Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
102 commits
Select commit Hold shift + click to select a range
2d2b81c
Publish Advisories
advisory-database[bot] Feb 17, 2026
f981753
Publish Advisories
advisory-database[bot] Feb 17, 2026
e4a343d
Publish Advisories
advisory-database[bot] Feb 17, 2026
f3339c0
Advisory Database Sync
advisory-database[bot] Feb 17, 2026
4fb15b5
Publish GHSA-x4c5-c7rf-jjgv
advisory-database[bot] Feb 17, 2026
a13e2ae
Publish Advisories
advisory-database[bot] Feb 17, 2026
fab046e
Publish Advisories
advisory-database[bot] Feb 17, 2026
535ca43
Publish Advisories
advisory-database[bot] Feb 17, 2026
8ae550c
Publish Advisories
advisory-database[bot] Feb 17, 2026
b1d7234
Publish Advisories
advisory-database[bot] Feb 17, 2026
0fc4c48
Publish GHSA-qw99-grcx-4pvm
advisory-database[bot] Feb 17, 2026
2169cb9
Publish Advisories
advisory-database[bot] Feb 17, 2026
2b4272d
Publish GHSA-hr7j-63v7-vj7g
advisory-database[bot] Feb 17, 2026
b45febd
Publish GHSA-64w3-5q9m-68xf
advisory-database[bot] Feb 17, 2026
a08849d
Publish GHSA-895x-rfqp-jh5c
advisory-database[bot] Feb 17, 2026
021d64b
Publish GHSA-4hx9-48xh-5mxr
advisory-database[bot] Feb 17, 2026
b028746
Publish GHSA-2g4f-4pwh-qvx6
advisory-database[bot] Feb 17, 2026
694d5e1
Advisory Database Sync
advisory-database[bot] Feb 17, 2026
abab9e9
Publish Advisories
advisory-database[bot] Feb 17, 2026
8bee4b5
Publish Advisories
advisory-database[bot] Feb 17, 2026
57363d6
Publish GHSA-fc3h-92p8-h36f
advisory-database[bot] Feb 17, 2026
46de19c
Publish Advisories
advisory-database[bot] Feb 17, 2026
fbb3692
Publish Advisories
advisory-database[bot] Feb 17, 2026
c21fb3b
Publish GHSA-ppfx-73j5-fhxc
advisory-database[bot] Feb 17, 2026
aef70ae
Publish GHSA-x4gp-pqpj-f43q
advisory-database[bot] Feb 17, 2026
5f78d37
Publish Advisories
advisory-database[bot] Feb 17, 2026
49ecfb1
Publish Advisories
advisory-database[bot] Feb 17, 2026
f835ce7
Publish Advisories
advisory-database[bot] Feb 17, 2026
42ec163
Advisory Database Sync
advisory-database[bot] Feb 17, 2026
cc1f14b
Publish Advisories
advisory-database[bot] Feb 17, 2026
d0c143e
Publish Advisories
advisory-database[bot] Feb 17, 2026
5e80a62
Publish Advisories
advisory-database[bot] Feb 17, 2026
6234aea
Publish GHSA-87r5-mp6g-5w5j
advisory-database[bot] Feb 17, 2026
d50ee2b
Publish GHSA-pjwm-rvh2-c87w
advisory-database[bot] Feb 17, 2026
18bef7e
Publish Advisories
advisory-database[bot] Feb 17, 2026
6b0d1aa
Publish Advisories
advisory-database[bot] Feb 17, 2026
2d536ff
Publish GHSA-chm2-m3w2-wcxm
advisory-database[bot] Feb 17, 2026
cf66382
Publish Advisories
advisory-database[bot] Feb 18, 2026
a0993d7
Publish GHSA-pv58-549p-qh99
advisory-database[bot] Feb 18, 2026
d3a1d62
Publish GHSA-g34w-4xqq-h79m
advisory-database[bot] Feb 18, 2026
4728411
Publish Advisories
advisory-database[bot] Feb 18, 2026
acf99cc
Publish Advisories
advisory-database[bot] Feb 18, 2026
676a0da
Publish Advisories
advisory-database[bot] Feb 18, 2026
4c83c82
Publish Advisories
advisory-database[bot] Feb 18, 2026
7203f64
Advisory Database Sync
advisory-database[bot] Feb 18, 2026
d6d6c97
Publish Advisories
advisory-database[bot] Feb 18, 2026
624ae4c
Publish Advisories
advisory-database[bot] Feb 18, 2026
0be8ae2
Improve GHSA-xfhx-r7ww-5995
maksim-m Feb 18, 2026
4ef3aa1
Publish Advisories
advisory-database[bot] Feb 18, 2026
0a0ba0f
Advisory Database Sync
advisory-database[bot] Feb 18, 2026
a70887b
Merge pull request #6956 from github/maksim-m-GHSA-xfhx-r7ww-5995
advisory-database[bot] Feb 18, 2026
5c0e07c
Publish GHSA-xfhx-r7ww-5995
advisory-database[bot] Feb 18, 2026
2e5cf78
