CVE-2005-1664
https://notcve.org/view.php?id=CVE-2005-1664
The __VIEWSTATE functionality in Microsoft ASP.NET 1.x allows remote attackers to conduct replay attacks to (1) apply a ViewState generated from one view to a different view, (2) reuse ViewState information after the application's state has changed, or (3) use the ViewState to conduct attacks or expose content to third parties. • http://marc.info/?l=bugtraq&m=111513127704270&w=2 http://marc.info/?l=bugtraq&m=111532887612517&w=2 http://scottonwriting.net/sowblog/posts/3747.aspx http://secunia.com/advisories/15241 http://www.osvdb.org/16196 https://exchange.xforce.ibmcloud.com/vulnerabilities/20409 •
CVE-2005-1665
https://notcve.org/view.php?id=CVE-2005-1665
The __VIEWSTATE functionality in Microsoft ASP.NET 1.x, when not cryptographically signed, allows remote attackers to cause a denial of service (CPU consumption) via deeply nested markup. • http://marc.info/?l=bugtraq&m=111513127704270&w=2 http://scottonwriting.net/sowblog/posts/3747.aspx http://secunia.com/advisories/15241 http://www.osvdb.org/16195 https://exchange.xforce.ibmcloud.com/vulnerabilities/20408 •
CVE-2005-0509
https://notcve.org/view.php?id=CVE-2005-0509
Multiple cross-site scripting (XSS) vulnerabilities in the Mono 1.0.5 implementation of ASP.NET (.Net) allow remote attackers to inject arbitrary HTML or web script via Unicode representations for ASCII fullwidth characters that are converted to normal ASCII characters, including ">" and "<". • http://it-project.ru/andir/docs/aspxvuln/aspxvuln.en.xml http://marc.info/?l=bugtraq&m=110867912714913&w=2 http://secunia.com/advisories/14325 •
CVE-2005-0452 – Microsoft ASP.NET 1.0/1.1 - Unicode Character Conversion Multiple Cross-Site Scripting Vulnerabilities
https://notcve.org/view.php?id=CVE-2005-0452
Multiple cross-site scripting (XSS) vulnerabilities in Microsoft ASP.NET (.Net) 1.0 and 1.1 to SP1 allow remote attackers to inject arbitrary HTML or web script via Unicode representations for ASCII fullwidth characters that are converted to normal ASCII characters, including ">" and "<". • https://www.exploit-db.com/exploits/25110 http://it-project.ru/andir/docs/aspxvuln/aspxvuln.en.xml http://marc.info/?l=bugtraq&m=110867912714913&w=2 http://secunia.com/advisories/14214 http://www.securityfocus.com/bid/12574 •
CVE-2004-0847 – Microsoft ASP.NET 1.x - URI Canonicalization Unauthorized Web Access
https://notcve.org/view.php?id=CVE-2004-0847
The Microsoft .NET forms authentication capability for ASP.NET allows remote attackers to bypass authentication for .aspx files in restricted directories via a request containing a (1) "\" (backslash) or (2) "%5C" (encoded backslash), aka "Path Validation Vulnerability." La característica de autenticación en formularios .NET permite a atacantes remotos evitar la autenticación de ficheros .aspx en directorios restringidos mediante una petición conteniendo un (1) 1) "" (barra invertida) or (2) ""%5C"" (barra invertida codificada). • https://www.exploit-db.com/exploits/24666 http://archives.neohapsis.com/archives/ntbugtraq/2004-q3/0221.html http://sourceforge.net/mailarchive/forum.php?thread_id=5671607&forum_id=24754 http://www.kb.cert.org/vuls/id/283646 http://www.securityfocus.com/bid/11342 http://www.us-cert.gov/cas/techalerts/TA05-039A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-004 https://exchange.xforce.ibmcloud.com/vulnerabilities/17644 https://oval.cisecurity.org • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •