Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-3416 | First vendor Publication | 2011-12-29 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:S/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 8.5 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 6.8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 allows remote authenticated users to obtain access to arbitrary user accounts via a crafted username, aka "ASP.Net Forms Authentication Bypass Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3416 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-12-30 | Name : Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2638420) File : nvt/secpod_ms11-100.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
78055 | Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2012-01-05 | IAVM : 2012-A-0001 - Multiple Vulnerabilities in Microsoft .NET Framework Severity : Category I - VMSKEY : V0030927 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows IIS .NET null character username truncation attempt RuleID : 25251 - Revision : 5 - Type : SERVER-IIS |
2014-01-10 | Microsoft Windows IIS .NET null character username truncation attempt RuleID : 25250 - Revision : 6 - Type : SERVER-IIS |
2014-01-10 | Microsoft Windows IIS .NET null character username truncation attempt RuleID : 20829 - Revision : 9 - Type : SERVER-IIS |
2014-01-10 | Microsoft Windows IIS aspx login ReturnURL arbitrary redirect attempt RuleID : 20828 - Revision : 10 - Type : SERVER-IIS |
2014-01-10 | generic web server hashing collision attack RuleID : 20825 - Revision : 11 - Type : SERVER-WEBAPP |
2014-01-10 | generic web server hashing collision attack RuleID : 20824 - Revision : 13 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-12-29 | Name : The version of ASP.NET Framework installed on the remote host is affected by ... File : smb_nt_ms11-100.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:03:13 |
|
2024-11-28 12:27:08 |
|
2024-08-02 12:17:38 |
|
2024-08-02 01:05:09 |
|
2024-02-02 01:17:08 |
|
2024-02-01 12:05:01 |
|
2023-12-07 21:28:01 |
|
2023-09-05 12:16:05 |
|
2023-09-05 01:04:54 |
|
2023-09-02 12:16:10 |
|
2023-09-02 01:04:59 |
|
2023-08-12 12:19:34 |
|
2023-08-12 01:05:00 |
|
2023-08-11 12:16:15 |
|
2023-08-11 01:05:09 |
|
2023-08-06 12:15:37 |
|
2023-08-06 01:05:00 |
|
2023-08-04 12:15:41 |
|
2023-08-04 01:05:00 |
|
2023-07-14 12:15:40 |
|
2023-07-14 01:04:58 |
|
2023-03-29 01:17:34 |
|
2023-03-28 12:05:05 |
|
2022-10-11 12:13:59 |
|
2022-10-11 01:04:43 |
|
2021-05-04 12:17:32 |
|
2021-04-22 01:20:52 |
|
2020-09-28 17:22:43 |
|
2020-05-23 00:31:06 |
|
2019-05-09 12:04:12 |
|
2019-02-26 17:19:36 |
|
2018-10-31 00:20:16 |
|
2018-10-13 05:18:33 |
|
2018-09-20 12:09:17 |
|
2017-09-19 09:24:55 |
|
2016-09-30 01:03:19 |
|
2016-08-31 12:03:04 |
|
2016-08-05 12:03:24 |
|
2016-06-28 18:49:22 |
|
2016-04-26 21:04:01 |
|
2014-02-17 11:05:10 |
|
2014-01-19 21:28:08 |
|
2013-11-11 12:39:35 |
|
2013-09-02 17:19:49 |
|
2013-05-10 23:07:21 |
|
2013-01-30 13:21:06 |
|