Publish GHSA-43fc-jf86-j433
advisory-database[bot] Feb 18, 2026
0bb5d2b
Publish Advisories
advisory-database[bot] Feb 18, 2026
0083c7c
Publish Advisories
advisory-database[bot] Feb 18, 2026
175bf9c
Publish GHSA-jfv4-h8mc-jcp8
advisory-database[bot] Feb 18, 2026
600a0a3
Publish Advisories
advisory-database[bot] Feb 18, 2026
51aad82
Publish GHSA-6xw9-2p64-7622
advisory-database[bot] Feb 18, 2026
5b7321c
Advisory Database Sync
advisory-database[bot] Feb 18, 2026
67ec8ed
Advisory Database Sync
advisory-database[bot] Feb 18, 2026
c7b29b3
Publish Advisories
advisory-database[bot] Feb 18, 2026
c14bf0f
Publish Advisories
advisory-database[bot] Feb 18, 2026
2f7e08e
Publish GHSA-wx95-c6cv-8532
advisory-database[bot] Feb 18, 2026
41148b5
Publish Advisories
advisory-database[bot] Feb 18, 2026
b79537e
Publish Advisories
advisory-database[bot] Feb 18, 2026
81336c8
Publish Advisories
advisory-database[bot] Feb 18, 2026
799717c
Publish Advisories
advisory-database[bot] Feb 18, 2026
aa4d96d
Publish Advisories
advisory-database[bot] Feb 18, 2026
fe8107c
Publish Advisories
advisory-database[bot] Feb 18, 2026
44697e2
Publish Advisories
advisory-database[bot] Feb 18, 2026
f462145
Publish Advisories
advisory-database[bot] Feb 18, 2026
538d183
Publish Advisories
advisory-database[bot] Feb 18, 2026
32a17ae
Publish GHSA-pqqf-7hxm-rj5r
advisory-database[bot] Feb 18, 2026
089089d
Publish GHSA-2ww3-72rp-wpp4
advisory-database[bot] Feb 18, 2026
488a79e
Publish Advisories
advisory-database[bot] Feb 18, 2026
450add9
Publish Advisories
advisory-database[bot] Feb 18, 2026
0874b56
Publish Advisories
advisory-database[bot] Feb 18, 2026
76ad3dc
Publish Advisories
advisory-database[bot] Feb 18, 2026
9279da8
Publish Advisories
advisory-database[bot] Feb 18, 2026
6ea42f1
Advisory Database Sync
advisory-database[bot] Feb 19, 2026
618fadc
Publish Advisories
advisory-database[bot] Feb 19, 2026
ead68b2
Publish Advisories
advisory-database[bot] Feb 19, 2026
465ccbb
Publish Advisories
advisory-database[bot] Feb 19, 2026
33f1945
Publish Advisories
advisory-database[bot] Feb 19, 2026
20d53d5
Advisory Database Sync
advisory-database[bot] Feb 19, 2026
0de16c6
Advisory Database Sync
advisory-database[bot] Feb 19, 2026
3b3e802
Publish GHSA-9f29-v6mm-pw6w
advisory-database[bot] Feb 19, 2026
78f91be
Publish Advisories
advisory-database[bot] Feb 19, 2026
58c895b
Publish Advisories
advisory-database[bot] Feb 19, 2026
2649f9d
Publish Advisories
advisory-database[bot] Feb 19, 2026
de9540d
Publish Advisories
advisory-database[bot] Feb 19, 2026
2869df6
Publish GHSA-gq3j-xvxp-8hrf
advisory-database[bot] Feb 19, 2026
56cbd5f
Publish Advisories
advisory-database[bot] Feb 19, 2026
cc944bc
Publish Advisories
advisory-database[bot] Feb 19, 2026
bbedc4f
Publish Advisories
advisory-database[bot] Feb 19, 2026
8290b32
Publish Advisories
advisory-database[bot] Feb 19, 2026
a57d901
Publish Advisories
advisory-database[bot] Feb 19, 2026
d1b99fb
Publish GHSA-67pg-wm7f-q7fj
advisory-database[bot] Feb 19, 2026
24430b5
Publish GHSA-2xcx-75h9-vr9h
advisory-database[bot] Feb 19, 2026
1ac0f74
Publish Advisories
advisory-database[bot] Feb 19, 2026
760bb6b
Publish Advisories
advisory-database[bot] Feb 19, 2026
8b065cc
Advisory Database Sync
advisory-database[bot] Feb 19, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
Original file line number Diff line number Diff line change
@@ -1,9 +1,11 @@
{
"schema_version": "1.4.0",
"id": "GHSA-pjwm-rvh2-c87w",
"modified": "2023-07-28T15:38:48Z",
"modified": "2026-02-17T21:57:43Z",
"published": "2021-10-22T20:38:14Z",
"aliases": [],
"aliases": [
"CVE-2021-4229"
],
