CVE-2006-7192

medium

Description

Microsoft ASP .NET Framework 2.0.50727.42 does not properly handle comment (/* */) enclosures, which allows remote attackers to bypass request filtering and conduct cross-site scripting (XSS) attacks, or cause a denial of service, as demonstrated via an xss:expression STYLE attribute in a closing XSS HTML tag.

References

http://www.securityfocus.com/bid/20753

http://www.securityfocus.com/archive/1/464796/100/0/threaded

http://www.procheckup.com/Vulner_PR0703.php

http://www.cpni.gov.uk/docs/re-20061020-00710.pdf

http://securityreason.com/securityalert/2530

http://osvdb.org/35269

Details

Source: Mitre, NVD

Published: 2007-04-10

Updated: 2018-10-16

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Severity: Medium