Page 6 of 42 results (0.016 seconds)

CVSS: 7.5EPSS: 0%CPEs: 205EXPL: 0

.NET Framework Denial of Service Vulnerability Una vulnerabilidad de Denegación de Servicio de .NET Framework • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21911 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21911 •

CVSS: 7.5EPSS: 0%CPEs: 44EXPL: 0

.NET Framework Denial of Service Vulnerability Una Vulnerabilidad de Denegación de Servicio de .NET Framework • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24111 •

CVSS: 5.5EPSS: 0%CPEs: 73EXPL: 0

<p>An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory. An attacker who successfully exploited the vulnerability could disclose contents of an affected system's memory.</p> <p>To exploit the vulnerability, an authenticated attacker would need to run a specially crafted application.</p> <p>The update addresses the vulnerability by correcting how the .NET Framework handles objects in memory.</p> Se presenta una vulnerabilidad de divulgación de información cuando .NET Framework maneja inapropiadamente objetos en memoria, también se conoce como ".NET Framework Information Disclosure Vulnerability" • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16937 •

CVSS: 5.5EPSS: 0%CPEs: 70EXPL: 0

An elevation of privilege vulnerability exists when ASP.NET or .NET web applications running on IIS improperly allow access to cached files. An attacker who successfully exploited this vulnerability could gain access to restricted files. To exploit this vulnerability, an attacker would need to send a specially crafted request to an affected server. The update addresses the vulnerability by changing how ASP.NET and .NET handle requests. Se presenta una vulnerabilidad de elevación de privilegios cuando las aplicaciones web ASP.NET o .NET que se ejecutan en IIS, permiten inapropiadamente el acceso a archivos almacenados en caché, también se conoce como "ASP.NET and .NET Elevation of Privilege Vulnerability". • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1476 •

CVSS: 8.8EPSS: 89%CPEs: 88EXPL: 6

A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'. Se presenta una vulnerabilidad de ejecución de código remota en .NET Framework, Microsoft SharePoint y Visual Studio cuando el software presenta un fallo al comprobar el marcado de origen de una entrada de archivo XML, también se conoce como ".NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability" It was discovered that .NET Core did not properly check the source markup of XML files. A remote, unauthenticated attacker could possibly exploit this flaw to execute arbitrary code by sending specially crafted requests to an application parsing certain kinds of XML files or an ASP.NET Core application. Microsoft .NET Framework, Microsoft SharePoint, and Visual Studio contain a remote code execution vulnerability when the software fails to check the source markup of XML file input. Successful exploitation allows an attacker to execute code in the context of the process responsible for deserialization of the XML content. • https://www.exploit-db.com/exploits/48747 https://www.exploit-db.com/exploits/50151 http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147 https://www.exploitalert.com/view-details.html?id=35992 h • CWE-502: Deserialization of Untrusted Data •