Uncontrolled Recursion Affecting dotnet-host package, versions *


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.46% (64th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL9-DOTNETHOST-8187309
  • published20 Nov 2025
  • disclosed14 Oct 2024

Introduced: 14 Oct 2024

CVE-2024-47831  (opens in a new tab)
CWE-674  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:9 dotnet-host.

NVD Description

Note: Versions mentioned in the description apply only to the upstream dotnet-host package and not the dotnet-host package as distributed by RHEL. See How to fix? for RHEL:9 relevant fixed versions and status.

Next.js is a React Framework for the Web. Cersions on the 10.x, 11.x, 12.x, 13.x, and 14.x branches before version 14.2.7 contain a vulnerability in the image optimization feature which allows for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption. Neither the next.config.js file that is configured with images.unoptimized set to true or images.loader set to a non-default value nor the Next.js application that is hosted on Vercel are affected. This issue was fully patched in Next.js 14.2.7. As a workaround, ensure that the next.config.js file has either images.unoptimized, images.loader or images.loaderFile assigned.

CVSS Base Scores

version 3.1