This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2005-03-14
Product .Net Framework Last view 2015-05-13
Version 1.1 Type Application
Update sp1  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:microsoft:.net_framework

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
9.3 2015-05-13 CVE-2015-1673

The Windows Forms (aka WinForms) libraries in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 allow user-assisted remote attackers to execute arbitrary code via a crafted partial-trust application, aka "Windows Forms Elevation of Privilege Vulnerability."

2.6 2015-04-14 CVE-2015-1648

ASP.NET in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2, when the customErrors configuration is disabled, allows remote attackers to obtain sensitive configuration-file information via a crafted request, aka "ASP.NET Information Disclosure Vulnerability."

9.3 2014-11-11 CVE-2014-4149

Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 does not properly perform TypeFilterLevel checks, which allows remote attackers to execute arbitrary code via crafted data to a .NET Remoting endpoint, aka "TypeFilterLevel Vulnerability."

5 2014-09-09 CVE-2014-4072

Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 does not properly use a hash table for request data, which allows remote attackers to cause a denial of service (resource consumption and ASP.NET performance degradation) via crafted requests, aka ".NET Framework Denial of Service Vulnerability."

4.3 2014-08-12 CVE-2014-4062

Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, and 3.5.1 does not properly implement the ASLR protection mechanism, which allows remote attackers to obtain sensitive address information via a crafted web site, aka ".NET ASLR Vulnerability."

10 2014-05-14 CVE-2014-1806

The .NET Remoting implementation in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly restrict memory access, which allows remote attackers to execute arbitrary code via vectors involving malformed objects, aka "TypeFilterLevel Vulnerability."

9.3 2014-02-11 CVE-2014-0257

Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine whether it is safe to execute a method, which allows remote attackers to execute arbitrary code via (1) a crafted web site or (2) a crafted .NET Framework application that exposes a COM server endpoint, aka "Type Traversal Vulnerability."

5 2014-02-11 CVE-2014-0253

Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine TCP connection states, which allows remote attackers to cause a denial of service (ASP.NET daemon hang) via crafted HTTP requests that trigger persistent resource consumption for a (1) stale or (2) closed connection, as exploited in the wild in February 2014, aka "POST Request DoS Vulnerability."

9.3 2013-07-09 CVE-2013-3132

Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check the permissions of objects that use reflection, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application, aka "Delegate Reflection Bypass Vulnerability."

9.3 2013-01-09 CVE-2013-0004

Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly validate the permissions of objects in memory, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application, aka "Double Construction Vulnerability."

9.3 2013-01-09 CVE-2013-0002

Buffer overflow in the Windows Forms (aka WinForms) component in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages improper counting of objects during a memory copy operation, aka "WinForms Buffer Overflow Vulnerability."

4.3 2013-01-09 CVE-2013-0001

The Windows Forms (aka WinForms) component in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 4, and 4.5 does not properly initialize memory arrays, which allows remote attackers to obtain sensitive information via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages a pointer to an unmanaged memory location, aka "System Drawing Information Disclosure Vulnerability."

7.9 2012-11-13 CVE-2012-2519

Untrusted search path vulnerability in Entity Framework in ADO.NET in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, and 4 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .NET application, aka ".NET Framework Insecure Library Loading Vulnerability."

9.3 2012-11-13 CVE-2012-1895

The reflection implementation in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5.1, and 4 does not properly enforce object permissions, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka "Reflection Bypass Vulnerability."

9.3 2012-05-08 CVE-2012-0161

Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5 SP1, 3.5.1, and 4 does not properly handle an unspecified exception during use of partially trusted assemblies to serialize input data, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka ".NET Framework Serialization Vulnerability."

9.3 2012-05-08 CVE-2012-0160

Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5 SP1, 3.5.1, and 4 does not properly serialize input data, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka ".NET Framework Serialization Vulnerability."

9.3 2012-04-10 CVE-2012-0163

Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly validate function parameters, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka ".NET Framework Parameter Validation Vulnerability."

9.3 2011-10-11 CVE-2011-1253

Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5.1, and 4, and Silverlight 4 before 4.0.60831, does not properly restrict inheritance, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, (3) a crafted .NET Framework application, or (4) a crafted Silverlight application, aka ".NET Framework Class Inheritance Vulnerability."

