Microsoft

.Net Framework

186 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 27.76%
  • Veröffentlicht 17.11.2008 18:18:47
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The strong name (SN) implementation in Microsoft .NET Framework 2.0.50727 relies on the digital signature Public Key Token embedded in the pathname of a DLL file instead of the digital signature of this file itself, which makes it easier for attacker...

  • EPSS 11.49%
  • Veröffentlicht 27.08.2008 20:41:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Request Validation (aka the ValidateRequest filters) in ASP.NET in Microsoft .NET Framework without the MS07-040 update does not properly detect dangerous client input, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as d...

  • EPSS 11.67%
  • Veröffentlicht 27.08.2008 20:41:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Request Validation (aka the ValidateRequest filters) in ASP.NET in Microsoft .NET Framework with the MS07-040 update does not properly detect dangerous client input, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demo...

  • EPSS 62.17%
  • Veröffentlicht 10.07.2007 22:30:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The PE Loader service in Microsoft .NET Framework 1.0, 1.1, and 2.0 for Windows 2000, XP, Server 2003, and Vista allows remote attackers to execute arbitrary code via unspecified vectors involving an "unchecked buffer" and unvalidated message lengths...

  • EPSS 81.93%
  • Veröffentlicht 10.07.2007 22:30:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Interpretation conflict in ASP.NET in Microsoft .NET Framework 1.0, 1.1, and 2.0 for Windows 2000, XP, Server 2003, and Vista allows remote attackers to access configuration files and obtain sensitive information, and possibly bypass security mechani...

  • EPSS 62.17%
  • Veröffentlicht 10.07.2007 22:30:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The Just In Time (JIT) Compiler service in Microsoft .NET Framework 1.0, 1.1, and 2.0 for Windows 2000, XP, Server 2003, and Vista allows user-assisted remote attackers to execute arbitrary code via unspecified vectors involving an "unchecked buffer,...

  • EPSS 28.36%
  • Veröffentlicht 10.04.2007 22:19:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Microsoft ASP .NET Framework 2.0.50727.42 does not properly handle comment (/* */) enclosures, which allows remote attackers to bypass request filtering and conduct cross-site scripting (XSS) attacks, or cause a denial of service, as demonstrated via...

  • EPSS 48.61%
  • Veröffentlicht 10.10.2006 21:07:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Cross-site scripting (XSS) vulnerability in Microsoft .NET Framework 2.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving "ASP.NET controls that set the AutoPostBack property to true".

  • EPSS 40.33%
  • Veröffentlicht 11.07.2006 21:05:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Microsoft .NET framework 2.0 (ASP.NET) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1 allows remote attackers to bypass access restrictions via unspecified "URL paths" that can access Application Folder objects "explicitly b...

Exploit
  • EPSS 13.23%
  • Veröffentlicht 30.03.2006 01:06:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Buffer overflow in calloc.c in the Microsoft Windows XP SP2 ntdll.dll system library, when used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK, might allow user-assisted attackers to execute arbitrary code via a crafted .dll file wi...