Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft .net framework 4.5.1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2014-1806
The .NET Remoting implementation in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly restrict memory access, which allows remote malicious users to execute arbitrary code via vectors involving malformed objects, aka "TypeFilterLevel ...
Microsoft .net Framework 2.0
Microsoft .net Framework 3.5
Microsoft .net Framework 1.1
Microsoft .net Framework 4.5
Microsoft .net Framework 4.5.1
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.0
1 EDB exploit
4 Github repositories
5
CVSSv2
CVE-2014-0253
Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine TCP connection states, which allows remote malicious users to cause a denial of service (ASP.NET daemon hang) via crafted HTTP requests that trigger persistent resource consumptio...
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.5.1
Microsoft .net Framework 4.0
Microsoft .net Framework 4.5
Microsoft .net Framework 2.0
Microsoft .net Framework 1.1
9.3
CVSSv2
CVE-2014-0257
Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine whether it is safe to execute a method, which allows remote malicious users to execute arbitrary code via (1) a crafted web site or (2) a crafted .NET Framework applicati...
Microsoft .net Framework 1.0
Microsoft .net Framework 1.1
Microsoft .net Framework 4.5
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 2.0
Microsoft .net Framework 4.5.1
Microsoft .net Framework 4.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3