Page 9 of 86 results (0.003 seconds)

CVSS: 9.3EPSS: 35%CPEs: 8EXPL: 0

13 May 2015 — The Windows Forms (aka WinForms) libraries in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 allow user-assisted remote attackers to execute arbitrary code via a crafted partial-trust application, aka "Windows Forms Elevation of Privilege Vulnerability." Las librerías Windows Forms (también conocidas como WinForms) en Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, y 4.5.2 permiten a atacantes remotos asistidos por usuarios ejecutar código arbitrario a ... • http://www.securityfocus.com/bid/74487 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 35%CPEs: 8EXPL: 0

14 Apr 2015 — ASP.NET in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2, when the customErrors configuration is disabled, allows remote attackers to obtain sensitive configuration-file information via a crafted request, aka "ASP.NET Information Disclosure Vulnerability." ASP.NET en Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, y 4.5.2, cuando la configuración customErrors está deshabilitada, permite a atacantes remotos obtener información sensible de los ficheros d... • http://www.securitytracker.com/id/1032116 • CWE-19: Data Processing Errors •

CVSS: 9.8EPSS: 37%CPEs: 8EXPL: 1

11 Nov 2014 — Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 does not properly perform TypeFilterLevel checks, which allows remote attackers to execute arbitrary code via crafted data to a .NET Remoting endpoint, aka "TypeFilterLevel Vulnerability." Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, y 4.5.2 no realiza debidamente las comprobaciones TypeFilterLevel, lo que permite a atacantes remotos ejecutar código arbitrario a través de datos manipulados en un endpoint... • https://packetstorm.news/files/id/129165 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 30%CPEs: 7EXPL: 0

15 Oct 2014 — Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 processes unverified data during interaction with the ClickOnce installer, which allows remote attackers to gain privileges via vectors involving Internet Explorer, aka ".NET ClickOnce Elevation of Privilege Vulnerability." Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, y 4.5.2 procesa datos no verificados durante la interacción con el instalador ClickOnce, lo que permite a atacantes remotos ganar privilegios a través de ve... • http://blogs.technet.com/b/srd/archive/2014/10/14/more-details-about-cve-2014-4073-elevation-of-privilege-vulnerability.aspx • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 42%CPEs: 7EXPL: 0

15 Oct 2014 — Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 does not properly parse internationalized resource identifiers, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted request to a .NET web application, aka ".NET Framework Remote Code Execution Vulnerability." Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, y 4.5.2 no analiza debidamente los identificadores de los recursos internacionalizados, lo que permite a... • http://secunia.com/advisories/60969 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 39%CPEs: 9EXPL: 0

10 Sep 2014 — Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 does not properly use a hash table for request data, which allows remote attackers to cause a denial of service (resource consumption and ASP.NET performance degradation) via crafted requests, aka ".NET Framework Denial of Service Vulnerability." Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, y 4.5.2 no utiliza debidamente una tabla de hash table para los datos de solicitudes, lo que perm... • http://blogs.technet.com/b/srd/archive/2014/09/09/assessing-risk-for-the-september-2014-security-updates.aspx • CWE-399: Resource Management Errors •