CVE-2010-0145
Published Feb 11, 2010
Last updated 15 years ago
Overview
- Description
- Unspecified vulnerability in the embedded HTTPS server on the Cisco IronPort Encryption Appliance 6.2.x before 6.2.9.1 and 6.5.x before 6.5.2, and the IronPort PostX MAP before 6.2.9.1, allows remote attackers to execute arbitrary code via unknown vectors, aka IronPort Bug 65923.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41DF7FFA-66B5-45E8-B57E-FB307E4DB8CD" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E3CAA06A-C849-49B9-B6B7-7E3BF41F705C" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6539D9D7-E3DF-475C-B53D-CF11220FBA27" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7486F8C6-F2E5-4790-BA3A-FA36CF7A8704" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1262F096-DB00-4D52-894D-3BA812AEF570" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "097FCF52-65CF-4AF5-97BC-8B310610DFB9" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8A0A514-959C-4017-B0AB-AFC9D0A979E4" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A06BEC91-C3A6-4590-94A7-EA783A12ABF9" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF9BCDE5-CEF8-4D25-AE6A-D4AF2B2DFBD0" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90A1B821-0FDD-40C8-93FA-06BB895E83D1" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9EF0B9B-B5D9-4F2D-A4E9-24349747435A" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CF6D489-B7EA-4705-B136-6B96CC179046" }, { "criteria": "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "391503D9-FE43-4A34-A67D-AB3B52996FA0" }, { "criteria": "cpe:2.3:h:cisco:ironport_postx:6.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BACB1F5F-542E-44B2-AF54-6D61294E57A0" }, { "criteria": "cpe:2.3:h:cisco:ironport_postx:6.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EA0DB42-01D6-4B14-934B-23C11CB8D062" }, { "criteria": "cpe:2.3:h:cisco:ironport_postx:6.2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A66E714E-6414-4B3F-ABFB-8DE44F3E7065" }, { "criteria": "cpe:2.3:h:cisco:ironport_postx:6.2.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B0BE0FF-376B-4BA4-8CEF-EFCF3BDC1D4C" } ], "operator": "OR" } ] } ]