Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2008-5100

EPSS 27.76% · P96
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2008-5100

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The strong name (SN) implementation in Microsoft .NET Framework 2.0.50727 relies on the digital signature Public Key Token embedded in the pathname of a DLL file instead of the digital signature of this file itself, which makes it easier for attackers to bypass Global Assembly Cache (GAC) and Code Access Security (CAS) protection mechanisms, aka MSRC ticket MSRC8566gs.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft .NET Framework strong name(SN)implementation 加密问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft .NET Framework是一个软件框架,可以运行在微软Windows操作系统的计算机上。它包括一个编码解决共同规划和虚拟机的管理框架以及编写的具体程序的大型运行库。 Microsoft .NET Framework 中的strong name(SN)implementation依赖于公共密钥数字签名的一个DLL文件路径名,而不是DLL文件本身,这使得攻击者更易于绕过全局程序集缓存(GAC)和代码访问安全(CAS)保护机制,又称MSRC ticket MSRC8566gs。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2008-5100

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2008-5100

Please Login to view more intelligence information

Same Patch Batch · n/a · 2008-11-17 · 30 CVEs total

CVE-2008-4824Adobe Flash Player 输入确认错误安全漏洞
CVE-2008-5107Citrix Presentation Server和Desktop Server MSI日志文件信息泄露漏洞
CVE-2008-5106Sami FTP Server 'SamyFtp.binlog'远程拒绝服务漏洞
CVE-2008-5105Sami FTP Server 多个远程拒绝服务漏洞
CVE-2008-5104Ubuntu vm-builder 默认的密码本地安全绕过漏洞
CVE-2008-5103Ubuntu vm-builder 启动帐户配置本地安全绕过漏洞
CVE-2008-5102Zope PythonScript 'PythonScriptss'拒绝服务漏洞
CVE-2008-5101OptiPNG BMP阅读器畸形头的图形文件缓冲区溢出漏洞
CVE-2008-5099Sun Logical Domain Manager 'OpenBoot PROM' 本地安全绕过漏洞
CVE-2008-5098Sun Java System Messaging Server 跨站脚本攻击漏洞
CVE-2008-4216Apple Safari WebKit插件接口安全信息泄露漏洞
CVE-2008-3644Apple Safari 页面缓存用户信息泄露漏洞
CVE-2008-3623Apple Safari安全漏洞
CVE-2008-5110Balabit syslog-ng 权限许可和访问控制问题漏洞
CVE-2008-5108Adobe AIR 未明代码注入漏洞
CVE-2006-5268Trend Micro ServerProtect RPC接口非授权访问漏洞
CVE-2008-5113wordpress REQUEST全局数组跨站请求伪造漏洞
CVE-2008-5112Microsoft活动目录LDAP服务器用户名枚举漏洞
CVE-2008-5111Sun Solaris '3SOCKET' 本地拒绝服务漏洞
CVE-2008-5025Linux Kernel hfs_cat_find_brec()函数本地拒绝服务漏洞

Showing top 20 of 30 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2008-5100

No comments yet


Leave a comment