dotnet-sdk-8.0-source-built-artifacts vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the dotnet-sdk-8.0-source-built-artifacts package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
HTTP Request Smuggling

<0:8.0.121-1.el9_4
  • H
Cleartext Transmission of Sensitive Information

<0:8.0.121-1.el9_4
  • H
Insecure Temporary File

<0:8.0.121-1.el9_4
  • H
HTTP Request Smuggling

<0:8.0.121-1.el9_4
  • H
Cleartext Transmission of Sensitive Information

<0:8.0.121-1.el9_4
  • H
Insecure Temporary File

<0:8.0.121-1.el9_4
  • H
HTTP Request Smuggling

<0:8.0.121-1.el9_4
  • H
Cleartext Transmission of Sensitive Information

<0:8.0.121-1.el9_4
  • H
Insecure Temporary File

<0:8.0.121-1.el9_4
  • H
Insecure Temporary File

<0:8.0.121-1.el9_6
  • H
HTTP Request Smuggling

<0:8.0.121-1.el9_6
  • H
HTTP Request Smuggling

<0:8.0.121-1.el9_6
  • H
Cleartext Transmission of Sensitive Information

<0:8.0.121-1.el9_6
  • H
Insecure Temporary File

<0:8.0.121-1.el9_6
  • H
HTTP Request Smuggling

<0:8.0.121-1.el9_6
  • H
Cleartext Transmission of Sensitive Information

<0:8.0.121-1.el9_6
  • H
Insecure Temporary File

<0:8.0.121-1.el9_6
  • H
HTTP Request Smuggling

<0:8.0.121-1.el9_6
  • H
Cleartext Transmission of Sensitive Information

<0:8.0.121-1.el9_6
  • H
Insecure Temporary File

<0:8.0.121-1.el9_6
  • H
HTTP Request Smuggling

<0:8.0.121-1.el9_6
  • H
Cleartext Transmission of Sensitive Information

<0:8.0.121-1.el9_6
  • H
Insecure Temporary File

<0:8.0.121-1.el9_6
  • H
HTTP Request Smuggling

<0:8.0.121-1.el9_6
  • H
Cleartext Transmission of Sensitive Information

<0:8.0.121-1.el9_6
  • H
Insecure Temporary File

<0:8.0.121-1.el9_6
  • H
Cleartext Transmission of Sensitive Information

<0:8.0.121-1.el9_6
  • H
Uncontrolled Search Path Element

<0:8.0.117-1.el9_6
  • H
Improper Privilege Management

<0:8.0.114-1.el9_5
  • H
Uncontrolled Search Path Element

<0:8.0.117-1.el9_6
  • H
Uncontrolled Search Path Element

<0:8.0.117-1.el9_6
  • H
Authentication Bypass

<0:8.0.116-1.el9_6
  • H
Uncontrolled Search Path Element

<0:8.0.117-1.el9_6
  • H
Authentication Bypass

<0:8.0.116-1.el9_6
  • H
Authentication Bypass

<0:8.0.116-1.el9_6
  • H
Authentication Bypass

<0:8.0.116-1.el9_6
  • H
Improper Privilege Management

<0:8.0.114-1.el9_5
  • H
Improper Privilege Management

<0:8.0.114-1.el9_5
  • H
Improper Privilege Management

<0:8.0.114-1.el9_5
  • M
Resource Exhaustion

<0:8.0.103-2.el9_3
  • M
Resource Exhaustion

<0:8.0.103-2.el9_3
  • M
Resource Exhaustion

<0:8.0.103-2.el9_3
  • M
CVE-2023-36558

<0:8.0.100-2.el9_3
  • M
Arbitrary Code Injection

<0:8.0.100-2.el9_3
  • H
Resource Exhaustion

<0:8.0.101-1.el9_3
  • H
Improper Certificate Validation

<0:8.0.101-1.el9_3
  • H
Unprotected Alternate Channel

<0:8.0.101-1.el9_3
  • M
CVE-2023-36558

<0:8.0.100-2.el9_3
  • M
Arbitrary Code Injection

<0:8.0.100-2.el9_3
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Use After Free

<0:8.0.110-1.el9_4
  • H
Resource Exhaustion

<0:8.0.101-1.el9_3
  • H
Improper Certificate Validation

<0:8.0.101-1.el9_3
  • H
Unprotected Alternate Channel

<0:8.0.101-1.el9_3
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Use After Free

