We found results for “”
CVE-2018-0786
Good to know:
Date: January 9, 2018
Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, .NET Core 1.0 and 2.0, and PowerShell Core 6.0.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka ".NET Security Feature Bypass Vulnerability."
Language: C#
Severity Score
Related Resources (9)
Severity Score
Top Fix
Upgrade Version
Upgrade to version microsoft.netcore.universalwindowsplatform - 5.2.4;microsoft.netcore.universalwindowsplatform - 5.3.5;microsoft.netcore.universalwindowsplatform - 5.4.2;microsoft.netcore.universalwindowsplatform - 6.0.6;system.servicemodel.primitives - 4.4.1;system.servicemodel.primitives - 4.3.1;system.servicemodel.primitives - 4.1.1;system.servicemodel.http - 4.4.1;system.servicemodel.http - 4.3.1;system.servicemodel.http - 4.1.1;system.servicemodel.nettcp - 4.4.1;system.servicemodel.nettcp - 4.3.1;system.servicemodel.nettcp - 4.1.1;system.servicemodel.duplex - 4.4.1;system.servicemodel.duplex - 4.3.1;system.servicemodel.duplex - 4.0.2;system.servicemodel.security - 4.4.1;system.servicemodel.security - 4.3.1;system.servicemodel.security - 4.0.2;system.private.servicemodel - 4.4.1;system.private.servicemodel - 4.3.1;system.private.servicemodel - 4.1.1
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | NETWORK |
| Access Complexity (AC): | LOW |
| Authentication (AU): | NONE |
| Confidentiality (C): | NONE |
| Integrity (I): | PARTIAL |
| Availability (A): | NONE |
| Additional information: |
Vulnerabilities
Projects
Contact Us


