure Temporary File

<0:8.0.21-1.el9_6
  • H
HTTP Request Smuggling

<0:8.0.21-1.el9_6
  • H
Cleartext Transmission of Sensitive Information

<0:8.0.21-1.el9_6
  • H
Uncontrolled Search Path Element

<0:8.0.17-1.el9_6
  • H
Authentication Bypass

<0:8.0.16-1.el9_6
  • H
Improper Privilege Management

<0:8.0.14-1.el9_5
  • H
Algorithmic Complexity

<0:8.0.10-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.10-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.10-1.el9_4
  • H
Use After Free

<0:8.0.10-1.el9_4
  • H
Buffer Over-read

<0:8.0.12-1.el9_5
  • H
Creation of Temporary File in Directory with Incorrect Permissions

<0:8.0.12-1.el9_5
  • H
Improper Restriction of Names for Files and Other Resources

<0:8.0.12-1.el9_5
  • H
Cross-site Scripting (XSS)

<0:8.0.12-1.el9_5
  • M
Information Exposure

<0:8.0.8-1.el9_4
  • H
CVE-2024-38095

<0:8.0.7-1.el9_4
  • H
CVE-2024-35264

<0:8.0.7-1.el9_4
  • H
CVE-2024-30105

<0:8.0.7-1.el9_4
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Deadlock

<0:8.0.5-1.el9_4
  • H
Out-of-Bounds

<0:8.0.5-1.el9_4
  • M
Resource Exhaustion

<0:8.0.3-2.el9_3
  • H
CVE-2024-21386

<0:8.0.2-2.el9_3
  • H
Resource Exhaustion

<0:8.0.2-2.el9_3
  • H
Resource Exhaustion

<0:8.0.1-1.el9_3
  • H
Unprotected Alternate Channel

<0:8.0.1-1.el9_3
  • H
Improper Certificate Validation

<0:8.0.1-1.el9_3
  • M
CVE-2023-36558

<0:8.0.0-2.el9_3
  • M
Arbitrary Code Injection

<0:8.0.0-2.el9_3
  • H
Resource Exhaustion

<0:8.0.0~rc.2-0.1.el9_3