<0:8.0.110-1.el9_4
  • M
Information Exposure

<0:8.0.108-1.el9_4
  • M
CVE-2023-36558

<0:8.0.100-2.el9_3
  • M
Arbitrary Code Injection

<0:8.0.100-2.el9_3
  • H
Resource Exhaustion

<0:8.0.101-1.el9_3
  • H
Improper Certificate Validation

<0:8.0.101-1.el9_3
  • H
Unprotected Alternate Channel

<0:8.0.101-1.el9_3
  • M
Information Exposure

<0:8.0.108-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Use After Free

<0:8.0.110-1.el9_4
  • H
CVE-2024-38095

<0:8.0.107-1.el9_4
  • H
CVE-2024-35264

<0:8.0.107-1.el9_4
  • H
CVE-2024-30105

<0:8.0.107-1.el9_4
  • H
CVE-2024-38095

<0:8.0.107-1.el9_4
  • H
CVE-2024-35264

<0:8.0.107-1.el9_4
  • H
CVE-2024-30105

<0:8.0.107-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Use After Free

<0:8.0.110-1.el9_4
  • H
Deadlock

<0:8.0.105-1.el9_4
  • H
Out-of-Bounds

<0:8.0.105-1.el9_4
  • H
CVE-2024-38095

<0:8.0.107-1.el9_4
  • H
CVE-2024-35264

<0:8.0.107-1.el9_4
  • H
CVE-2024-30105

<0:8.0.107-1.el9_4
  • H
CVE-2024-38095

<0:8.0.107-1.el9_4
  • H
CVE-2024-35264

<0:8.0.107-1.el9_4
  • H
CVE-2024-30105

<0:8.0.107-1.el9_4
  • H
Deadlock

<0:8.0.105-1.el9_4
  • H
Out-of-Bounds

<0:8.0.105-1.el9_4
  • M
Information Exposure

<0:8.0.108-1.el9_4
  • M
Information Exposure

<0:8.0.108-1.el9_4
  • H
Deadlock

<0:8.0.105-1.el9_4
  • H
Out-of-Bounds

<0:8.0.105-1.el9_4
  • H
Deadlock

<0:8.0.105-1.el9_4
  • H
Out-of-Bounds

<0:8.0.105-1.el9_4
  • M
Resource Exhaustion

<0:8.0.103-2.el9_3
  • M
Resource Exhaustion

<0:8.0.103-2.el9_3
  • M
Resource Exhaustion

<0:8.0.103-2.el9_3
  • H
Resource Exhaustion

<0:8.0.101-1.el9_3
  • H
Improper Certificate Validation

<0:8.0.101-1.el9_3
  • H
Unprotected Alternate Channel

<0:8.0.101-1.el9_3
  • H
Resource Exhaustion

<0:8.0.102-2.el9_3
  • H
CVE-2024-21386

<0:8.0.102-2.el9_3
  • M
Resource Exhaustion

<0:8.0.103-2.el9_3
  • H
Resource Exhaustion

<0:8.0.102-2.el9_3
  • H
CVE-2024-21386

<0:8.0.102-2.el9_3
  • M
CVE-2023-36558

<0:8.0.100-2.el9_3
  • M
Arbitrary Code Injection

<0:8.0.100-2.el9_3
  • H
Resource Exhaustion

<0:8.0.102-2.el9_3
  • H
CVE-2024-21386

<0:8.0.102-2.el9_3
  • H
Resource Exhaustion

<0:8.0.101-1.el9_3
  • H
Improper Certificate Validation

<0:8.0.101-1.el9_3
  • H
Unprotected Alternate Channel

<0:8.0.101-1.el9_3
  • H
Resource Exhaustion

<0:8.0.102-2.el9_3
  • H
CVE-2024-21386

<0:8.0.102-2.el9_3
  • M
CVE-2023-36558

<0:8.0.100-2.el9_3
  • M
Arbitrary Code Injection

<0:8.0.100-2.el9_3
  • H
Resource Exhaustion

<0:8.0.101-1.el9_3
  • H
Improper Certificate Validation

<0:8.0.101-1.el9_3
  • H
Unprotected Alternate Channel

<0:8.0.101-1.el9_3
  • M
CVE-2023-36558

<0:8.0.100-2.el9_3
  • M
Arbitrary Code Injection

<0:8.0.100-2.el9_3
  • M
CVE-2023-36558

<0:8.0.100-2.el9_3
  • M
Arbitrary Code Injection

<0:8.0.100-2.el9_3
  • H
Resource Exhaustion

<0:8.0.101-1.el9_3
  • H
Improper Certificate Validation

<0:8.0.101-1.el9_3
  • H
Unprotected Alternate Channel

<0:8.0.101-1.el9_3
  • H
Buffer Over-read

<0:8.0.112-1.el9_5
  • H
Creation of Temporary File in Directory with Incorrect Permissions

