CVE-2010-0143
Published Feb 11, 2010
Last updated 15 years ago
Overview
- Description
- Unspecified vulnerability in the administrative interface in the embedded HTTPS server on the Cisco IronPort Encryption Appliance 6.2.x before 6.2.9.1 and 6.5.x before 6.5.2, and the IronPort PostX MAP before 6.2.9.1, allows remote attackers to read arbitrary files via unknown vectors, aka IronPort Bug 65921.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41DF7FFA-66B5-45E8-B57E-FB307E4DB8CD" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E3CAA06A-C849-49B9-B6B7-7E3BF41F705C" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6539D9D7-E3DF-475C-B53D-CF11220FBA27" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7486F8C6-F2E5-4790-BA3A-FA36CF7A8704" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1262F096-DB00-4D52-894D-3BA812AEF570" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "097FCF52-65CF-4AF5-97BC-8B310610DFB9" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8A0A514-959C-4017-B0AB-AFC9D0A979E4" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A06BEC91-C3A6-4590-94A7-EA783A12ABF9" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF9BCDE5-CEF8-4D25-AE6A-D4AF2B2DFBD0" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90A1B821-0FDD-40C8-93FA-06BB895E83D1" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9EF0B9B-B5D9-4F2D-A4E9-24349747435A" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CF6D489-B7EA-4705-B136-6B96CC179046" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "391503D9-FE43-4A34-A67D-AB3B52996FA0" }, { "criteria": "cpe:2.3:h:cisco:ironport_postx:6.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BACB1F5F-542E-44B2-AF54-6D61294E57A0" }, { "criteria": "cpe:2.3:h:cisco:ironport_postx:6.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EA0DB42-01D6-4B14-934B-23C11CB8D062" }, { "criteria": "cpe:2.3:h:cisco:ironport_postx:6.2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A66E714E-6414-4B3F-ABFB-8DE44F3E7065" }, { "criteria": "cpe:2.3:h:cisco:ironport_postx:6.2.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B0BE0FF-376B-4BA4-8CEF-EFCF3BDC1D4C" } ], "operator": "OR" } ] } ]