First published: Wed Aug 27 2008(Updated: )
Request Validation (aka the ValidateRequest filters) in ASP.NET in Microsoft .NET Framework without the MS07-040 update does not properly detect dangerous client input, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a query string containing a "</" (less-than slash) sequence.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows-nt | =2003-gold | |
Microsoft Windows-nt | =2003-sp1 | |
Microsoft Windows-nt | =2003-sp1 | |
Microsoft Windows-nt | =2003-sp2 | |
Microsoft Windows-nt | =2003-sp2 | |
Microsoft Windows-nt | =2003-sp2 | |
Microsoft Windows-nt | =xp-gold | |
Microsoft Windows-nt | =xp-sp3 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Vista | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft .NET Framework | =2.0 | |
Microsoft Windows-nt | =2008 | |
Microsoft Windows-nt | =2008 | |
Microsoft Windows-nt | =2008 | |
Microsoft .NET Framework | =1.1-sp1 | |
Microsoft Windows-nt | =xp-gold | |
Microsoft Windows-nt | =xp-gold | |
Microsoft .NET Framework | =1.0-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.