9.8
CVSSv3

CVE-2020-0646

Published: 14/01/2020 Updated: 12/07/2022
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 893
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft .net_framework 3.0

microsoft .net_framework 3.5

microsoft .net_framework 4.6.2

microsoft .net_framework 4.7

microsoft .net_framework 4.7.1

microsoft .net_framework 4.7.2

microsoft .net_framework 4.8

microsoft .net_framework 3.5.1

microsoft .net_framework 4.5.2

microsoft .net_framework 4.6

microsoft .net_framework 4.6.1

Exploits

This Metasploit module exploits a vulnerability within SharePoint and its NET backend that allows an attacker to execute commands using specially crafted XOML data sent to SharePoint via the Workflows functionality ...

Github Repositories

BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.

BigBountyRecon BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation Reconnaissance is the most important step in any penetration testing or a bug hunting process It provides an attacker with some preliminary knowledge on the target organisation Furthe

DorkRecon is a tool written in Python3 which can be used for recon process using various Google dorks and open source tools

DorkRecon About DorkRecon is a tool written in Python3 which can be used for recon process using various Google dorks and open source tools DorkRecon comes with 2 interfaces: CLI - The CLI is purely written in python3 Web UI - Output saved as HTML File #Default Browser: firefox Features DorkRecon options: -1 : Directory Listing -2

BigBountyRecon BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation Reconnaissance is the most important step in any penetration testing or a bug hunting process It provides an attacker with some preliminary knowledge on the target organisation Furthe

BigBountyRecon BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation Reconnaissance is the most important step in any penetration testing or a bug hunting process It provides an attacker with some preliminary knowledge on the target organisation Furthe

AdrishyaReconDorker tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.

AdrishyaReconDorker AdrishyaReconDorker tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation

BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.

BigBountyRecon BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation Reconnaissance is the most important step in any penetration testing or a bug hunting process It provides an attacker with some preliminary knowledge on the target organisation Furthe

BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.

BigBountyRecon BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation Reconnaissance is the most important step in any penetration testing or a bug hunting process It provides an attacker with some preliminary knowledge on the target organisation Furthe

πŸ‘¨‍πŸ’» Advance-Recon-Dorks ⚑ This Dork List Provides Dorks for files,vulnerabilities , cloud services & many more open redirect Dork site:domaincom inurl:redir | inurl:url | inurl:redirect | inurl:return | inurl:src=http | inurl:r=http Install / Setup Files Dork site:domaincom inurl:redir | inurl:url | inurl

Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation

BigBountyRecon BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation Reconnaissance is the most important step in any penetration testing or a bug hunting process It provides an attacker with some preliminary knowledge on the target organisation Furthe

tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation Reconnaissance is the most important step in any penetration testing or a bug hunting process It provides an attacker with some preliminary knowledge on the target organisation Furthermore, it will be useful to ga

BigBountyRecon BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation Reconnaissance is the most important step in any penetration testing or a bug hunting process It provides an attacker with some preliminary knowledge on the target organisation Furthe

Recent Articles

Microsoft Patch Tuesday – January 2020
Symantec Threat Intelligence Blog β€’ Preethi Koroth β€’ 15 Jan 2024

This month the vendor has patched 49 vulnerabilities, 8 of which are rated Critical.

Posted: 15 Jan, 202014 Min ReadThreat Intelligence SubscribeMicrosoft Patch Tuesday – January 2020This month the vendor has patched 49 vulnerabilities, 8 of which are rated Critical.This month the vendor has patched 49 vulnerabilities, 8 of which are rated Critical. As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required wh...

Welcome to the 2020s: Booby-trapped Office files, NSA tipping off Windows cert-spoofing bugs, RDP flaws...
The Register β€’ Shaun Nichols in San Francisco β€’ 14 Jan 2020

Grab your Microsoft, Adobe, SAP, Intel, and VMware fixes now The four problems with the US government's latest rulebook on security bug disclosures

Patch Tuesday In the first Patch Tuesday of the year, Microsoft finds itself joined by Adobe, Intel, VMware, and SAP in dropping scheduled security updates. This month's Microsoft security fixes include three more remote-code-execution vulnerabilities in Redmond's Windows Remote Desktop Protocol software. Two of the flaws (CVE-2020-0609, CVE-2020-0610) are present on the server side in RD Gateway – requiring no authentication – while a third (CVE-2020-0611) is found on the client side. Dusti...