Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://twitter.com/thaidn/statuses/24832350146", "name": "http://twitter.com/thaidn/statuses/24832350146", "tags": ["Broken Link"], "refsource": "MISC"}, {"url": "http://secunia.com/advisories/41409", "name": "41409", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://securitytracker.com/id?1024459", "name": "1024459", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "SECTRACK"}, {"url": "http://weblogs.asp.net/scottgu/archive/2010/09/18/important-asp-net-security-vulnerability.aspx", "name": "http://weblogs.asp.net/scottgu/archive/2010/09/18/important-asp-net-security-vulnerability.aspx", "tags": ["Mitigation", "Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.troyhunt.com/2010/09/fear-uncertainty-and-and-padding-oracle.html", "name": "http://www.troyhunt.com/2010/09/fear-uncertainty-and-and-padding-oracle.html", "tags": ["Exploit", "Third Party Advisory"], "refsource": "MISC"}, {"url": "http://www.ekoparty.org/juliano-rizzo-2010.php", "name": "http://www.ekoparty.org/juliano-rizzo-2010.php", "tags": ["Broken Link"], "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/43316", "name": "43316", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "BID"}, {"url": "http://isc.sans.edu/diary.html?storyid=9568", "name": "http://isc.sans.edu/diary.html?storyid=9568", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "http://blogs.technet.com/b/srd/archive/2010/09/17/understanding-the-asp-net-vulnerability.aspx", "name": "http://blogs.technet.com/b/srd/archive/2010/09/17/understanding-the-asp-net-vulnerability.aspx", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.vupen.com/english/advisories/2010/2429", "name": "ADV-2010-2429", "tags": ["Third Party Advisory"], "refsource": "VUPEN"}, {"url": "http://www.theinquirer.net/inquirer/news/1732956/security-researchers-destroy-microsoft-aspnet-security", "name": "http://www.theinquirer.net/inquirer/news/1732956/security-researchers-destroy-microsoft-aspnet-security", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "http://pentonizer.com/general-programming/aspnet-poet-vulnerability-what-else-can-i-do/", "name": "http://pentonizer.com/general-programming/aspnet-poet-vulnerability-what-else-can-i-do/", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "http://www.dotnetnuke.com/Community/Blogs/tabid/825/EntryId/2799/Oracle-Padding-Vulnerability-in-ASP-NET.aspx", "name": "http://www.dotnetnuke.com/Community/Blogs/tabid/825/EntryId/2799/Oracle-Padding-Vulnerability-in-ASP-NET.aspx", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "http://threatpost.com/en_us/blogs/new-crypto-attack-affects-millions-aspnet-apps-091310", "name": "http://threatpost.com/en_us/blogs/new-crypto-attack-affects-millions-aspnet-apps-091310", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "http://www.microsoft.com/technet/security/advisory/2416728.mspx", "name": "http://www.microsoft.com/technet/security/advisory/2416728.mspx", "tags": ["Broken Link"], "refsource": "CONFIRM"}, {"url": "http://www.vupen.com/english/advisories/2010/2751", "name": "ADV-2010-2751", "tags": ["Third Party Advisory"], "refsource": "VUPEN"}, {"url": "http://www.mono-project.com/Vulnerabilities#ASP.NET_Padding_Oracle", "name": "http://www.mono-project.com/Vulnerabilities#ASP.NET_Padding_Oracle", "tags": ["Exploit", "Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61898", "name": "ms-aspdotnet-padding-info-disclosure(61898)", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "XF"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12365", "name": "oval:org.mitre.oval:def:12365", "tags": ["Third Party Advisory"], "refsource": "OVAL"}, {"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-070", "name": "MS10-070", "tags": ["Patch", "Vendor Advisory"], "refsource": "MS"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Microsoft .NET Framework 1.1 SP1, 2.0 SP1 and SP2, 3.5, 3.5 SP1, 3.5.1, and 4.0, as used for ASP.NET in Microsoft Internet Information Services (IIS), provides detailed error codes during decryption attempts, which allows remote attackers to decrypt and modify encrypted View State (aka __VIEWSTATE) form data, and possibly forge cookies or read application files, via a padding oracle attack, aka \"ASP.NET Padding Oracle Vulnerability.\""}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-209"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2010-3332", "ASSIGNER": "secure@microsoft.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 6.4, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "acInsufInfo": false, "impactScore": 4.9, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2010-09-22T19:00Z", "configurations": {"nodes": [{"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:microsoft:.net_framework:2.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:microsoft:.net_framework:3.5:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:microsoft:.net_framework:4.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_services:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2020-11-23T19:50Z"}