Page 13 of 66 results (0.028 seconds)

CVSS: 7.5EPSS: 9%CPEs: 6EXPL: 0

Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1 allows remote attackers to read arbitrary files via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, aka ".NET Information Disclosure Vulnerability." Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6 y 4.6.1 permite a atacantes remotos leer archivos arbitrario a través de datos XML que contienen una declaración de entidad externa en conjunción con una referencia a entidad, relacionado con un caso XML External Entity (XXE), también conocida como ".NET Information Disclosure Vulnerability". • http://www.securityfocus.com/bid/91601 http://www.securitytracker.com/id/1036291 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-091 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.9EPSS: 0%CPEs: 7EXPL: 0

Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1 allows man-in-the-middle attackers to obtain sensitive cleartext information via vectors involving injection of cleartext data into the client-server data stream, aka "TLS/SSL Information Disclosure Vulnerability." Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6 y 4.6.1 permite a atacantes man-in-the-middle obtener información sensible en texto plano a través de vectores que implican la inyección de datos en texto claro en el flujo de datos cliente-servidor, también conocido como "TLS/SSL Information Disclosure Vulnerability". • http://www.securityfocus.com/bid/90026 http://www.securitytracker.com/id/1035842 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-065 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 8%CPEs: 2EXPL: 0

Microsoft .NET Framework 4.6 and 4.6.1 mishandles library loading, which allows local users to gain privileges via a crafted application, aka ".NET Framework Remote Code Execution Vulnerability." Microsoft .NET Framework 4.6 y 4.6.1 no maneja correctamente la carga de librerías, lo que permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocida como ".NET Framework Remote Code Execution Vulnerability". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft .NET Framework. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page or open a malicious directory or device. The specific flaw exists within the handling of a specific named DLL used by .NET Framework. By providing a directory with this specific DLL, an attacker is able to force the process to load an arbitrary DLL. • http://packetstormsecurity.com/files/136671/.NET-Framework-4.6-DLL-Hijacking.html http://seclists.org/fulldisclosure/2016/Apr/42 http://www.securityfocus.com/archive/1/538063/100/0/threaded http://www.securitytracker.com/id/1035535 http://www.zerodayinitiative.com/advisories/ZDI-16-234 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-041 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 1%CPEs: 7EXPL: 0

Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1 mishandles signature validation for unspecified elements of XML documents, which allows remote attackers to spoof signatures via a modified document, aka ".NET XML Validation Security Feature Bypass." Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, y 4.6.1 no maneja correctamente la validación de firma para elementos no especificados de documentos XML, lo que permite a atacantes remotos suplantar firmas a través de un documento manipulado, también conocido como ".NET XML Validation Security Feature Bypass". • http://www.securityfocus.com/bid/84075 http://www.securitytracker.com/id/1035213 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-035 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 93%CPEs: 6EXPL: 0

Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1 does not prevent recursive compilation of XSLT transforms, which allows remote attackers to cause a denial of service (performance degradation) via crafted XSLT data, aka ".NET Framework Stack Overflow Denial of Service Vulnerability." Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6 y 4.6.1 no impide la compilación recursiva de transformaciones XSLT, lo que permite a atacantes remotos causar una denegación de servicio (degradación de rendimiento) a través de datos XSLT manipulados, también conocida como ".NET Framework Stack Overflow Denial of Service Vulnerability". • http://www.securitytracker.com/id/1034983 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-019 • CWE-94: Improper Control of Generation of Code ('Code Injection') •