Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-3415 | First vendor Publication | 2011-12-29 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Open redirect vulnerability in the Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted return URL, aka "Insecure Redirect in .NET Form Authentication Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3415 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-12-30 | Name : Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2638420) File : nvt/secpod_ms11-100.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
78054 | Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary S... |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2012-01-05 | IAVM : 2012-A-0001 - Multiple Vulnerabilities in Microsoft .NET Framework Severity : Category I - VMSKEY : V0030927 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows IIS .NET null character username truncation attempt RuleID : 25251 - Revision : 5 - Type : SERVER-IIS |
2014-01-10 | Microsoft Windows IIS .NET null character username truncation attempt RuleID : 25250 - Revision : 6 - Type : SERVER-IIS |
2014-01-10 | Microsoft Windows IIS .NET null character username truncation attempt RuleID : 20829 - Revision : 9 - Type : SERVER-IIS |
2014-01-10 | Microsoft Windows IIS aspx login ReturnURL arbitrary redirect attempt RuleID : 20828 - Revision : 10 - Type : SERVER-IIS |
2014-01-10 | generic web server hashing collision attack RuleID : 20825 - Revision : 11 - Type : SERVER-WEBAPP |
2014-01-10 | generic web server hashing collision attack RuleID : 20824 - Revision : 13 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-12-29 | Name : The version of ASP.NET Framework installed on the remote host is affected by ... File : smb_nt_ms11-100.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:03:13 |
|
2024-11-28 12:27:08 |
|
2024-08-02 12:17:38 |
|
2024-08-02 01:05:09 |
|
2024-02-02 01:17:08 |
|
2024-02-01 12:05:01 |
|
2023-12-07 21:28:01 |
|
2023-09-05 12:16:05 |
|
2023-09-05 01:04:54 |
|
2023-09-02 12:16:10 |
|
2023-09-02 01:04:59 |
|
2023-08-12 12:19:34 |
|
2023-08-12 01:05:00 |
|
2023-08-11 12:16:15 |
|
2023-08-11 01:05:09 |
|
2023-08-06 12:15:37 |
|
2023-08-06 01:05:00 |
|
2023-08-04 12:15:41 |
|
2023-08-04 01:05:00 |
|
2023-07-14 12:15:40 |
|
2023-07-14 01:04:58 |
|
2023-03-29 01:17:34 |
|
2023-03-28 12:05:05 |
|
2022-10-11 12:13:59 |
|
2022-10-11 01:04:43 |
|
2021-05-04 12:17:32 |
|
2021-04-22 01:20:52 |
|
2020-09-28 17:22:43 |
|
2020-05-23 00:31:06 |
|
2019-05-09 12:04:12 |
|
2019-02-26 17:19:36 |
|
2018-10-31 00:20:16 |
|
2018-10-13 05:18:33 |
|
2018-09-20 12:09:17 |
|
2017-09-19 09:24:55 |
|
2016-09-30 01:03:19 |
|
2016-08-31 12:03:04 |
|
2016-08-05 12:03:24 |
|
2016-06-28 18:49:21 |
|
2014-02-17 11:05:10 |
|
2014-01-19 21:28:08 |
|
2013-12-31 13:19:04 |
|
2013-11-11 12:39:35 |
|
2013-05-10 23:07:21 |
|