Tag
#ASP.NET
**How could an attacker exploit this vulnerability?** This vulnerability could be exploited if http requests to .NET 8 RC 1 running on IIS InProcess hosting model are cancelled. Threads counts would increase and an OutOfMemoryException is possible.
**What kind of security feature could be bypassed by successfully exploiting this vulnerability?** An unauthenticated attacker could bypass validations on Blazor Server forms.
**What kind of security feature could be bypassed by successfully exploiting this vulnerability?** The attacker would be able to bypass the security checks that prevents an attacker from accessing internal applications in a website.
**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** The target environment could be accidentally configured to allow the vulnerability.
**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** The target environment could be accidentally configured to allow the vulnerability.