{"containers":{"cna":{"title":"ASP.NET Core Denial of Service Vulnerability","datePublic":"2021-06-08T07:00:00.000Z","affected":[{"vendor":"Microsoft","product":"Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)","cpes":["cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*"],"platforms":["Unknown"],"versions":[{"version":"16.0","lessThan":"16.4.23","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)","cpes":["cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*"],"platforms":["Unknown"],"versions":[{"version":"16.0.0","lessThan":"16.7.16","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)","cpes":["cpe:2.3:a:microsoft:visual_studio_2019:16.9:*:*:*:*:*:*:*"],"platforms":["Unknown"],"versions":[{"version":"15.0.0","lessThan":"16.9.7","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft Visual Studio 2019 version 16.10 (includes 16.0 - 16.9)","cpes":["cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*"],"platforms":["Unknown"],"versions":[{"version":"16.10.0","lessThan":"16.10.1","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Visual Studio 2019 for Mac version 8.10","cpes":["cpe:2.3:a:microsoft:visual_studio_2019:8.10:*:*:*:*:macos:*:*"],"platforms":["Unknown"],"versions":[{"version":"8.1.0","lessThan":"8.10.1","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":".NET Core 3.1","cpes":["cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*"],"platforms":["Unknown"],"versions":[{"version":"3.1","lessThan":"3.1.16","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":".NET 5.0","cpes":["cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*"],"platforms":["Unknown"],"versions":[{"version":"5.0.0","lessThan":"5.0.7","versionType":"custom","status":"affected"}]}],"descriptions":[{"value":"ASP.NET Core Denial of Service Vulnerability","lang":"en-US"}],"problemTypes":[{"descriptions":[{"description":"Denial of Service","lang":"en-US","type":"Impact"}]}],"providerMetadata":{"orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft","dateUpdated":"2024-05-29T14:55:32.372Z"},"references":[{"tags":["x_refsource_MISC"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31957"},{"name":"FEDORA-2021-4b3fc547fe","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMHWHRRYDHKM6BIINW5V7OCSW4SDWB4W/"},{"name":"FEDORA-2021-cb4f3ab817","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4PRVVLXXQEF4SEJOBV3VRJHGX7YHY2CG/"},{"name":"FEDORA-2021-1e0e04958d","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VMAO4NG2OQ4PCXUQWMNSCMYWLIJJY6UY/"},{"name":"FEDORA-2021-e9c84e6d26","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVCDYIP4A6DDRT7G6P3ZW6PKNK2DNWJ2/"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseSeverity":"MEDIUM","baseScore":5.9,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T23:10:31.331Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31957"},{"name":"FEDORA-2021-4b3fc547fe","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMHWHRRYDHKM6BIINW5V7OCSW4SDWB4W/"},{"name":"FEDORA-2021-cb4f3ab817","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4PRVVLXXQEF4SEJOBV3VRJHGX7YHY2CG/"},{"name":"FEDORA-2021-1e0e04958d","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VMAO4NG2OQ4PCXUQWMNSCMYWLIJJY6UY/"},{"name":"FEDORA-2021-e9c84e6d26","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVCDYIP4A6DDRT7G6P3ZW6PKNK2DNWJ2/"}]}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2021-31957","datePublished":"2021-06-08T22:46:26.000Z","dateReserved":"2021-04-30T00:00:00.000Z","dateUpdated":"2024-08-03T23:10:31.331Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}