rh-dotnet31-dotnet-runtime-3.1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the rh-dotnet31-dotnet-runtime-3.1 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2023-24936

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Information Exposure Through Caching

<0:3.1.30-1.el7_9
  • M
Resource Exhaustion

<0:3.1.29-1.el7_9
  • M
XML External Entity (XXE) Injection

<0:3.1.28-1.el7_9
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:3.1.26-1.el7_9
  • L
Cross-site Scripting (XSS)

*
  • M
Exposure of Private Information ('Privacy Violation')

<0:3.1.28-1.el7_9
  • H
Incorrect Behavior Order: Early Validation

<0:3.1.25-1.el7_9
  • H
Reliance on Cookies without Validation and Integrity Checking

<0:3.1.25-1.el7_9
  • H
Allocation of Resources Without Limits or Throttling

<0:3.1.25-1.el7_9
  • M
Improper Use of Validation Framework

*
  • H
Buffer Overflow

<0:3.1.23-1.el7_9
  • H
Improper Use of Validation Framework

<0:3.1.23-1.el7_9
  • M
Improper Handling of Case Sensitivity

<0:3.1.24-1.el7_9
  • M
Information Exposure

*
  • M
Open Redirect

*
  • H
Information Exposure Through Log Files

<0:3.1.18-1.el7_9
  • H
Incorrect Permission Assignment for Critical Resource

<0:3.1.18-1.el7_9
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.1.18-1.el7_9
  • H
Missing Release of Resource after Effective Lifetime

<0:3.1.16-1.el7_9
  • H
Improper Check for Dropped Privileges

<0:3.1.15-1.el7_9
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.23-1.el7_9
  • H
Out-of-Bounds

<0:3.1.13-1.el7_9
  • H
Uncontrolled Recursion

<0:3.1.12-1.el7_9
  • H
Deadlock

<0:3.1.11-1.el7_9
  • H
Reliance on Untrusted Inputs in a Security Decision

<0:3.1.8-1.el7
  • H
Resource Exhaustion

<0:3.1.7-1.el7
  • C
Deserialization of Untrusted Data

<0:3.1.6-1.el7
  • H
Resource Exhaustion

<0:3.1.4-2.el7
  • H
Improper Input Validation

<0:3.1.5-1.el7
  • C
Resource Exhaustion

<0:3.1.1-4.el7
  • C
Out-of-Bounds

<0:3.1.1-4.el7