5 2010-09-22 CVE-2010-3332

Microsoft .NET Framework 1.1 SP1, 2.0 SP1 and SP2, 3.5, 3.5 SP1, 3.5.1, and 4.0, as used for ASP.NET in Microsoft Internet Information Services (IIS), provides detailed error codes during decryption attempts, which allows remote attackers to decrypt and modify encrypted View State (aka __VIEWSTATE) form data, and possibly forge cookies or read application files, via a padding oracle attack, aka "ASP.NET Padding Oracle Vulnerability."

9.3 2009-10-14 CVE-2009-2497

The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0, 2.0 SP1, 2.0 SP2, 3.5, and 3.5 SP1, and Silverlight 2, does not properly handle interfaces, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted Silverlight application, (3) a crafted ASP.NET application, or (4) a crafted .NET Framework application, aka "Microsoft Silverlight and Microsoft .NET Framework CLR Vulnerability."

9.3 2009-10-14 CVE-2009-0091

Microsoft .NET Framework 2.0, 2.0 SP1, and 3.5 does not properly enforce a certain type-equality constraint in .NET verifiable code, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft .NET Framework Type Verification Vulnerability."

9.3 2009-10-14 CVE-2009-0090

Microsoft .NET Framework 1.0 SP3, 1.1 SP1, and 2.0 SP1 does not properly validate .NET verifiable code, which allows remote attackers to obtain unintended access to stack memory, and execute arbitrary code, via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft .NET Framework Pointer Verification Vulnerability."

4.3 2008-08-27 CVE-2008-3843

Request Validation (aka the ValidateRequest filters) in ASP.NET in Microsoft .NET Framework with the MS07-040 update does not properly detect dangerous client input, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a query string containing a "<~/" (less-than tilde slash) sequence followed by a crafted STYLE element.

4.3 2008-08-27 CVE-2008-3842

Request Validation (aka the ValidateRequest filters) in ASP.NET in Microsoft .NET Framework without the MS07-040 update does not properly detect dangerous client input, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a query string containing a "

7.5 2005-08-19 CVE-2005-2127

Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."

CWE : Common Weakness Enumeration

%idName
29% (7) CWE-20 Improper Input Validation
20% (5) CWE-264 Permissions, Privileges, and Access Controls
16% (4) CWE-94 Failure to Control Generation of Code ('Code Injection')
8% (2) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
8% (2) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
4% (1) CWE-399 Resource Management Errors
4% (1) CWE-310 Cryptographic Issues
4% (1) CWE-200 Information Exposure
4% (1) CWE-19 Data Handling

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Name
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-7 Blind SQL Injection
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-13 Subverting Environment Variable Values
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-22 Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-28 Fuzzing
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-32 Embedding Scripts in HTTP Query Strings
CAPEC-42 MIME Conversion
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-52 Embedding NULL Bytes
CAPEC-53 Postfix, Null Terminate, and Backslash
CAPEC-63 Simple Script Injection
CAPEC-64 Using Slashes and URL Encoding Combined to Bypass Validation Logic
CAPEC-66 SQL Injection
CAPEC-67 String Format Overflow in syslog()
CAPEC-71 Using Unicode Encoding to Bypass Validation Logic

Open Source Vulnerability Database (OSVDB)

id Description
76214 Microsoft .NET Framework / Silverlight Class Inheritance Restriction Web Page...
68127 Microsoft ASP.NET ViewState Cryptographic Padding Remote Information Disclosure
58851 Microsoft .NET Framework / Silverlight Crafted Application Memory Manipulatio...
58850 Microsoft .NET Framework Object Casting Manipulation Arbitrary Code Execution
58849 Microsoft .NET Framework Crafted Application Managed Pointer Access Arbitrary...
49385 Microsoft ASP.NET Request Validation <~/ Crafted STYLE Element XSS
49384 Microsoft ASP.NET Request Validation </ Query String XSS
19093 Microsoft Design Tools msdds.dll COM Object Arbitrary Code Execution
13926 Multiple ASP.NET Implementation Full Width Ascii Character Arbitrary HTML Inj...
2692 Microsoft Windows Design Tools MDT2DD.DLL COM Object Memory Corruption Comman...

