Page 7 of 178 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Products with Unified Automation .NET based OPC UA Client/Server SDK Bundle: Versions V3.0.7 and prior (.NET 4.5, 4.0, and 3.5 Framework versions only) are vulnerable to an uncontrolled recursion, which may allow an attacker to trigger a stack overflow. Productos con el programa Unified Automation .NET based OPC UA Client/Server SDK Bundle: Versiones V3.0.7 y anteriores (solo versiones de .NET 4.5, 4.0 y 3.5 Framework) son vulnerables a una recursividad no controlada, que puede permitir a un atacante desencadenar un desbordamiento de pila • https://us-cert.cisa.gov/ics/advisories/icsa-21-133-04 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-674: Uncontrolled Recursion •

CVSS: 7.5EPSS: 0%CPEs: 44EXPL: 0

.NET Framework Denial of Service Vulnerability Una Vulnerabilidad de Denegación de Servicio de .NET Framework • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24111 •

CVSS: 5.5EPSS: 0%CPEs: 73EXPL: 0

<p>An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory. An attacker who successfully exploited the vulnerability could disclose contents of an affected system's memory.</p> <p>To exploit the vulnerability, an authenticated attacker would need to run a specially crafted application.</p> <p>The update addresses the vulnerability by correcting how the .NET Framework handles objects in memory.</p> Se presenta una vulnerabilidad de divulgación de información cuando .NET Framework maneja inapropiadamente objetos en memoria, también se conoce como ".NET Framework Information Disclosure Vulnerability" • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16937 •

CVSS: 5.5EPSS: 0%CPEs: 70EXPL: 0

An elevation of privilege vulnerability exists when ASP.NET or .NET web applications running on IIS improperly allow access to cached files. An attacker who successfully exploited this vulnerability could gain access to restricted files. To exploit this vulnerability, an attacker would need to send a specially crafted request to an affected server. The update addresses the vulnerability by changing how ASP.NET and .NET handle requests. Se presenta una vulnerabilidad de elevación de privilegios cuando las aplicaciones web ASP.NET o .NET que se ejecutan en IIS, permiten inapropiadamente el acceso a archivos almacenados en caché, también se conoce como "ASP.NET and .NET Elevation of Privilege Vulnerability". • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1476 •

CVSS: 9.3EPSS: 1%CPEs: 22EXPL: 0

A remote code execution vulnerability exists when Microsoft .NET Framework processes input. An attacker who successfully exploited this vulnerability could take control of an affected system. To exploit the vulnerability, an attacker would need to be able to upload a specially crafted file to a web application. The security update addresses the vulnerability by correcting how .NET Framework processes input. Se presenta una vulnerabilidad de ejecución de código remota cuando Microsoft .NET Framework procesa una entrada, también se conoce como ".NET Framework Remote Code Execution Vulnerability". • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1046 •