Microsoft .NET 3.1/5.0 denial of service [CVE-2021-31957]

A vulnerability was found in Microsoft .NET 3.1/5.0. It has been classified as problematic. Affected is an unknown code block. Applying a patch is able to eliminate this problem. A possible mitigation has been published immediately after the disclosure of the vulnerability.

Description

A denial of service vulnerability exists when ASP.NET Core improperly handles client disconnect.

Affected software

  • Any .NET 5.0 application running on .NET 5.0.6 or lower
  • Any .NET Core 3.1 application running on .NET Core 3.1.15 or lower

Common Vulnerability Scoring System Score Details

  1. http://preferredmode.com/tag/sunday-funday/ CVSS v3 Vector:  CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  2. March CVSS v3 Base Score:    5.9
  3. Attack Vector:  Network
  4. Attack Complexity:      High
  5. Availability Impact:      High

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2023-5288 : SICK SIM1012 Access Control

CVE-2023-5288 : SICK SIM1012 Access Control

Description A remote unauthorized attacker may connect to the SIM1012, interact with the device and change configuration settings. The adversary

CVE-2023-44466 : Linux Kernel up to 6.4.4 Ceph File System net/ceph/messenger_v2.c Buffer Overflow

CVE-2023-44466 : Linux Kernel up to 6.4.4 Ceph File System net/ceph/messenger_v2.c Buffer Overflow

Description An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading

CVE-2023-20252 : CISCO CATALYST SD-WAN MANAGER SAML API IMPROPER AUTHENTICATION

CVE-2023-20252 : CISCO CATALYST SD-WAN MANAGER SAML API IMPROPER AUTHENTICATION

Description A vulnerability in the Security Assertion Markup Language (SAML) APIs of Cisco Catalyst SD-WAN Manager Software could allow an