<0:8.0.112-1.el9_5
  • H
Heap-based Buffer Overflow

<0:8.0.112-1.el9_5
  • H
Cross-site Scripting (XSS)

<0:8.0.112-1.el9_5
  • H
Buffer Over-read

<0:8.0.112-1.el9_5
  • H
Creation of Temporary File in Directory with Incorrect Permissions

<0:8.0.112-1.el9_5
  • H
Heap-based Buffer Overflow

<0:8.0.112-1.el9_5
  • H
Cross-site Scripting (XSS)

<0:8.0.112-1.el9_5
  • H
Buffer Over-read

<0:8.0.112-1.el9_5
  • H
Creation of Temporary File in Directory with Incorrect Permissions

<0:8.0.112-1.el9_5
  • H
Heap-based Buffer Overflow

<0:8.0.112-1.el9_5
  • H
Cross-site Scripting (XSS)

<0:8.0.112-1.el9_5
  • H
Buffer Over-read

<0:8.0.112-1.el9_5
  • H
Creation of Temporary File in Directory with Incorrect Permissions

<0:8.0.112-1.el9_5
  • H
Heap-based Buffer Overflow

<0:8.0.112-1.el9_5
  • H
Cross-site Scripting (XSS)

<0:8.0.112-1.el9_5
  • H
Resource Exhaustion

<0:8.0.100~rc.2-0.1.el9_3
  • H
Resource Exhaustion

<0:8.0.100~rc.2-0.1.el9_3
  • H
Resource Exhaustion

<0:8.0.100~rc.2-0.1.el9_3
  • H
Resource Exhaustion

<0:8.0.100~rc.2-0.1.el9_3
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Use After Free

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Use After Free

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Use After Free

<0:8.0.110-1.el9_4
  • H
Uncontrolled Search Path Element

<0:8.0.117-1.el9_4
  • H
Uncontrolled Search Path Element

<0:8.0.117-1.el9_4
  • H
Uncontrolled Search Path Element

<0:8.0.117-1.el9_4
  • H
Deadlock

<0:8.0.105-1.el9_4
  • H
Out-of-Bounds

<0:8.0.105-1.el9_4
  • H
Deadlock

<0:8.0.105-1.el9_4
  • H
Out-of-Bounds

<0:8.0.105-1.el9_4
  • H
Deadlock

<0:8.0.105-1.el9_4
  • H
Out-of-Bounds

<0:8.0.105-1.el9_4
  • H
Uncontrolled Search Path Element

<0:8.0.117-1.el9_6
  • H
Uncontrolled Search Path Element

<0:8.0.117-1.el9_6
  • H
Authentication Bypass

<0:8.0.116-1.el9_4
  • H
Authentication Bypass

<0:8.0.116-1.el9_6
  • H
Authentication Bypass

<0:8.0.116-1.el9_4
  • H
Authentication Bypass

<0:8.0.116-1.el9_4
  • H
Authentication Bypass

<0:8.0.116-1.el9_6
  • H
Cross-site Scripting (XSS)

<0:8.0.112-1.el9_5
  • H
Buffer Over-read

<0:8.0.112-1.el9_4
  • H
Creation of Temporary File in Directory with Incorrect Permissions

<0:8.0.112-1.el9_4
  • H
Heap-based Buffer Overflow

<0:8.0.112-1.el9_4
  • H
Buffer Over-read

<0:8.0.112-1.el9_4
  • H
Creation of Temporary File in Directory with Incorrect Permissions