"summary": "Embedded malware in ua-parser-js",
"details": "The npm package `ua-parser-js` had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/faisalman/ua-parser-js/issues/536) for details as they unfold.\n\nAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.",
"severity": [
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-gx7g-wjxg-jwwj",
"modified": "2022-04-18T22:17:42Z",
"modified": "2026-02-18T23:33:34Z",
"published": "2022-04-04T00:00:55Z",
"aliases": [
"CVE-2022-0088"
Expand Down Expand Up @@ -52,6 +52,10 @@
"type": "WEB",
"url": "https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59"
},
{
"type": "WEB",
"url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2022-0088.md"
},
{
"type": "PACKAGE",
"url": "https://github.com/yourls/yourls"
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,112 @@
{
"schema_version": "1.4.0",
"id": "GHSA-236c-vhj4-gfxg",
"modified": "2026-02-17T21:40:20Z",
"published": "2022-05-25T00:00:31Z",
"withdrawn": "2026-02-17T21:40:20Z",
"aliases": [],
"summary": "Duplicate Advisory: Embedded malware in ua-parser-js",
"details": "### Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-pjwm-rvh2-c87w. This link is maintained to preserve external references.\n\n### Original Description\nA vulnerability was found in ua-parser-js 0.7.29/0.8.0/1.0.0. It has been rated as critical. This issue affects the crypto mining component which introduces a backdoor. Upgrading to version 0.7.30, 0.8.1 and 1.0.1 is able to address this issue. It is recommended to upgrade the affected component.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "ua-parser-js"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0.7.29"
},
{
"fixed": "0.7.30"
}
]
}
],
"versions": [
"0.7.29"
]
},
{
"package": {
"ecosystem": "npm",
"name": "ua-parser-js"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0.8.0"
},
{
"fixed": "0.8.1"
}
]
}
],
"versions": [
"0.8.0"
]
},
{
"package": {
"ecosystem": "npm",
"name": "ua-parser-js"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.0.1"
}
]
}
],
"versions": [
"1.0.0"
]
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4229"
},
{
"type": "WEB",
"url": "https://github.com/faisalman/ua-parser-js/issues/536"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-pjwm-rvh2-c87w"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.185453"
}
],
"database_specific": {
"cwe_ids": [
"CWE-829",
"CWE-912"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2026-02-17T21:40:20Z",
"nvd_published_at": "2022-05-24T16:15:00Z"
}
}
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-mg5h-rhjq-6v84",
"modified": "2022-11-01T20:35:47Z",
"modified": "2026-02-18T23:33:51Z",
"published": "2022-10-31T12:00:18Z",
"aliases": [
"CVE-2022-3766"
Expand Down Expand Up @@ -44,6 +44,10 @@
"type": "WEB",
"url": "https://github.com/thorsten/phpmyfaq/commit/c7904f2236c6c0dd64c2226b90c30af0f7e5a72d"
},
{
"type": "WEB",
"url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2022-3766.md"
},
{
"type": "PACKAGE",
"url": "https://github.com/thorsten/phpmyfaq"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-cp9c-phxx-55xm",
"modified": "2022-12-12T22:08:01Z",
"modified": "2026-02-18T23:34:01Z",
"published": "2022-12-11T15:30:45Z",
"aliases": [
"CVE-2022-4407"
Expand Down Expand Up @@ -44,6 +44,10 @@
"type": "WEB",
"url": "https://github.com/thorsten/phpmyfaq/commit/1d73af34bf42764f9f9491c7ba5e9495d70e3ca5"
},
{
"type": "WEB",
"url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2022-4407.md"
},
{
"type": "PACKAGE",
"url": "https://github.com/thorsten/phpmyfaq"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,19 @@
{
