Search Results (Refine Search)
- Keyword (text search): cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-36049 |
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability Published: November 14, 2023; 4:15:10 PM -0500 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-36560 |
ASP.NET Security Feature Bypass Vulnerability Published: November 14, 2023; 1:15:48 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-36796 |
Visual Studio Remote Code Execution Vulnerability Published: September 12, 2023; 1:15:15 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36794 |
Visual Studio Remote Code Execution Vulnerability Published: September 12, 2023; 1:15:14 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36793 |
Visual Studio Remote Code Execution Vulnerability Published: September 12, 2023; 1:15:14 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36792 |
Visual Studio Remote Code Execution Vulnerability Published: September 12, 2023; 1:15:14 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36788 |
.NET Framework Remote Code Execution Vulnerability Published: September 12, 2023; 1:15:14 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-32030 |
.NET and Visual Studio Denial of Service Vulnerability Published: June 14, 2023; 11:15:09 AM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-29331 |
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability Published: June 14, 2023; 11:15:09 AM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-29326 |
.NET Framework Remote Code Execution Vulnerability Published: June 14, 2023; 11:15:09 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-24936 |
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability Published: June 14, 2023; 11:15:09 AM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-24895 |
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability Published: June 14, 2023; 11:15:09 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-21722 |
.NET Framework Denial of Service Vulnerability Published: February 14, 2023; 3:15:14 PM -0500 |
V4.0:(not available) V3.1: 5.0 MEDIUM V2.0:(not available) |
CVE-2022-41089 |
.NET Framework Remote Code Execution Vulnerability Published: December 13, 2022; 2:15:12 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-26929 |
.NET Framework Remote Code Execution Vulnerability Published: September 13, 2022; 3:15:09 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-30130 |
.NET Framework Denial of Service Vulnerability Published: May 10, 2022; 5:15:13 PM -0400 |
V4.0:(not available) V3.1: 3.3 LOW V2.0: 4.3 MEDIUM |
CVE-2022-26832 |
.NET Framework Denial of Service Vulnerability Published: April 15, 2022; 3:15:14 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0: 5.0 MEDIUM |
CVE-2022-21911 |
.NET Framework Denial of Service Vulnerability Published: January 11, 2022; 4:15:13 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0: 5.0 MEDIUM |
CVE-2020-16937 |
<p>An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory. An attacker who successfully exploited the vulnerability could disclose contents of an affected system's memory.</p> <p>To exploit the vulnerability, an authenticated attacker would need to run a specially crafted application.</p> <p>The update addresses the vulnerability by correcting how the .NET Framework handles objects in memory.</p> Published: October 16, 2020; 7:15:15 PM -0400 |
V4.0:(not available) V3.1: 4.7 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2020-1476 |
An elevation of privilege vulnerability exists when ASP.NET or .NET web applications running on IIS improperly allow access to cached files. An attacker who successfully exploited this vulnerability could gain access to restricted files. To exploit this vulnerability, an attacker would need to send a specially crafted request to an affected server. The update addresses the vulnerability by changing how ASP.NET and .NET handle requests. Published: August 17, 2020; 3:15:15 PM -0400 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |