vulnerability
Microsoft CVE-2020-1046: .NET Framework Remote Code Execution Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Aug 11, 2020 | Aug 11, 2020 | Jan 31, 2023 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Aug 11, 2020
Added
Aug 11, 2020
Modified
Jan 31, 2023
Description
A remote code execution vulnerability exists when Microsoft .NET Framework processes input. An attacker who successfully exploited this vulnerability could take control of an affected system.
To exploit the vulnerability, an attacker would need to be able to upload a specially crafted file to a web application.
The security update addresses the vulnerability by correcting how .NET Framework processes input.
Solutions
msft-kb4569734-0333d119-0c1e-4de8-afc4-05554ef5b4d2msft-kb4569734-1957e8db-d8da-46af-9e77-6870ac800c00msft-kb4569734-5c515855-bad9-4303-9600-813576dbfb9cmsft-kb4569735-c1ac6e02-a342-4d7d-941a-1f564b6f128cmsft-kb4569735-c9992622-ff1f-450e-a599-f7d88e8b9a9emsft-kb4569736-38f059d8-ec7e-4acc-85ed-15d1763d10afmsft-kb4569736-43c58af4-65be-45ae-85b8-6934fd4c6612msft-kb4569736-657d81bf-c532-464f-ae89-9aa2e4d2df11msft-kb4569736-7288194c-bfe1-458c-8624-b055248aa1ecmsft-kb4569736-a0e96798-b50b-4b12-9dcb-122bd04fe534msft-kb4569737-0c925519-829b-499f-b9fb-6df82bf5609fmsft-kb4569737-e7d8510b-fbf8-4ab3-b186-7bc087721b90msft-kb4569745-1b2771e7-a685-4061-9e91-bbda95b24aa1msft-kb4569745-c709b6e1-5b83-4875-8809-331f32856223msft-kb4569745-c716531b-4fd5-4053-ad48-a8babd38fd66msft-kb4569750-4393107e-7ade-4192-8ab6-630e30f43f67msft-kb4569750-534543fa-7648-456d-b246-2cd0dbd197c1msft-kb4569750-f20d8323-c388-4d9d-8da9-9c45c0f66706msft-kb4569751-5b794275-98dc-41a8-bc6b-4db4e7cc2946msft-kb4569751-9da5fcaf-1bb6-487b-9c5d-05ebb3ffc190msft-kb4569751-a02f1a9e-1925-478d-b706-e3c147c0a16cmsft-kb4569751-bf3081ee-025a-4b21-9c9e-8f3bbdbc8b19msft-kb4569751-d4808c42-f2ba-4783-bd81-c652ef19eb48msft-kb4569751-f06ccd6e-6bbf-485c-be2c-6b757f88b2d7msft-kb4569776-5d5954cf-d72d-4367-9619-d20ddcba0663msft-kb4569776-a4c662b9-74e5-4034-a054-ac67b6cbd112msft-kb4569776-deb7a75a-6441-4a43-a8cb-18075a0d4c55msft-kb4571692-35b6992c-7f9d-4d4b-8392-0623b701e193msft-kb4571692-ba6c6e9a-2502-4add-ab90-b963061e27c3msft-kb4571694-8746ee3a-0b54-44a5-ae6d-cc65dceca5bcmicrosoft-windows-windows_server_2016-1607-kb4571694msft-kb4571694-ec438944-1e2f-4f6d-b23e-0069e7647acfmsft-kb4571709-9b65ac66-ab1d-4b6d-a5ea-f5892a1ffc01msft-kb4571709-db45332d-658c-455c-80bc-9813e1b1b3dcmsft-kb4571741-821804e3-a34d-4a92-bcf8-e9f8904540abmsft-kb4571741-e73df191-2791-492b-acc4-0914e852f0ea
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.