"schema_version": "1.4.0",
"id": "GHSA-qjm7-55vv-3c5f",
"modified": "2023-01-20T23:35:16Z",
"modified": "2026-02-17T22:04:14Z",
"published": "2023-01-18T03:31:17Z",
"aliases": [
"CVE-2018-25077"
],
"summary": "mel-spintax has Inefficient Regular Expression Complexity",
"details": "A vulnerability was found in melnaron mel-spintax. It has been rated as problematic. Affected by this issue is some unknown functionality of the file `lib/spintax.js`. The manipulation of the argument text leads to inefficient regular expression complexity. The name of the patch is 37767617846e27b87b63004e30216e8f919637d3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218456.",
"severity": [],
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
}
],
"affected": [
{
"package": {
Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,19 @@
{
"schema_version": "1.4.0",
"id": "GHSA-vm74-j4wq-82xj",
"modified": "2024-03-01T14:28:55Z",
"modified": "2026-02-17T22:04:50Z",
"published": "2023-01-17T21:30:22Z",
"aliases": [
"CVE-2022-4891"
],
"summary": "Sisimai Inefficient Regular Expression Complexity vulnerability",
"details": "A vulnerability has been found in Sisimai up to 4.25.14p11 and classified as problematic. This vulnerability affects the function `to_plain` of the file `lib/sisimai/string.rb`. The manipulation leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. Upgrading to version 4.25.14p12 is able to address this issue. The name of the patch is 51fe2e6521c9c02b421b383943dc9e4bbbe65d4e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218452.",
"severity": [],
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
}
],
"affected": [
{
"package": {
Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,19 @@
{
"schema_version": "1.4.0",
"id": "GHSA-g74q-5xw3-j7q9",
"modified": "2024-03-19T18:00:01Z",
"modified": "2026-02-17T22:01:33Z",
"published": "2024-02-13T19:49:43Z",
"aliases": [
"CVE-2024-21386"
],
"summary": "Microsoft Security Advisory CVE-2024-21386: .NET Denial of Service Vulnerability",
"details": "# Microsoft Security Advisory CVE-2024-21386: .NET Denial of Service Vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in ASP.NET 6.0, ASP.NET 7.0 and, ASP.NET 8.0 . This advisory also provides guidance on what developers can do to update their applications to address this vulnerability.\n\nA vulnerability exists in ASP.NET applications using SignalR where a malicious client can result in a denial-of-service.\n\n\n## Announcement\n\nAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/295\n\n### Mitigation factors\n\nMicrosoft has not identified any mitigating factors for this vulnerability.\n\n## Affected software\n\n* Any .NET 6.0 application running on .NET 6.0.26 or earlier.\n* Any .NET 7.0 application running on .NET 7.0.15 or earlier.\n* Any .NET 8.0 application running on .NET 8.0.1 or earlier.\n\n## Affected Packages\nThe vulnerability affects any Microsoft .NET Core project if it uses any of affected packages versions listed below\n\n### ASP.NET 6.0\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.AspNetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-x64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-x64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-arm64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-x64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | <= 6.0.26 | 6.0.27\n\n\n\n### ASP.NET 7.0\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.AspNetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-x64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-x64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-arm64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-x64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | <= 