VAR-201002-0160
Vulnerability from variot - Updated: 2021-12-17 09:07The Single Sign-on (SSO) functionality in IBM WebSphere Application Server (WAS) 7.0.0.0 through 7.0.0.8 does not recognize the Requires SSL configuration option, which might allow remote attackers to obtain sensitive information by sniffing network sessions that were expected to be encrypted. Based on the Java and Servlet engines, the IBM Websphere Application Server supports a variety of HTTP services to help users with everything from development and release to maintaining interactive, dynamic websites. IBM WebSphere Application Server (WAS) is prone to a security-bypass vulnerability. Successful exploits may allow attackers to bypass certain security restrictions, which may lead to other attacks. This issue affects WAS 7.0 through 7.0.0.8
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201002-0160",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "websphere application server",
"scope": "eq",
"trust": 1.9,
"vendor": "ibm",
"version": "7.0.0.7"
},
{
"model": "websphere application server",
"scope": "eq",
"trust": 1.9,
"vendor": "ibm",
"version": "7.0.0.1"
},
{
"model": "websphere application server",
"scope": "eq",
"trust": 1.9,
"vendor": "ibm",
"version": "7.0"
},
{
"model": "websphere application server",
"scope": "eq",
"trust": 1.9,
"vendor": "ibm",
"version": "7.0.0.5"
},
{
"model": "websphere application server",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "7.0.0.3"
},
{
"model": "websphere application server",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "7.0.0.8"
},
{
"model": "websphere application server",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "7.0.0.0 to 7.0.0.8"
},
{
"model": "websphere application server",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "7.0.0.0-7.0.0.8"
},
{
"model": "websphere application server",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7.03"
},
{
"model": "websphere application server",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7.0.8"
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2010-0563"
},
{
"db": "CNNVD",
"id": "CNNVD-201002-068"
},
{
"db": "CNVD",
"id": "CNVD-2010-0217"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001085"
},
{
"db": "BID",
"id": "38122"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2010-0563"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "IBM ncsupp@ca.ibm.com",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201002-068"
}
],
"trust": 0.6
},
"cve": "CVE-2010-0563",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/severity#"
},
"@id": "https://www.variotdbs.pl/ref/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2010-0563",
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.8,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2010-0563",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201002-068",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2010-0563"
},
{
"db": "CNNVD",
"id": "CNNVD-201002-068"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001085"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Single Sign-on (SSO) functionality in IBM WebSphere Application Server (WAS) 7.0.0.0 through 7.0.0.8 does not recognize the Requires SSL configuration option, which might allow remote attackers to obtain sensitive information by sniffing network sessions that were expected to be encrypted. Based on the Java and Servlet engines, the IBM Websphere Application Server supports a variety of HTTP services to help users with everything from development and release to maintaining interactive, dynamic websites. IBM WebSphere Application Server (WAS) is prone to a security-bypass vulnerability. \nSuccessful exploits may allow attackers to bypass certain security restrictions, which may lead to other attacks. \nThis issue affects WAS 7.0 through 7.0.0.8",
"sources": [
{
"db": "NVD",
"id": "CVE-2010-0563"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001085"
},
{
"db": "CNVD",
"id": "CNVD-2010-0217"
},
{
"db": "BID",
"id": "38122"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2010-0563",
"trust": 3.3
},
{
"db": "SECUNIA",
"id": "38425",
"trust": 3.0
},
{
"db": "BID",
"id": "38122",
"trust": 2.7
},
{
"db": "OSVDB",
"id": "62140",
"trust": 2.4
},
{
"db": "SECTRACK",
"id": "1023551",
"trust": 1.4
},
{
"db": "VUPEN",
"id": "ADV-2010-0316",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001085",
"trust": 0.8
},
{
"db": "NSFOCUS",
"id": "14472",
"trust": 0.6
},
{
"db": "AIXAPAR",
"id": "PM00610",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201002-068",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2010-0217",
"trust": 0.6
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2010-0563"
},
{
"db": "CNNVD",
"id": "CNNVD-201002-068"
},
{
"db": "CNVD",
"id": "CNVD-2010-0217"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001085"
},
{
"db": "BID",
"id": "38122"
}
]
},
"id": "VAR-201002-0160",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-0217"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-0217"
}
]
},
"last_update_date": "2021-12-17T09:07:09.869000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "1417839",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21417839"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for ibm i",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2938"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2942"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2946"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2950"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2954"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2958"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2962"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2966"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2970"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for ibm i",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2937"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2941"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2945"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2949"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2953"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2957"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2961"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2965"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2969"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for ibm i",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2936"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2940"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2944"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2948"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2952"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2956"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2960"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2964"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2968"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for ibm i",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2935"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2939"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2943"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2947"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2951"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2955"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2959"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2963"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2967"
},
{
"title": "7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=2971"
},
{
"title": "IBM WebSphere Application Server Requires SSL option bypasses security-restricted vulnerability patches",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/2381"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201002-068"
},
{
"db": "CNVD",
"id": "CNVD-2010-0217"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001085"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.8
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2010-0563"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001085"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "http://securitytracker.com/id?1023551"
},
{
"trust": 2.4,
"url": "http://www.securityfocus.com/bid/38122"
},
{
"trust": 1.9,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21417839"
},
{
"trust": 1.6,
"url": "http://secunia.com/advisories/38425"
},
{
"trust": 1.6,
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1pm00610"
},
{
"trust": 1.6,
"url": "http://www.osvdb.org/62140"
},
{
"trust": 1.4,
"url": "http://secunia.com/advisories/38425/"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0563"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0563"
},
{
"trust": 0.8,
"url": "http://osvdb.org/62140"
},
{
"trust": 0.8,
"url": "http://www.vupen.com/english/advisories/2010/0316"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/14472"
},
{
"trust": 0.3,
"url": "http://www-01.ibm.com/software/websphere/"
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2010-0563"
},
{
"db": "CNNVD",
"id": "CNNVD-201002-068"
},
{
"db": "CNVD",
"id": "CNVD-2010-0217"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001085"
},
{
"db": "BID",
"id": "38122"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2010-0563"
},
{
"db": "CNNVD",
"id": "CNNVD-201002-068"
},
{
"db": "CNVD",
"id": "CNVD-2010-0217"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001085"
},
{
"db": "BID",
"id": "38122"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-02-08T21:30:00",
"db": "NVD",
"id": "CVE-2010-0563"
},
{
"date": "2010-02-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201002-068"
},
{
"date": "2010-02-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2010-0217"
},
{
"date": "2010-02-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2010-001085"
},
{
"date": "2010-02-05T00:00:00",
"db": "BID",
"id": "38122"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-11-03T04:00:00",
"db": "NVD",
"id": "CVE-2010-0563"
},
{
"date": "2010-02-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201002-068"
},
{
"date": "2010-02-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2010-0217"
},
{
"date": "2010-02-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2010-001085"
},
{
"date": "2015-04-13T21:02:00",
"db": "BID",
"id": "38122"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201002-068"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "IBM WebSphere Application Server of Single Sign-on Vulnerabilities that capture important information on functions",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2010-001085"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201002-068"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.