{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T21:01:12.980","vulnerabilities":[{"cve":{"id":"CVE-2010-0711","sourceIdentifier":"cve@mitre.org","published":"2010-02-25T20:30:00.640","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site request forgery (CSRF) vulnerability in default.asp in ASPCode CMS 1.5.8, 2.0.0 Build 103, and possibly other versions, allows remote attackers to hijack the authentication of an administrator for requests that (1) delete users via the delete action in the ma2 parameter or (2) create administrators via the update action in the ma2 parameter."},{"lang":"es","value":"Vulnerabilidad de falsificación de petición en sitios cruzados en default.asp en ASPCode CMS v1.5.8, v2.0.0 Build 103 y posiblemente otras versiones, permite a atacantes remotos secuestrar la autenticación de un administrador para peticiones de (1) borrado de usuarios a través de la acción \"delete\" en el parámetro \"ma2\" o (2) crear administradores a través de la acción \"update\" en el parámetro \"ma2\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:aspcodecms:aspcode_cms:1.5.8:*:*:*:*:*:*:*","matchCriteriaId":"22874292-8640-413E-8B29-5C16E4E6D7C1"},{"vulnerable":true,"criteria":"cpe:2.3:a:aspcodecms:aspcode_cms:2.0.0:*:*:*:*:*:*:*","matchCriteriaId":"FFBB0F2A-FAF5-4907-B72A-FFFC49B05765"}]}]}],"references":[{"url":"http://osvdb.org/62357","source":"cve@mitre.org"},{"url":"http://packetstormsecurity.org/1002-exploits/aspcodecms-xssxsrf.txt","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://secunia.com/advisories/38596","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://osvdb.org/62357","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://packetstormsecurity.org/1002-exploits/aspcodecms-xssxsrf.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://secunia.com/advisories/38596","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}