cve-2010-0274
Vulnerability from cvelistv5
Published
2010-01-09 18:00
Modified
2024-08-07 00:45
Severity ?
EPSS score ?
0.30%
(0.6935)
Summary
Unspecified vulnerability in the Edit Contact scene in Ultra-light Mode in IBM Lotus iNotes (aka Domino Web Access or DWA) before 229.241 for Domino 8.0.2 FP3 has unknown impact and attack vectors, aka SPR LSHR7TBLY5.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T00:45:11.364Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "38026", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/38026", }, { name: "ADV-2010-0077", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2010/0077", }, { name: "domino-ultralight-unspecified(55470)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/55470", }, { name: "37675", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/37675", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg27017776", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2010-01-07T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in the Edit Contact scene in Ultra-light Mode in IBM Lotus iNotes (aka Domino Web Access or DWA) before 229.241 for Domino 8.0.2 FP3 has unknown impact and attack vectors, aka SPR LSHR7TBLY5.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-16T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "38026", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/38026", }, { name: "ADV-2010-0077", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2010/0077", }, { name: "domino-ultralight-unspecified(55470)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/55470", }, { name: "37675", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/37675", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg27017776", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2010-0274", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in the Edit Contact scene in Ultra-light Mode in IBM Lotus iNotes (aka Domino Web Access or DWA) before 229.241 for Domino 8.0.2 FP3 has unknown impact and attack vectors, aka SPR LSHR7TBLY5.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "38026", refsource: "SECUNIA", url: "http://secunia.com/advisories/38026", }, { name: "ADV-2010-0077", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2010/0077", }, { name: "domino-ultralight-unspecified(55470)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/55470", }, { name: "37675", refsource: "BID", url: "http://www.securityfocus.com/bid/37675", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg27017776", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg27017776", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2010-0274", datePublished: "2010-01-09T18:00:00", dateReserved: "2010-01-09T00:00:00", dateUpdated: "2024-08-07T00:45:11.364Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"229.231\", \"matchCriteriaId\": \"4B327550-1809-4982-A927-48D3392B7A22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.011:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62AF2DA6-98E4-4921-B36C-AA5771B3629E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.021:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CC0B87F-B742-466D-BF93-56BFECAC2E54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.031:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"708BEAEF-B186-470D-8148-9C0703B42765\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.041:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83C58751-33AE-4A3F-A096-AB13FC8A64A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.051:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01E2E70E-3C00-4AA2-AF8D-349E82806FA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.061:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3508BE09-6B84-4819-BC0F-7E23964FE29D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.101:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A17FFE5-97F5-45D0-8C54-3C22BF1FFA72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.111:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE8C8052-8980-4265-929B-E27B6A914B4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.131:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D6C0F89-47E6-4895-909D-6AF8DBFE2477\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.141:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"590EBAF8-04A9-4DAD-9FCF-B1B38FF03374\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.151:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"717F7305-98E1-403D-B08A-6FE1FD83D2C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.161:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C4B46DA-B4E6-4AB0-AD85-7C77EFE14063\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.171:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1862CF3-0BF2-4F1B-80A9-0B5B02005A1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.181:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CC9488A-F368-498E-8CDE-2ADC6AED470B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.191:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2F8C056-91A2-410B-942A-E108B93AD1E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.201:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCD1A2BB-F7FC-4FE1-B633-F0AF79E0F5FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.211:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"805C7074-679E-4F11-A055-8C52B4E26F5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:lotus_inotes:229.221:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"840A1975-0C5B-44F0-9F2E-1BBE02AA0484\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:ibm:lotus_domino:8.0.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D419EFAE-E03F-4F4A-8C18-06BE61EBBF5D\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"Unspecified vulnerability in the Edit Contact scene in Ultra-light Mode in IBM Lotus iNotes (aka Domino Web Access or DWA) before 229.241 for Domino 8.0.2 FP3 has unknown impact and attack vectors, aka SPR LSHR7TBLY5.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad sin especificar en Edit Contact scene en Ultra-light Mode en IBM Lotus iNotes (tambi\\u00e9n conocido como Domino Web Access o DWA) anterior a v229.241 para Domino v8.0.2 FP3 tiene un impacto y vectores de ataque desconocidos, tambi\\u00e9n conocido como SPR LSHR7TBLY5.\"}]", evaluatorSolution: "http://www-933.ibm.com/support/fixcentral/", id: "CVE-2010-0274", lastModified: "2024-11-21T01:11:53.083", metrics: "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": true, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2010-01-09T18:30:01.870", references: "[{\"url\": \"http://secunia.com/advisories/38026\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg27017776\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/37675\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/0077\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/55470\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/38026\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg27017776\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/37675\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/0077\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/55470\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2010-0274\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2010-01-09T18:30:01.870\",\"lastModified\":\"2024-11-21T01:11:53.083\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in the Edit Contact scene in Ultra-light Mode in IBM Lotus iNotes (aka Domino Web Access or DWA) before 229.241 for Domino 8.0.2 FP3 has unknown impact and attack vectors, aka SPR LSHR7TBLY5.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad sin especificar en Edit Contact scene en Ultra-light Mode en IBM Lotus iNotes (también conocido como Domino Web Access o DWA) anterior a v229.241 para Domino v8.0.2 FP3 tiene un impacto y vectores de ataque desconocidos, también conocido como SPR LSHR7TBLY5.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"229.231\",\"matchCriteriaId\":\"4B327550-1809-4982-A927-48D3392B7A22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.011:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62AF2DA6-98E4-4921-B36C-AA5771B3629E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.021:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC0B87F-B742-466D-BF93-56BFECAC2E54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.031:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"708BEAEF-B186-470D-8148-9C0703B42765\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.041:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C58751-33AE-4A3F-A096-AB13FC8A64A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.051:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01E2E70E-3C00-4AA2-AF8D-349E82806FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.061:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3508BE09-6B84-4819-BC0F-7E23964FE29D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.101:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A17FFE5-97F5-45D0-8C54-3C22BF1FFA72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.111:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE8C8052-8980-4265-929B-E27B6A914B4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.131:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D6C0F89-47E6-4895-909D-6AF8DBFE2477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.141:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"590EBAF8-04A9-4DAD-9FCF-B1B38FF03374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.151:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"717F7305-98E1-403D-B08A-6FE1FD83D2C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.161:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C4B46DA-B4E6-4AB0-AD85-7C77EFE14063\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.171:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1862CF3-0BF2-4F1B-80A9-0B5B02005A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.181:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC9488A-F368-498E-8CDE-2ADC6AED470B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.191:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F8C056-91A2-410B-942A-E108B93AD1E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.201:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCD1A2BB-F7FC-4FE1-B633-F0AF79E0F5FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.211:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"805C7074-679E-4F11-A055-8C52B4E26F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:lotus_inotes:229.221:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"840A1975-0C5B-44F0-9F2E-1BBE02AA0484\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:ibm:lotus_domino:8.0.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D419EFAE-E03F-4F4A-8C18-06BE61EBBF5D\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/38026\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg27017776\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/37675\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0077\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/55470\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/38026\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg27017776\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/37675\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0077\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/55470\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorSolution\":\"http://www-933.ibm.com/support/fixcentral/\"}}", }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.