2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2010-2363" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2010-08-30T20:00:01.983" ,
2025-04-11 02:06:08 +00:00
"lastModified" : "2025-04-11T00:51:21.963" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address."
} ,
{
"lang" : "es" ,
"value" : "La implementaci\u00f3n de la funcionalidad \"Reverse Path Forwarding\" (RPF) Unicast de IPv6 de los enrutadores SEIL/X1, SEIL/X2 y SEIL/B1 con firmware v1.00 hasta la v2.73, si el modo estricto (strict) es utilizado, no descarta apropiadamente paquetes, lo que puede permitir a atacantes remotos evitar las restricciones de acceso previstas a trav\u00e9s de una direcci\u00f3n IP falseada."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:N" ,
2024-11-22 11:14:00 +00:00
"baseScore" : 5.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 11:14:00 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 4.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-264"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:1.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0B23BF51-78E0-46B7-8288-16EB6C1D210C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:1.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "953C86E4-3E0F-4A75-BD27-EF8BE4F48894"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:1.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D3D7717A-A3E4-45A8-A774-3C2855267FCE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:1.21:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A7500641-D607-4221-ADA2-CBCC338F22A6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:1.22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "21A290E5-32F5-42AE-BDE8-C92B84A44D01"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:1.30:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ACAB1F52-6BC3-418D-AC2A-F66C34B6E2DF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:1.31:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "35BC7F97-3208-43EE-B931-A28CD9A3515F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:1.32:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3C03EE30-DC89-4926-A1FF-F878B4F9E205"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:1.40:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "90546F95-8BA1-4F13-86F4-91F797528281"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:1.41:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5FA8842C-D4BF-4B8F-89EC-DAEE94AB8A12"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:1.43:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F9A47FE3-A7E3-41FF-81B2-A41CCB776924"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:1.44:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8B75E486-B21A-4155-A4F8-155CD3A2EB59"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7858BAD1-7CFD-4602-9BC4-E4FC82EA38DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BFC463DA-EEBC-4D74-B7C5-3235C15DFBF0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E10BC7EF-5A3B-4026-9EDA-15061EBF814E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "23564CCD-7EF3-4457-99FB-BFE966D35D5B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BD52B307-EA12-48FC-ACD5-01AEDED44A5D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "36F1D4E9-40BB-4BA6-9C44-5E06C8D98291"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF6EC374-64D2-4990-A4C4-86529CCF27C5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DAAA887F-7944-4C31-A191-0A39BC4E6544"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.52:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "35A5F2AA-23C4-43D4-B355-A9971503E3DA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.60:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "51EA78DB-5273-48F5-9350-EABAEE8FD79A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.61:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E805B146-572E-466E-BF0B-6B53970A72EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.62:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "86AAEE2F-8D63-4167-A6C8-DAD2F235015D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.63:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C83696CE-91F3-4559-B16A-D1CF1C915515"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.70:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4FF4C61B-393E-44E4-9404-BC331C8E8729"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.72:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CF4E913E-1E8D-439B-8B77-35A54E42EC98"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.73:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C75C2643-7F2A-4C34-94A0-DCB60399EF07"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9A63E557-3BA6-4E0E-8597-BAA112B21DEF"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:1.00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D3E85DA6-E3A3-43AA-8144-F1404DEB7F4F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:1.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5CE87EF1-4EA4-4490-A3E7-BA911A5F37AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:1.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "59204C16-8DC1-4BA0-9F73-560CC6D0E37B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:1.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "22F3DFD4-AFDB-4F24-AB48-D03A64BE4AA0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:1.21:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D4D9FA28-CFF2-4B84-90BC-A04C9E0C7BBC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:1.22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A3F5ABC9-271D-4E9A-A3E7-C53C1A96B8D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:1.30:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A420F017-83DC-4029-A0F8-F50ED600CEA3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:1.31:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2923D4A5-FD10-4846-B2F5-93C64DEB081E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:1.32:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D07EB84-D033-423B-AD53-D7B47DC508C1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:1.40:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CB31A5D1-6219-4E7D-965A-65C885C71C62"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:1.41:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4383E0DF-E0D2-4E59-8053-CFD57F4C11C7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:1.43:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "25B9C033-965D-420F-8F71-C650592D5AE6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:1.44:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3CCB5982-5ECF-471C-8731-59AB4784055F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EF907907-1E85-4F85-84ED-0DB73466186F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "429DBDFD-C32D-4888-BC36-FCE5896FC963"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C4C47A3C-D478-44E9-8183-735CF9CFBC2A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "416DCB14-271A-4578-9AE7-418C75ADC4C7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FEBFCE3F-FE95-4559-A972-5241D48CB902"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0064F721-57E1-4AC4-A3C3-92E05B64F0F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ED8A76A3-9CD8-4A3C-BDD4-53407A92E527"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "509DC30B-7D2F-43A7-9FD3-71FC405F520E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.52:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "809E64CE-504D-49BB-8C76-09D95F814893"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.60:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FE0DC6F5-9E0E-4FA9-A5A1-323229A8325A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.61:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7B70D647-FEC1-4ED8-BF60-D3E9852DF4CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.62:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8FC22870-8A4A-483E-AA38-325E1564E4AA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.63:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "07952D84-10F6-46D0-B896-89401F063888"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.70:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3BB8C1C6-D47D-4A85-8997-9E356688DA24"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.72:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "07AB01A2-0CC3-49E6-B1A1-FF1BD918019E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:1.00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "43F0BE07-FC42-4AB1-A553-1B254CC57D4E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.01:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1DADC38F-D530-49FC-A834-3BBC5FF71C27"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E8A3B3F1-3342-4F6B-A0CC-4A1A7D6E163F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F76EDD89-9C58-40BE-B7AE-72E82D051641"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2CA0DBD0-9181-45DB-83AB-74B63C4644DA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "488614FD-E4DF-4E6B-B928-444D98076F4A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B6A638B5-5FBC-4193-879D-883CF2777200"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CCE84A44-AAB5-4D3F-ADE5-617E58B14E68"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "507272EC-6B90-46DA-9E9A-EF5DCB770E7D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C74FA35-319D-4B10-868A-A6CFAD137978"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.52:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "62B1B7C9-70C7-456B-B8C3-FF9BFECF6B1C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.60:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BAFEF605-5A5F-4738-9DE3-30F7CCA41B7B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.61:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "71B53A2B-FF57-42B1-957B-E01CC8DE087B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.62:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8C0D8323-9921-415C-B47C-49A947068F68"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.63:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EEBE6E5A-691F-46EF-B999-18ED949BF2A1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.70:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "11181F82-4A35-43AD-838E-E07092DF8652"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.72:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FD9E04C4-EA46-4F14-A60B-12CAD9E98485"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4BE3BBD4-FB2E-4543-9149-0452B26FAC31"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://jvn.jp/en/jp/JVN12683004/index.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/41088" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.seil.jp/seilseries/security/2010/a00875.php" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382" ,
"source" : "cve@mitre.org"
2024-11-22 11:14:00 +00:00
} ,
{
"url" : "http://jvn.jp/en/jp/JVN12683004/index.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/41088" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.seil.jp/seilseries/security/2010/a00875.php" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}