Page 30 of 307 results (0.016 seconds)

CVSS: 7.8EPSS: 29%CPEs: 5EXPL: 2

30 Mar 2006 — Buffer overflow in the ILASM assembler in the Microsoft .NET 1.0 and 1.1 Framework might allow user-assisted attackers to execute arbitrary code via a .il file that calls a function with a long name. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044482.html •

CVSS: 7.8EPSS: 31%CPEs: 2EXPL: 3

23 Mar 2006 — Microsoft w3wp (aka w3wp.exe) does not properly handle when the AspCompat directive is not used when referencing COM components in ASP.NET, which allows remote attackers to cause a denial of service (resource consumption or crash) by repeatedly requesting each of several documents that refer to COM components, or are restricted documents located under the ASP.NET application path. • https://www.exploit-db.com/exploits/1601 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 37%CPEs: 1EXPL: 3

12 Jan 2006 — By design, Microsoft Visual Studio 2005 automatically executes code in the Load event of a user-defined control (UserControl1_Load function), which allows user-assisted attackers to execute arbitrary code by tricking the user into opening a malicious Visual Studio project file. • https://www.exploit-db.com/exploits/27073 •

CVSS: 7.8EPSS: 42%CPEs: 41EXPL: 3

19 Aug 2005 — Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrat... • https://www.exploit-db.com/exploits/26167 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 12%CPEs: 1EXPL: 1

12 Jul 2005 — aspnet_wp.exe in Microsoft ASP.NET web services allows remote attackers to cause a denial of service (CPU consumption from infinite loop) via a crafted SOAP message to an RPC/Encoded method. • http://secunia.com/advisories/16005 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 6.4EPSS: 30%CPEs: 2EXPL: 0

18 May 2005 — The __VIEWSTATE functionality in Microsoft ASP.NET 1.x allows remote attackers to conduct replay attacks to (1) apply a ViewState generated from one view to a different view, (2) reuse ViewState information after the application's state has changed, or (3) use the ViewState to conduct attacks or expose content to third parties. • http://marc.info/?l=bugtraq&m=111513127704270&w=2 •

CVSS: 7.5EPSS: 40%CPEs: 2EXPL: 0

18 May 2005 — The __VIEWSTATE functionality in Microsoft ASP.NET 1.x, when not cryptographically signed, allows remote attackers to cause a denial of service (CPU consumption) via deeply nested markup. • http://marc.info/?l=bugtraq&m=111513127704270&w=2 •

CVSS: 6.1EPSS: 8%CPEs: 6EXPL: 0

22 Feb 2005 — Multiple cross-site scripting (XSS) vulnerabilities in the Mono 1.0.5 implementation of ASP.NET (.Net) allow remote attackers to inject arbitrary HTML or web script via Unicode representations for ASCII fullwidth characters that are converted to normal ASCII characters, including ">" and "<". • http://it-project.ru/andir/docs/aspxvuln/aspxvuln.en.xml •

CVSS: 6.1EPSS: 27%CPEs: 5EXPL: 1

16 Feb 2005 — Multiple cross-site scripting (XSS) vulnerabilities in Microsoft ASP.NET (.Net) 1.0 and 1.1 to SP1 allow remote attackers to inject arbitrary HTML or web script via Unicode representations for ASCII fullwidth characters that are converted to normal ASCII characters, including ">" and "<". • https://www.exploit-db.com/exploits/25110 •

CVSS: 9.8EPSS: 64%CPEs: 2EXPL: 2

06 Oct 2004 — The Microsoft .NET forms authentication capability for ASP.NET allows remote attackers to bypass authentication for .aspx files in restricted directories via a request containing a (1) "\" (backslash) or (2) "%5C" (encoded backslash), aka "Path Validation Vulnerability." La característica de autenticación en formularios .NET permite a atacantes remotos evitar la autenticación de ficheros .aspx en directorios restringidos mediante una petición conteniendo un (1) 1) "" (barra invertida) or (2) ""%5C"" (barra ... • https://www.exploit-db.com/exploits/24666 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •