Microsoft

.Net Framework

186 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 30.14%
  • Veröffentlicht 15.10.2014 10:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 processes unverified data during interaction with the ClickOnce installer, which allows remote attackers to gain privileges via vectors involving Internet Explorer, aka ".NET Clic...

  • EPSS 42.52%
  • Veröffentlicht 15.10.2014 10:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 does not properly parse internationalized resource identifiers, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a craf...

  • EPSS 41.12%
  • Veröffentlicht 15.10.2014 10:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Microsoft .NET Framework 2.0 SP2, 3.5, and 3.5.1 omits the ASLR protection mechanism, which allows remote attackers to obtain potentially sensitive information about memory addresses by leveraging the predictability of an executable image's location,...

  • EPSS 39.63%
  • Veröffentlicht 10.09.2014 01:55:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 does not properly use a hash table for request data, which allows remote attackers to cause a denial of service (resource consumption and ASP.NET performance deg...

  • EPSS 14.99%
  • Veröffentlicht 12.08.2014 21:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, and 3.5.1 does not properly implement the ASLR protection mechanism, which allows remote attackers to obtain sensitive address information via a crafted web site, aka ".NET ASLR Vulnerability."

  • EPSS 26.75%
  • Veröffentlicht 14.05.2014 11:13:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The .NET Remoting implementation in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly restrict memory access, which allows remote attackers to execute arbitrary code via vectors involving malformed objects, ak...

Exploit
  • EPSS 25.47%
  • Veröffentlicht 12.02.2014 04:50:41
  • Zuletzt bearbeitet 29.04.2026 01:13:23

VsaVb7rt.dll in Microsoft .NET Framework 2.0 SP2 and 3.5.1 does not implement the ASLR protection mechanism, which makes it easier for remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in February 2014, aka "...

  • EPSS 22.42%
  • Veröffentlicht 12.02.2014 04:50:39
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine TCP connection states, which allows remote attackers to cause a denial of service (ASP.NET daemon hang) via crafted HTTP requests that trigger persis...

  • EPSS 78.1%
  • Veröffentlicht 12.02.2014 04:50:39
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine whether it is safe to execute a method, which allows remote attackers to execute arbitrary code via (1) a crafted web site or (2) a crafted ...

  • EPSS 57.84%
  • Veröffentlicht 09.10.2013 14:53:24
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and...