U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • CPE Product Version: cpe:/a:microsoft:.net_framework:3.5.1
There are 117 matching records.
Displaying matches 1 through 20.
Vuln ID Summary CVSS Severity
CVE-2023-36049

.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability

Published: November 14, 2023; 4:15:10 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-36560

ASP.NET Security Feature Bypass Vulnerability

Published: November 14, 2023; 1:15:48 PM -0500
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-36796

Visual Studio Remote Code Execution Vulnerability

Published: September 12, 2023; 1:15:15 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-36794

Visual Studio Remote Code Execution Vulnerability

Published: September 12, 2023; 1:15:14 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-36793

Visual Studio Remote Code Execution Vulnerability

Published: September 12, 2023; 1:15:14 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-36792

Visual Studio Remote Code Execution Vulnerability

Published: September 12, 2023; 1:15:14 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-36788

.NET Framework Remote Code Execution Vulnerability

Published: September 12, 2023; 1:15:14 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-32030

.NET and Visual Studio Denial of Service Vulnerability

Published: June 14, 2023; 11:15:09 AM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-29331

.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability

Published: June 14, 2023; 11:15:09 AM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-29326

.NET Framework Remote Code Execution Vulnerability

Published: June 14, 2023; 11:15:09 AM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-24936

.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability

Published: June 14, 2023; 11:15:09 AM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-24895

.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability

Published: June 14, 2023; 11:15:09 AM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21722

.NET Framework Denial of Service Vulnerability

Published: February 14, 2023; 3:15:14 PM -0500
V3.1: 5.0 MEDIUM
V2.0:(not available)
CVE-2022-41089

.NET Framework Remote Code Execution Vulnerability

Published: December 13, 2022; 2:15:12 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-26929

.NET Framework Remote Code Execution Vulnerability

Published: September 13, 2022; 3:15:09 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-30130

.NET Framework Denial of Service Vulnerability

Published: May 10, 2022; 5:15:13 PM -0400
V3.1: 3.3 LOW
V2.0: 4.3 MEDIUM
CVE-2022-26832

.NET Framework Denial of Service Vulnerability

Published: April 15, 2022; 3:15:14 PM -0400
V3.1: 7.5 HIGH
V2.0: 5.0 MEDIUM
CVE-2022-21911

.NET Framework Denial of Service Vulnerability

Published: January 11, 2022; 4:15:13 PM -0500
V3.1: 7.5 HIGH
V2.0: 5.0 MEDIUM
CVE-2020-16937

<p>An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory. An attacker who successfully exploited the vulnerability could disclose contents of an affected system's memory.</p> <p>To exploit the vulnerability, an authenticated attacker would need to run a specially crafted application.</p> <p>The update addresses the vulnerability by correcting how the .NET Framework handles objects in memory.</p>

Published: October 16, 2020; 7:15:15 PM -0400
V3.1: 4.7 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2020-1476

An elevation of privilege vulnerability exists when ASP.NET or .NET web applications running on IIS improperly allow access to cached files. An attacker who successfully exploited this vulnerability could gain access to restricted files. To exploit this vulnerability, an attacker would need to send a specially crafted request to an affected server. The update addresses the vulnerability by changing how ASP.NET and .NET handle requests.

Published: August 17, 2020; 3:15:15 PM -0400
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW