Old Asp.Net Version in Use
- Risk:
Low
- Type:
- Passive
- CWE:
- CWE-642
- Summary
This website uses ASP.NET version 1.0 or 1.1.
- Solution
Ensure the engaged framework is still supported by Microsoft.
PhantomCaptcha ClickFix attack targets Ukraine war relief orgs
Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft's July Patch
Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys
Sharepoint ToolShell attacks targeted orgs across four continents
Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware
TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution
TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution
Vidar Stealer 2.0 adds multi-threaded data theft, better evasion
CVE-2016-7836 SKYSEA Client View Improper Authentication Vulnerability
CVE-2022-48503 Apple Multiple Products Unspecified Vulnerability
CVE-2017-3881 Cisco IOS and IOS XE Remote Code Execution Vulnerability
CVE-2021-43226 Microsoft Windows Privilege Escalation Vulnerability
CVE-2025-33073 Microsoft Windows SMB Client Improper Access Control Vulnerability
CVE-2025-59230 Microsoft Windows Improper Access Control Vulnerability
CVE-2023-20273 Cisco IOS XE Web UI Command Injection Vulnerability
CVE-2025-6264 Rapid7 Velociraptor Incorrect Default Permissions Vulnerability
InformationalSplit Viewstate in Use
InformationalSec-Fetch-Mode Header Has an Invalid Value
InformationalInformation Disclosure - Sensitive Information in URL
LowServer Leaks Information via "X-Powered-By" HTTP Response Header Field(s)
InformationalAuthentication Request Identified
MediumVulnerable JS Library
Free online web security scanner