NA
CVSSv3

CVE-2014-0257

CVSSv4: NA | CVSSv3: NA | CVSSv2: 9.3 | VMScore: 1000 | EPSS: 0.56554 | KEV: Not Included
Published: 12/02/2014 Updated: 21/11/2024

Vulnerability Summary

Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine whether it is safe to execute a method, which allows remote malicious users to execute arbitrary code via (1) a crafted web site or (2) a crafted .NET Framework application that exposes a COM server endpoint, aka "Type Traversal Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft .net framework 1.0

microsoft .net framework 1.1

microsoft .net framework 2.0

microsoft .net framework 3.5

microsoft .net framework 3.5.1

microsoft .net framework 4.0

microsoft .net framework 4.5

microsoft .net framework 4.5.1

Exploits

## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' require 'rex' require 'msf/core/exploit/exe' require 'msf/core/exploit/powershell' class Metasploit3 < Msf::Exploit::Local Rank = GreatRanking include Msf::Exploit::Powershell include ...
This Metasploit module abuses a process creation policy in the Internet Explorer Sandbox which allows to escape the Enhanced Protected Mode and execute code with Medium Integrity The problem exists in the NET Deployment Service (dfsvcexe), which can be run as Medium Integrity Level Further interaction with the component allows to escape the Enh ...