ExploitDB Exploits

id Description
35280 .NET Remoting Services Remote Command Execution
33892 MS14-009 .NET Deployment Service IE Sandbox Escape

OpenVAS Exploits

id Description
2012-11-14 Name : Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
File : nvt/secpod_ms12-074.nasl
2012-08-10 Name : Gentoo Security Advisory GLSA 201206-13 (mono mono-debugger)
File : nvt/glsa_201206_13.nasl
2012-05-09 Name : Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
File : nvt/secpod_ms12-035.nasl
2012-04-11 Name : Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
File : nvt/secpod_ms12-025.nasl
2011-10-12 Name : Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability ...
File : nvt/secpod_ms11-078.nasl
2010-09-29 Name : Microsoft ASP.NET Information Disclosure Vulnerability (2418042)
File : nvt/secpod_ms10-070_remote.nasl
2009-10-15 Name : Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
File : nvt/secpod_ms09-061.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0105 Multiple Vulnerabilities in Microsoft .NET Framework (MS15-048)
Severity: Category II - VMSKEY: V0060647
2015-A-0089 Microsoft .NET Framework Information Disclosure Vulnerability (MS15-041)
Severity: Category I - VMSKEY: V0059893
2014-A-0173 Microsoft .NET Framework Remote Privilege Escalation Vulnerability
Severity: Category I - VMSKEY: V0057383
2014-A-0128 Microsoft .NET Framework Security Feature Bypass Vulnerability
Severity: Category II - VMSKEY: V0053805
2014-A-0073 Microsoft .NET Framework Privilege Escalation Vulnerability
Severity: Category I - VMSKEY: V0050455
2014-B-0013 Multiple Vulnerabilities in Microsoft .NET Framework
Severity: Category I - VMSKEY: V0044036
2013-B-0071 Multiple Vulnerabilities in Microsoft .NET Framework and Silverlight
Severity: Category II - VMSKEY: V0039211
2013-A-0006 Multiple Vulnerabilities in Microsoft .NET Framework
Severity: Category I - VMSKEY: V0036453
2012-A-0184 Multiple Remote Code Execution Vulnerabilities in Microsoft .NET Framework
Severity: Category I - VMSKEY: V0034955
2012-A-0080 Multiple Remote Code Execution Vulnerabilities in Microsoft .NET Framework
Severity: Category I - VMSKEY: V0032305

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 Microsoft Internet Explorer WMI ASDI Extension ActiveX object access
RuleID : 4236 - Type : BROWSER-PLUGINS - Revision : 16
2014-01-10 Microsoft Internet Explorer Helper Object for Java ActiveX object access
RuleID : 4235 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer MSVTDGridCtrl7 ActiveX object access
RuleID : 4234 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer Visual Database Tools Query Designer v7.0 ActiveX...
RuleID : 4233 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer SysTray Invoker ActiveX object access
RuleID : 4232 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer SysTray ActiveX object access
RuleID : 4231 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer Search Assistant UI ActiveX object access
RuleID : 4230 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer MSAPP Export Support for Office Access ActiveX ob...
RuleID : 4229 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Windows Start Menu ActiveX object access
RuleID : 4228 - Type : BROWSER-PLUGINS - Revision : 14
2014-01-10 Microsoft Internet Explorer Network Connections ActiveX object access
RuleID : 4227 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer DocHost User Interface Handler ActiveX object access
RuleID : 4226 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer Repository ActiveX object access
RuleID : 4225 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer VideoPort ActiveX object access
RuleID : 4224 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer OpenCable Class ActiveX object access
RuleID : 4223 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer Outllib.dll ActiveX object access
RuleID : 4222 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer ProxyStub Dispatch ActiveX object access
RuleID : 4221 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Windows Network and Dial-Up Connections ActiveX object access
RuleID : 4220 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Windows Network Connections Tray ActiveX object access
RuleID : 4219 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Microsoft Windows Visual Basic WebClass ActiveX object access
RuleID : 4218 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Office Services on the Web Free/Busy ActiveX object access
RuleID : 4217 - Type : BROWSER-PLUGINS - Revision : 14
2014-01-10 Microsoft Internet Explorer CLSID_CComAcctImport ActiveX object access
RuleID : 4216 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer HTML Popup Window ActiveX object access
RuleID : 4215 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer TipGW Init ActiveX object access
RuleID : 4214 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer DDS Picture Shape Control ActiveX object access
RuleID : 4213 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer DDS Generic Class ActiveX object access
RuleID : 4212 - Type : BROWSER-PLUGINS - Revision : 15

