Exploiting this vulnerability could allow attackers to view data, such as the View State, which was encrypted by the target server, or read data from files on the target server, such as web.config, ...