VAR-201002-0066

Vulnerability from variot - Updated: 2021-12-18 05:43

Unspecified vulnerability in the administrative interface in the embedded HTTPS server on the Cisco IronPort Encryption Appliance 6.2.x before 6.2.9.1 and 6.5.x before 6.5.2, and the IronPort PostX MAP before 6.2.9.1, allows remote attackers to read arbitrary files via unknown vectors, aka IronPort Bug 65921. Cisco IronPort Encryption Appliance is prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information contained in arbitrary files. This issue is being tracked by IronPort bug 65921. The following products are affected. IronPort Encryption Appliance 6.5 (prior to 6.5.2) IronPort Encryption Appliance 6.2 (prior to 6.2.9.1) IronPort PostX MAP (prior to 6.2.9.1). A remote attacker reads arbitrary files through unknown vectors

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201002-0066",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "6.2.6"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "6.5"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "6.2.7"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "6.2.7.5"
      },
      {
        "model": "ironport postx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "6.2.2.1"
      },
      {
        "model": "ironport postx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "6.2.2.2"
      },
      {
        "model": "ironport postx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "6.2.1"
      },
      {
        "model": "ironport postx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "6.2.2"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "6.5.0.1"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "6.2.7.6"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "6.2.5"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "6.2.4"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "6.2.7.3"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "6.2.4.1"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "6.2.7.1"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "6.2.7.4"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "6.2.7.2"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "6.2.9.1"
      },
      {
        "model": "ironport postx map",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.2.9"
      },
      {
        "model": "ironport postx map",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.2"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.52"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.2.9"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.2.77"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.2.41"
      },
      {
        "model": "ironport postx map",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.2.9.1"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.5.2"
      },
      {
        "model": "ironport encryption appliance",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.2.9.1"
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-0143"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201002-108"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-003778"
      },
      {
        "db": "BID",
        "id": "38168"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_postx:6.2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_postx:6.2.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.4.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_postx:6.2.2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_postx:6.2.2.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-0143"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Jesse Michael and Alexander Senkevitch of Blue Cross Blue Shield of Illinois",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201002-108"
      },
      {
        "db": "BID",
        "id": "38168"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2010-0143",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2010-0143",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.8,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VH-CVE-2010-0143",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2010-0143",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201002-108",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VUL-HUB",
            "id": "VH-CVE-2010-0143",
            "trust": 0.1,
            "value": "High risk"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-0143"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201002-108"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-003778"
      },
      {
        "db": "VULHUB",
        "id": "VH-CVE-2010-0143"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unspecified vulnerability in the administrative interface in the embedded HTTPS server on the Cisco IronPort Encryption Appliance 6.2.x before 6.2.9.1 and 6.5.x before 6.5.2, and the IronPort PostX MAP before 6.2.9.1, allows remote attackers to read arbitrary files via unknown vectors, aka IronPort Bug 65921. Cisco IronPort Encryption Appliance is prone to an information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information contained in arbitrary files. \nThis issue is being tracked by IronPort bug 65921. \nThe  following products are affected. \nIronPort Encryption Appliance 6.5 (prior to 6.5.2)\nIronPort Encryption Appliance 6.2 (prior to 6.2.9.1)\nIronPort PostX MAP (prior to 6.2.9.1). A remote attacker reads arbitrary files through unknown vectors",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-0143"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-003778"
      },
      {
        "db": "BID",
        "id": "38168"
      },
      {
        "db": "VULHUB",
        "id": "VH-CVE-2010-0143"
      }
    ],
    "trust": 1.98
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "http://cve.scap.org.cn/vuln/vh-cve-2010-0143",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VH-CVE-2010-0143"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2010-0143",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "38525",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-003778",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201002-108",
        "trust": 0.7
      },
      {
        "db": "CISCO",
        "id": "20100210 MULTIPLE VULNERABILITIES IN CISCO IRONPORT ENCRYPTION APPLIANCE",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "38168",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VH-CVE-2010-0143",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-0143"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201002-108"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-003778"
      },
      {
        "db": "BID",
        "id": "38168"
      },
      {
        "db": "VULHUB",
        "id": "VH-CVE-2010-0143"
      }
    ]
  },
  "id": "VAR-201002-0066",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VH-CVE-2010-0143"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2021-12-18T05:43:57.642000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Multiple Vulnerabilities in Cisco IronPort Encryption Appliance",
        "trust": 0.8,
        "url": "http://www.cisco.com/en/us/products/csa/cisco-sa-20100210-ironport.html"
      },
      {
        "title": "Identifying and Mitigating Exploitation of the Multiple Vulnerabilities in IronPort Encryption Appliance",
        "trust": 0.8,
        "url": "http://www.cisco.com/c/en/us/support/docs/cmb/cisco-amb-20100210-ironport.html"
      },
      {
        "title": "cisco-sa-20100210-ironport",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20100210-ironport"
      },
      {
        "title": "19881",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=19881"
      },
      {
        "title": "cisco-sa-20100210-ironport",
        "trust": 0.8,
        "url": "http://www.cisco.com/cisco/web/support/jp/113/1136/1136140_cisco-sa-20100210-ironport-j.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-003778"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-0143"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "http://www.cisco.com/en/us/products/products_security_advisory09186a0080b17903.shtml"
      },
      {
        "trust": 1.6,
        "url": "http://www.cisco.com/en/us/products/products_applied_mitigation_bulletin09186a0080b17904.html"
      },
      {
        "trust": 1.0,
        "url": "http://secunia.com/advisories/38525"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0143"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0143"
      },
      {
        "trust": 0.3,
        "url": "http://www.ironport.com/products/ironport_encryption.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20100210-ironport.shtml"
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-0143"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201002-108"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-003778"
      },
      {
        "db": "BID",
        "id": "38168"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2010-0143"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201002-108"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-003778"
      },
      {
        "db": "BID",
        "id": "38168"
      },
      {
        "db": "VULHUB",
        "id": "VH-CVE-2010-0143"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2010-02-11T17:30:00",
        "db": "NVD",
        "id": "CVE-2010-0143"
      },
      {
        "date": "2010-02-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201002-108"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-003778"
      },
      {
        "date": "2010-02-10T00:00:00",
        "db": "BID",
        "id": "38168"
      },
      {
        "date": "2010-02-11T00:00:00",
        "db": "VULHUB",
        "id": "VH-CVE-2010-0143"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2010-02-26T07:10:00",
        "db": "NVD",
        "id": "CVE-2010-0143"
      },
      {
        "date": "2010-02-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201002-108"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-003778"
      },
      {
        "date": "2010-02-10T00:00:00",
        "db": "BID",
        "id": "38168"
      },
      {
        "date": "2010-02-26T00:00:00",
        "db": "VULHUB",
        "id": "VH-CVE-2010-0143"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201002-108"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco IronPort Encryption Appliance Vulnerability to read arbitrary files in management interfaces such as",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-003778"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201002-108"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…