<0:8.0.112-1.el9_4
  • H
Heap-based Buffer Overflow

<0:8.0.112-1.el9_4
  • H
CVE-2024-38095

<0:8.0.107-1.el9_4
  • H
CVE-2024-35264

<0:8.0.107-1.el9_4
  • H
CVE-2024-30105

<0:8.0.107-1.el9_4
  • H
CVE-2024-38095

<0:8.0.107-1.el9_4
  • H
CVE-2024-35264

<0:8.0.107-1.el9_4
  • H
CVE-2024-30105

<0:8.0.107-1.el9_4
  • M
Information Exposure

<0:8.0.108-1.el9_4
  • M
Information Exposure

<0:8.0.108-1.el9_4
  • M
Information Exposure

<0:8.0.108-1.el9_4
  • H
CVE-2024-38095

<0:8.0.107-1.el9_4
  • H
CVE-2024-35264

<0:8.0.107-1.el9_4
  • H
CVE-2024-30105

<0:8.0.107-1.el9_4
  • H
Resource Exhaustion

<0:8.0.102-2.el9_3
  • H
CVE-2024-21386

<0:8.0.102-2.el9_3
  • H
Resource Exhaustion

<0:8.0.102-2.el9_3
  • H
CVE-2024-21386

<0:8.0.102-2.el9_3
  • H
Resource Exhaustion

<0:8.0.102-2.el9_3
  • H
CVE-2024-21386

<0:8.0.102-2.el9_3
  • H
Improper Privilege Management

<0:8.0.114-1.el9_5
  • H
Improper Privilege Management

<0:8.0.114-1.el9_4
  • H
Improper Privilege Management

<0:8.0.114-1.el9_4
  • H
Improper Privilege Management

<0:8.0.114-1.el9_4
  • H
Improper Privilege Management

<0:8.0.114-1.el9_5
  • H
Buffer Over-read

<0:8.0.112-1.el9_5
  • H
Creation of Temporary File in Directory with Incorrect Permissions

<0:8.0.112-1.el9_5
  • H
Heap-based Buffer Overflow

<0:8.0.112-1.el9_5
  • H
Resource Exhaustion

<0:8.0.100~rc.2-0.1.el9_3
  • H
Resource Exhaustion

<0:8.0.100~rc.2-0.1.el9_3
  • H
Resource Exhaustion

<0:8.0.100~rc.2-0.1.el9_3
  • H
Cross-site Scripting (XSS)

<0:8.0.112-1.el9_5
  • H
Buffer Over-read

<0:8.0.112-1.el9_4
  • H
Creation of Temporary File in Directory with Incorrect Permissions

<0:8.0.112-1.el9_4
  • H
Heap-based Buffer Overflow

<0:8.0.112-1.el9_4
  • H
Heap-based Buffer Overflow

<0:8.0.112-1.el9_5
  • H
Creation of Temporary File in Directory with Incorrect Permissions

<0:8.0.112-1.el9_5
  • H
Buffer Over-read

<0:8.0.112-1.el9_5
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Use After Free

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Algorithmic Complexity

<0:8.0.110-1.el9_4
  • H
Use After Free

<0:8.0.110-1.el9_4
  • H
CVE-2024-38095

<0:8.0.107-1.el9_4
  • H
CVE-2024-35264

<0:8.0.107-1.el9_4
  • H
CVE-2024-30105

<0:8.0.107-1.el9_4
  • M
Information Exposure

<0:8.0.108-1.el9_4
  • H
Resource Exhaustion

<0:8.0.102-2.el9_3
  • H
CVE-2024-21386

<0:8.0.102-2.el9_3
  • H
Deadlock

<0:8.0.105-1.el9_4
  • H
Out-of-Bounds

<0:8.0.105-1.el9_4
  • M
Resource Exhaustion

<0:8.0.103-2.el9_3
  • H
Resource Exhaustion

<0:8.0.101-1.el9_3
  • H
Improper Certificate Validation

<0:8.0.101-1.el9_3
  • H
Unprotected Alternate Channel

<0:8.0.101-1.el9_3
  • M
CVE-2023-36558

<0:8.0.100-2.el9_3
  • M
Arbitrary Code Injection

<0:8.0.100-2.el9_3
  • H
Resource Exhaustion

<0:8.0.100~rc.2-0.1.el9_3
  • M
Information Exposure

<0:8.0.108-1.el9_4
  • H
CVE-2024-38095

<0:8.0.107-1.el9_4
  • H
CVE-2024-35264

<0:8.0.107-1.el9_4
  • H
CVE-2024-30105

<0:8.0.107-1.el9_4
  • M
NULL Pointer Dereference

*
  • H
Deadlock

<0:8.0.105-1.el9_4
  • H
Out-of-Bounds

<0:8.0.105-1.el9_4
  • M
Resource Exhaustion

<0:8.0.103-2.el9_3
  • H
CVE-2024-21386

<0:8.0.102-2.el9_3
  • H
Resource Exhaustion

<0:8.0.102-2.el9_3
  • H
Resource Exhaustion

<0:8.0.101-1.el9_3
  • H
Unprotected Alternate Channel

<0:8.0.101-1.el9_3
  • H
Improper Certificate Validation

<0:8.0.101-1.el9_3
  • M
CVE-2023-36558

<0:8.0.100-2.el9_3
  • M
Arbitrary Code Injection

<0:8.0.100-2.el9_3
  • H
Resource Exhaustion

<0:8.0.100~rc.2-0.1.el9_3