Page 3 of 22 results (0.008 seconds)

CVSS: 5.5EPSS: 0%CPEs: 60EXPL: 0

A security feature bypass vulnerability exists when Microsoft .NET Framework components do not correctly validate certificates, aka ".NET Framework Security Feature Bypass Vulnerability." This affects .NET Framework 4.7.2, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2, ASP.NET Core 1.1, Microsoft .NET Framework 4.5.2, ASP.NET Core 2.0, ASP.NET Core 1.0, .NET Core 1.1, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, .NET Core 1.0, .NET Core 2.0, Microsoft .NET Framework 4.6, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.1/4.7.2, Microsoft .NET Framework 4.7.2. Existe una vulnerabilidad de omisión de la característica de seguridad cuando los componentes de Microsoft .NET Framework no validan certificados correctamente. Esto también se conoce como ".NET Framework Security Feature Bypass Vulnerability". Esto afecta a .NET Framework 4.7.2; Microsoft .NET Framework 3.0; Microsoft .NET Framework 4.6.2, 4.7, 4.7.1, 4.7.2; ASP.NET Core 1.1; Microsoft .NET Framework 4.5.2; ASP.NET Core 2.0; ASP.NET Core 1.0; .NET Core 1.1; Microsoft .NET Framework 3.5; Microsoft .NET Framework 3.5.1; Microsoft .NET Framework 4.6, 4.6.1, 4.6.2; .NET Core 1.0; .NET Core 2.0; Microsoft .NET Framework 4.6; Microsoft .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.1, 4.7.2 y Microsoft .NET Framework 4.7.2. • http://www.securityfocus.com/bid/104664 http://www.securitytracker.com/id/1041257 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8356 • CWE-295: Improper Certificate Validation •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

A Security Feature Bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated, aka "ASP.NET Security Feature Bypass Vulnerability." This affects ASP.NET, ASP.NET Core 1.1, ASP.NET Core 1.0, ASP.NET Core 2.0, ASP.NET MVC 5.2. Existe una vulnerabilidad de omisión de la característica de seguridad en ASP.NET cuando el número de intentos de inicio de sesión incorrectos no se valida. Esto también se conoce como "ASP.NET Security Feature Bypass Vulnerability". Esto afecta a ASP.NET, ASP.NET Core 1.1, ASP.NET Core 1.0, ASP.NET Core 2.0 y ASP.NET MVC 5.2. • http://www.securityfocus.com/bid/104659 http://www.securitytracker.com/id/1041267 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8171 • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 0%CPEs: 55EXPL: 0

A denial of service vulnerability exists when .NET and .NET Core improperly process XML documents, aka ".NET and .NET Core Denial of Service Vulnerability." This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.7/4.7.1, Microsoft .NET Framework 4.6, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, Microsoft .NET Framework 4.6.2/4.7/4.7.1, .NET Core 2.0, Microsoft .NET Framework 4.7.2. Existe una vulnerabilidad de denegación de servicio (DoS) cuando .NET y .NET Core gestionan de manera incorrecta documentos XML. Esta vulnerabilidad también se conoce como ".NET and .NET Core Denial of Service Vulnerability". Esto afecta a Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.7/4.7.1, Microsoft .NET Framework 4.6, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, Microsoft .NET Framework 4.6.2/4.7/4.7.1, .NET Core 2.0 y Microsoft .NET Framework 4.7.2. • http://www.securityfocus.com/bid/104060 http://www.securitytracker.com/id/1040851 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0765 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 8.8EPSS: 2%CPEs: 3EXPL: 0

ASP.NET Core 1.0. 1.1, and 2.0 allow an elevation of privilege vulnerability due to how web applications that are created from templates validate web requests, aka "ASP.NET Core Elevation Of Privilege Vulnerability". ASP.NET Core 1.0, 1.1 y 2.0 permite una vulnerabilidad de elevación de privilegios debido a la forma en la que las aplicaciones web que se crean a partir de plantillas validan las peticiones web. Esto también se conoce como "ASP.NET Core Elevation Of Privilege Vulnerability". • http://www.securityfocus.com/bid/103282 http://www.securitytracker.com/id/1040525 https://github.com/aspnet/Announcements/issues/295 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0787 • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

.NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka ".NET Core Denial of Service Vulnerability". .NET Core 1.0, .NET Core 1.1, NET Core 2.0 y PowerShell Core 6.0.0 permiten una vulnerabilidad de denegación de servicio (DoS) debido a la forma en la que se gestionan las peticiones especialmente manipuladas. Esto también se conoce como ".NET Core Denial of Service Vulnerability". It was found that string comparisons in .NET Core did not use a secure hashing algorithm. This could allow an attacker to predict string hashes and cause a denial of service by intentionally creating collisions thus forcing long look up times. • http://www.securityfocus.com/bid/103225 http://www.securitytracker.com/id/1040505 https://access.redhat.com/errata/RHSA-2018:0522 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875 https://access.redhat.com/security/cve/CVE-2018-0875 https://bugzilla.redhat.com/show_bug.cgi?id=1552060 •