Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft .net 8.0.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-36558
ASP.NET Core - Security Feature Bypass Vulnerability
Microsoft Visual Studio 2022
Microsoft .net 8.0.0
Microsoft .net
Microsoft Asp.net Core 8.0.0
Microsoft Asp.net Core
NA
CVE-2023-36049
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
Microsoft .net Framework 2.0
Microsoft .net Framework 3.0
Microsoft .net Framework 3.5
Microsoft .net Framework 4.6.2
Microsoft .net Framework 4.7
Microsoft .net Framework 4.7.1
Microsoft .net Framework 4.7.2
Microsoft .net Framework 4.8
Microsoft .net Framework 4.8.1
Microsoft .net Framework 3.5.1
Microsoft .net 8.0.0
Microsoft .net
Microsoft Visual Studio 2022
NA
CVE-2024-0057
NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability
Microsoft Visual Studio 2022
Microsoft Powershell
Microsoft Powershell 7.4
Microsoft .net Framework
Microsoft .net Framework 4.6.2
Microsoft .net Framework 4.7
Microsoft .net Framework 4.7.1
Microsoft .net Framework 4.7.2
Microsoft .net Framework 3.5
Microsoft .net Framework 4.8.1
Microsoft .net Framework 2.0
Microsoft .net Framework 3.0
Microsoft .net
Microsoft .net 8.0.0
NA
CVE-2024-0056
Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability
Microsoft Sql Server 2022
Microsoft Visual Studio 2022
Microsoft Microsoft.data.sqlclient
Microsoft System.data.sqlclient
Microsoft .net Framework
Microsoft .net Framework 4.6.2
Microsoft .net Framework 4.7
Microsoft .net Framework 4.7.1
Microsoft .net Framework 4.7.2
Microsoft .net Framework 3.5
Microsoft .net Framework 4.8.1
Microsoft .net Framework 2.0
Microsoft .net
Microsoft .net 8.0.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started