Nessus® Vulnerability Scanner

id Description
2015-05-12 Name: The version of the .NET Framework installed on the remote host is affected by...
File: smb_nt_ms15-048.nasl - Type: ACT_GATHER_INFO
2015-04-14 Name: The version of the Microsoft .NET Framework installed on the remote host is a...
File: smb_nt_ms15-041.nasl - Type: ACT_GATHER_INFO
2014-11-12 Name: The version of the .NET Framework installed on the remote host is affected by...
File: smb_nt_ms14-072.nasl - Type: ACT_GATHER_INFO
2014-09-10 Name: The version of the .NET Framework installed on the remote host is affected by...
File: smb_nt_ms14-053.nasl - Type: ACT_GATHER_INFO
2014-08-12 Name: The version of the .NET Framework installed on the remote host is affected by...
File: smb_nt_ms14-046.nasl - Type: ACT_GATHER_INFO
2014-05-14 Name: The version of the .NET Framework installed on the remote host is affected by...
File: smb_nt_ms14-026.nasl - Type: ACT_GATHER_INFO
2014-02-12 Name: The version of the .NET Framework installed on the remote host is affected by...
File: smb_nt_ms14-009.nasl - Type: ACT_GATHER_INFO
2013-07-10 Name: The .NET Framework install on the remote Windows host could allow arbitrary c...
File: smb_nt_ms13-052.nasl - Type: ACT_GATHER_INFO
2013-01-09 Name: The version of the .NET Framework installed on the remote host is affected by...
File: smb_nt_ms13-004.nasl - Type: ACT_GATHER_INFO
2012-11-14 Name: The version of the .NET Framework installed on the remote host is affected by...
File: smb_nt_ms12-074.nasl - Type: ACT_GATHER_INFO
2012-06-22 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201206-13.nasl - Type: ACT_GATHER_INFO
2012-05-09 Name: The .NET Framework install on the remote Windows host could allow arbitrary c...
File: smb_nt_ms12-035.nasl - Type: ACT_GATHER_INFO
2012-04-11 Name: The .NET Framework install on the remote Windows host could allow arbitrary c...
File: smb_nt_ms12-025.nasl - Type: ACT_GATHER_INFO
2012-04-05 Name: The web application framework used on the remote host may be susceptible to c...
File: asp_net_validaterequest_bypass.nasl - Type: ACT_GATHER_INFO
2012-03-21 Name: The remote SuSE 10 host is missing a security-related patch.
File: suse_bytefx-data-mysql-8001.nasl - Type: ACT_GATHER_INFO
2012-02-22 Name: A multimedia application framework installed on the remote Mac OS X host is a...
File: macosx_ms11-078.nasl - Type: ACT_GATHER_INFO
2011-10-11 Name: The version of the .NET Framework installed on the remote host allows arbitra...
File: smb_nt_ms11-078.nasl - Type: ACT_GATHER_INFO
2011-04-22 Name: The remote SuSE 11 host is missing one or more security updates.
File: suse_11_bytefx-data-mysql-110331.nasl - Type: ACT_GATHER_INFO
2010-10-29 Name: A web application hosted on the remote server is potentially prone to a paddi...
File: padding_oracle.nasl - Type: ACT_MIXED_ATTACK
2010-10-08 Name: The version of the .NET framework installed on the remote host has an informa...
File: padding_oracle_ms10-070.nasl - Type: ACT_ATTACK
2010-09-28 Name: The version of the .NET framework installed on the remote host has an informa...
File: smb_nt_ms10-070.nasl - Type: ACT_GATHER_INFO
2009-10-14 Name: The Microsoft .NET Common Language Runtime is affected by multiple vulnerabil...
File: smb_nt_ms09-061.nasl - Type: ACT_GATHER_INFO
2005-10-11 Name: Arbitrary code can be executed on the remote host through the web client.
File: smb_nt_ms05-052.nasl - Type: ACT_GATHER_INFO