vulnerability
Oracle Linux: CVE-2020-1147: ELSA-2020-2938: .NET Core security and bugfix update (CRITICAL) (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Jul 14, 2020 | Jul 17, 2020 | Dec 3, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Jul 14, 2020
Added
Jul 17, 2020
Modified
Dec 3, 2025
Description
A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'.
It was discovered that .NET Core did not properly check the source markup of XML files. A remote, unauthenticated attacker could possibly exploit this flaw to execute arbitrary code by sending specially crafted requests to an application parsing certain kinds of XML files or an ASP.NET Core application.
It was discovered that .NET Core did not properly check the source markup of XML files. A remote, unauthenticated attacker could possibly exploit this flaw to execute arbitrary code by sending specially crafted requests to an application parsing certain kinds of XML files or an ASP.NET Core application.
Solutions
oracle-linux-upgrade-aspnetcore-runtime-3-1oracle-linux-upgrade-aspnetcore-targeting-pack-3-1oracle-linux-upgrade-dotnetoracle-linux-upgrade-dotnet-apphost-pack-3-1oracle-linux-upgrade-dotnet-hostoracle-linux-upgrade-dotnet-host-fxr-2-1oracle-linux-upgrade-dotnet-hostfxr-3-1oracle-linux-upgrade-dotnet-runtime-2-1oracle-linux-upgrade-dotnet-runtime-3-1oracle-linux-upgrade-dotnet-sdk-2-1oracle-linux-upgrade-dotnet-sdk-2-1-5xxoracle-linux-upgrade-dotnet-sdk-3-1oracle-linux-upgrade-dotnet-targeting-pack-3-1oracle-linux-upgrade-dotnet-templates-3-1oracle-linux-upgrade-netstandard-targeting-pack-2-1
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.