
CVE-2006-1364 – ASP.NET w3wp - COM Components Remote Crash
https://notcve.org/view.php?id=CVE-2006-1364
23 Mar 2006 — Microsoft w3wp (aka w3wp.exe) does not properly handle when the AspCompat directive is not used when referencing COM components in ASP.NET, which allows remote attackers to cause a denial of service (resource consumption or crash) by repeatedly requesting each of several documents that refer to COM components, or are restricted documents located under the ASP.NET application path. • https://www.exploit-db.com/exploits/1601 • CWE-400: Uncontrolled Resource Consumption •

CVE-2005-1664
https://notcve.org/view.php?id=CVE-2005-1664
18 May 2005 — The __VIEWSTATE functionality in Microsoft ASP.NET 1.x allows remote attackers to conduct replay attacks to (1) apply a ViewState generated from one view to a different view, (2) reuse ViewState information after the application's state has changed, or (3) use the ViewState to conduct attacks or expose content to third parties. • http://marc.info/?l=bugtraq&m=111513127704270&w=2 •

CVE-2005-1665
https://notcve.org/view.php?id=CVE-2005-1665
18 May 2005 — The __VIEWSTATE functionality in Microsoft ASP.NET 1.x, when not cryptographically signed, allows remote attackers to cause a denial of service (CPU consumption) via deeply nested markup. • http://marc.info/?l=bugtraq&m=111513127704270&w=2 •

CVE-2005-0452 – Microsoft ASP.NET 1.0/1.1 - Unicode Character Conversion Multiple Cross-Site Scripting Vulnerabilities
https://notcve.org/view.php?id=CVE-2005-0452
16 Feb 2005 — Multiple cross-site scripting (XSS) vulnerabilities in Microsoft ASP.NET (.Net) 1.0 and 1.1 to SP1 allow remote attackers to inject arbitrary HTML or web script via Unicode representations for ASCII fullwidth characters that are converted to normal ASCII characters, including ">" and "<". • https://www.exploit-db.com/exploits/25110 •

CVE-2004-0847 – Microsoft ASP.NET 1.x - URI Canonicalization Unauthorized Web Access
https://notcve.org/view.php?id=CVE-2004-0847
06 Oct 2004 — The Microsoft .NET forms authentication capability for ASP.NET allows remote attackers to bypass authentication for .aspx files in restricted directories via a request containing a (1) "\" (backslash) or (2) "%5C" (encoded backslash), aka "Path Validation Vulnerability." La característica de autenticación en formularios .NET permite a atacantes remotos evitar la autenticación de ficheros .aspx en directorios restringidos mediante una petición conteniendo un (1) 1) "" (barra invertida) or (2) ""%5C"" (barra ... • https://www.exploit-db.com/exploits/24666 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2003-0768
https://notcve.org/view.php?id=CVE-2003-0768
12 Sep 2003 — Microsoft ASP.Net 1.1 allows remote attackers to bypass the Cross-Site Scripting (XSS) and Script Injection protection feature via a null character in the beginning of a tag name. Microsoft ASP.Net 1.1 permite a atacantes remotos saltarse la protección contra inyección de script y secuencias de comandos en sitios cruzados (XSS) mediante un carácter nulo al comienzo de un nombre de etiqueta. • http://marc.info/?l=bugtraq&m=106304326916062&w=2 •