7.0.15 | 7.0.16\n\n### ASP.NET 8.0\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.AspNetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-x64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-x64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-arm64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-x64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | <= 8.0.1 | 8.0.2\n\n## Advisory FAQ\n\n### How do I know if I am affected?\n\nIf you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software) or [affected packages](#affected-packages) , you're exposed to the vulnerability.\n\n### How do I fix the issue?\n\n* To fix the issue please install the latest version of .NET 8.0 or .NET 7.0 or .NET 6.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.\n* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;\n\n```\n.NET Core SDK (reflecting any global.json):\n\n Version: 6.0.200\n Commit: 8473146e7d\n\nRuntime Environment:\n\n OS Name: Windows\n OS Version: 10.0.18363\n OS Platform: Windows\n RID: win10-x64\n Base Path: C:\\Program Files\\dotnet\\sdk\\6.0.300\\\n\nHost (useful for support):\n\n Version: 6.0.5\n Commit: 8473146e7d\n\n.NET Core SDKs installed:\n\n 6.0.200 [C:\\Program Files\\dotnet\\sdk]\n\n.NET Core runtimes installed:\n\n Microsoft.AspNetCore.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Microsoft.AspNetCore.App]\n Microsoft.NETCore.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Microsoft.NETCore.App]\n Microsoft.WindowsDesktop.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Microsoft.WindowsDesktop.App]\n\nTo install additional .NET Core runtimes or SDKs:\n https://aka.ms/dotnet-download\n```\n\n* If you're using .NET 8.0, you should download and install .NET 8.0.2 Runtime or .NET 8.0.102 SDK (for Visual Studio 2022 v17.8) from https://dotnet.microsoft.com/download/dotnet-core/8.0.\n* If you're using .NET 7.0, you should download and install Runtime 7.0.16 or SDK 7.0.116 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.\n* If you're using .NET 6.0, you should download and install Runtime 6.0.27 or SDK 6.0.419 from https://dotnet.microsoft.com/download/dotnet-core/6.0.\n\n.NET 6.0, .NET 7.0 and, .NET 8.0 updates are also available from Microsoft Update. To access this either type \"Check for updates\" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.\n\nOnce you have installed the updated runtime or SDK, restart your apps for the update to take effect.\n\nAdditionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.\n\n## Other Information\n\n### Reporting Security Issues\n\nIf you have found a potential security issue in .NET 8.0 or .NET 7.0 or .NET 6.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.\n\n### Support\n\nYou can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.\n\n### Disclaimer\n\nThe information provided in this advisory is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.\n\n### External Links\n\n[CVE-2024-21386]( https://www.cve.org/CVERecord?id=CVE-2024-21386)\n\n### Revisions\n\nV1.0 (February 13, 2024): Advisory published.\n\n_Version 1.0_\n\n_Last Updated 2024-02-13_",
"severity": [],
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"affected": [
{
"package": {
Expand Down Expand Up @@ -822,8 +827,10 @@
}
],
"database_specific": {
"cwe_ids": [],
"severity": "CRITICAL",
"cwe_ids": [
"CWE-400"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2024-02-13T19:49:43Z",
"nvd_published_at": null
Expand Down
Loading
Loading