6.8
CVSSv2

CVE-2019-1302

Published: 11/09/2019 Updated: 12/09/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 606
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

An elevation of privilege vulnerability exists when a ASP.NET Core web application, created using vulnerable project templates, fails to properly sanitize web requests, aka 'ASP.NET Core Elevation Of Privilege Vulnerability'.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft asp.net core 2.1

microsoft asp.net core 3.0

microsoft asp.net core 2.2

Github Repositories

Open source vulnerability scanner for .NET Core projects

Build status Components RetireNetRuntimesMiddleware RetireNetRuntimesBackgroundServices dotnet-retire ❗️DEPRECATED❗️ See this issue for other solutions RetireNetRuntimesMiddleware We cannot detect the runtime of the app at build time, so to report use of vulnerable runtimes the app itself, the host itself can provide us reports Install $ dotnet add pac

Build status Components RetireNetRuntimesMiddleware RetireNetRuntimesBackgroundServices dotnet-retire ❗️DEPRECATED❗️ See this issue for other solutions RetireNetRuntimesMiddleware We cannot detect the runtime of the app at build time, so to report use of vulnerable runtimes the app itself, the host itself can provide us reports Install $ dotnet add pac

Recent Articles

Microsoft Patch Tuesday – September 2019
Symantec Threat Intelligence Blog • Preethi Koroth • 11 Sep 2024

This month the vendor has patched 79 vulnerabilities, 18 of which are rated Critical.

Posted: 11 Sep, 201923 Min ReadThreat Intelligence SubscribeFollowtwitterfacebooklinkedinMicrosoft Patch Tuesday – September 2019This month the vendor has patched 79 vulnerabilities, 18 of which are rated Critical.This month the vendor has patched 79 vulnerabilities, 18 of which are rated Critical. As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all...