aspnetcore-runtime-7.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the aspnetcore-runtime-7.0 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Deadlock

<0:7.0.19-1.el9_4
  • H
Out-of-Bounds

<0:7.0.19-1.el9_4
  • H
Resource Exhaustion

<0:7.0.19-1.el9_4
  • H
CVE-2024-21386

<0:7.0.19-1.el9_4
  • H
Resource Exhaustion

<0:7.0.15-1.el9_3
  • H
Improper Certificate Validation

<0:7.0.15-1.el9_3
  • H
Unprotected Alternate Channel

<0:7.0.15-1.el9_3
  • H
Reversible One-Way Hash

<0:7.0.16-1.el9_3
  • M
Resource Exhaustion

<0:7.0.17-1.el9_3
  • M
CVE-2023-36558

<0:7.0.14-1.el9_3
  • M
Arbitrary Code Injection

<0:7.0.14-1.el9_3
  • H
Resource Exhaustion

<0:7.0.12-1.el9_2
  • H
Race Condition

<0:7.0.9-1.el9_2
  • H
Resource Exhaustion

<0:7.0.10-1.el9_2
  • H
CVE-2023-35390

<0:7.0.10-1.el9_2
  • M
Resource Exhaustion

<0:7.0.13-1.el9_2
  • H
CVE-2023-33128

<0:7.0.7-1.el9_2
  • H
CVE-2023-32032

<0:7.0.7-1.el9_2
  • H
CVE-2023-29337

<0:7.0.7-1.el9_2
  • H
CVE-2023-29331

<0:7.0.7-1.el9_2
  • H
CVE-2023-24936

<0:7.0.7-1.el9_2
  • M
Information Exposure Through Caching

<0:7.0.0-0.5.rc2.el9_1
  • M
NULL Pointer Dereference

*
  • H
Deadlock

<0:7.0.19-1.el9_4
  • H
Out-of-Bounds

<0:7.0.19-1.el9_4
  • H
Resource Exhaustion

<0:7.0.16-1.el9_2
  • H
Resource Exhaustion

<0:7.0.16-1.el9_2
  • H
Resource Exhaustion

<0:7.0.16-1.el9_2
  • M
Resource Exhaustion

<0:7.0.17-1.el9_3
  • H
Resource Exhaustion

<0:7.0.19-1.el9_4
  • H
CVE-2024-21386

<0:7.0.19-1.el9_4
  • H
Resource Exhaustion

<0:7.0.15-1.el9_3
  • H
Unprotected Alternate Channel

<0:7.0.15-1.el9_3
  • H
Improper Certificate Validation

<0:7.0.15-1.el9_3
  • M
CVE-2023-36558

<0:7.0.14-1.el9_3
  • M
Arbitrary Code Injection

<0:7.0.14-1.el9_3
  • H
Reversible One-Way Hash

<0:7.0.15-1.el9_3
  • H
Resource Exhaustion

<0:7.0.12-1.el9_2
  • H
Resource Exhaustion

<0:7.0.12-1.el9_2
  • H
Resource Exhaustion

<0:7.0.12-1.el9_2
  • H
Resource Exhaustion

<0:7.0.12-1.el9_2
  • M
Resource Exhaustion

<0:7.0.11-1.el9_2
  • M
Resource Exhaustion

<0:7.0.13-1.el9_2
  • M
Resource Exhaustion

<0:7.0.13-1.el9_2
  • M
Resource Exhaustion

<0:7.0.13-1.el9_2
  • H
Resource Exhaustion

<0:7.0.10-1.el9_2
  • H
Resource Exhaustion

<0:7.0.10-1.el9_2
  • H
Resource Exhaustion

<0:7.0.10-1.el9_2
  • H
Resource Exhaustion

<0:7.0.10-1.el9_2
  • H
CVE-2023-35390

<0:7.0.10-1.el9_2
  • H
CVE-2023-35390

<0:7.0.10-1.el9_2
  • H
CVE-2023-35390

<0:7.0.10-1.el9_2
  • H
CVE-2023-35390

<0:7.0.10-1.el9_2
  • H
Race Condition

<0:7.0.9-1.el9_2
  • H
Race Condition

<0:7.0.9-1.el9_2
  • H
Race Condition

<0:7.0.9-1.el9_2
  • H
Race Condition

<0:7.0.9-1.el9_2
  • H
CVE-2023-32032

<0:7.0.7-1.el9_2
  • H
CVE-2023-32032

<0:7.0.7-1.el9_2
  • H
CVE-2023-32032

<0:7.0.7-1.el9_2
  • H
CVE-2023-32032

<0:7.0.7-1.el9_2
  • H
CVE-2023-33128

<0:7.0.7-1.el9_2
  • H
CVE-2023-33128

<0:7.0.7-1.el9_2
  • H
CVE-2023-33128

<0:7.0.7-1.el9_2
  • H
CVE-2023-33128

<0:7.0.7-1.el9_2
  • H
CVE-2023-29337

<0:7.0.7-1.el9_2
  • H
CVE-2023-29337

<0:7.0.7-1.el9_2
  • H
CVE-2023-29337

<0:7.0.7-1.el9_2
  • H
CVE-2023-29337

<0:7.0.7-1.el9_2
  • H
CVE-2023-29331

<0:7.0.7-1.el9_2
  • H
CVE-2023-29331

<0:7.0.7-1.el9_2
  • H
CVE-2023-29331

<0:7.0.7-1.el9_2
  • H
CVE-2023-29331

<0:7.0.7-1.el9_2
  • H
CVE-2023-24936

<0:7.0.7-1.el9_2
  • H
CVE-2023-24936

<0:7.0.7-1.el9_2
  • H
CVE-2023-24936

<0:7.0.7-1.el9_2
  • H
CVE-2023-24936

<0:7.0.7-1.el9_2
  • M
Information Exposure Through Caching

<0:7.0.0-0.5.rc2.el9_1
  • M
Information Exposure Through Caching

<0:7.0.0-0.5.rc2.el9_1
  • M
Information Exposure Through Caching

<0:7.0.0-0.5.rc2.el9_1
  • M
Information Exposure Through Caching

<0:7.0.0-0.5.rc2.el9_1