Known vulnerabilities in Microsoft ASP.NET Core MVC 2.1.0

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › Microsoft › ASP.NET Core MVC › 2.1.0

Known vulnerabilities in Microsoft ASP.NET Core MVC 2.1.0

Vendor: Microsoft
Website: https://www.microsoft.com
Total Security Bulletins: 11
2.1 3.0 3.1 2.2 2.1.0 2.0 1.1.1 1.1.0 1.0.0

Security bulletins (11)

Secuity bulletin Severity Status Published
SB2021081011: Multiple vulnerabilities in Microsoft .NET Core and Visual Studio Medium
Patched
10.08.2021
SB2021020950: Multiple vulnerabilities in Microsoft .NET Core and Visual Studio High
Patched
09.02.2021
SB2020090864: Security restrictions bypass in Microsoft ASP.NET Core Medium
Patched
08.09.2020
SB2020071463: Remote code execution in Microsoft .NET Framework, SharePoint Server, and Visual Studio High
Patched Exploited
14.07.2020
SB2020051240: Denial of service in Microsoft .NET Core and .NET Framework Medium
Patched
12.05.2020
SB2020011436: Multiple vulnerabilities in Microsoft ASP.NET Core High
Patched Public exploit
14.01.2020
SB2019021312: Multiple vulnerabilities in Microsoft .NET Framework High
Patched
13.02.2019
SB2019010815: Denial of service in Microsoft ASP.NET Core Low
Patched
08.01.2019
SB2019010814: Information disclosure in Microsoft .NET Framework Low
Patched
08.01.2019
SB2018111406: Unrestricted upload of files in .NET Core Low
Patched
14.11.2018
SB2018101014: Information disclosure in .NET Core Medium
Patched
10.10.2018

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or