Note:
This project will be discontinued after December 13, 2021. [more]
Product:
\.net_framework
(Microsoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 174 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2007-04-10 | CVE-2006-7192 | Microsoft ASP .NET Framework 2.0.50727.42 does not properly handle comment (/* */) enclosures, which allows remote attackers to bypass request filtering and conduct cross-site scripting (XSS) attacks, or cause a denial of service, as demonstrated via an xss:expression STYLE attribute in a closing XSS HTML tag. | \.net_framework | N/A | ||
2006-10-10 | CVE-2006-3436 | Cross-site scripting (XSS) vulnerability in Microsoft .NET Framework 2.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving "ASP.NET controls that set the AutoPostBack property to true". | \.net_framework | N/A | ||
2006-03-29 | CVE-2006-1511 | Buffer overflow in the ILASM assembler in the Microsoft .NET 1.0 and 1.1 Framework might allow user-assisted attackers to execute arbitrary code via a .il file that calls a function with a long name. | \.net_framework | N/A | ||
2006-03-29 | CVE-2006-1510 | Buffer overflow in calloc.c in the Microsoft Windows XP SP2 ntdll.dll system library, when used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK, might allow user-assisted attackers to execute arbitrary code via a crafted .dll file with a large static method. | \.net_framework | N/A | ||
2006-07-11 | CVE-2006-1300 | Microsoft .NET framework 2.0 (ASP.NET) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1 allows remote attackers to bypass access restrictions via unspecified "URL paths" that can access Application Folder objects "explicitly by name." | \.net_framework | N/A | ||
2005-08-19 | CVE-2005-2127 | Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7)... | Catalyst_driver, \.net_framework, Office, Project, Visio, Visual_studio_\.net | N/A | ||
2005-03-14 | CVE-2005-0509 | Multiple cross-site scripting (XSS) vulnerabilities in the Mono 1.0.5 implementation of ASP.NET (.Net) allow remote attackers to inject arbitrary HTML or web script via Unicode representations for ASCII fullwidth characters that are converted to normal ASCII characters, including ">" and "<". | \.net_framework, Mono | N/A | ||
2004-09-28 | CVE-2004-0200 | Buffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation. | \.net_framework, Digital_image_pro, Digital_image_suite, Excel, Frontpage, Greetings, Infopath, Office, Onenote, Outlook, Picture_it, Powerpoint, Producer, Project, Publisher, Visio, Visual_basic, Visual_c\#, Visual_c\+\+, Visual_j\#_\.net, Visual_studio_\.net, Windows_2003_server, Windows_xp, Word | N/A | ||
2002-07-26 | CVE-2002-0409 | orderdetails.aspx, as made available to Microsoft .NET developers as example code and demonstrated on www.ibuyspystore.com, allows remote attackers to view the orders of other users by modifying the OrderID parameter. | \.net_framework | N/A | ||
2002-07-26 | CVE-2002-0369 | Buffer overflow in ASP.NET Worker Process allows remote attackers to cause a denial of service (restart) and possibly execute arbitrary code via a routine that processes cookies while in StateServer mode. | \.net_framework | N/A |