ID

VAR-201008-0257


CVE

CVE-2010-2363


TITLE

SEIL/X Series and SEIL/B1 IPv6 Unicast RPF vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2010-000032

DESCRIPTION

The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address. SEIL/X Series and SEIL/B1 are routers. Only IPv6 Unicast RPF in strict mode is vulnerable. According to the developer, IPv6 Unicast RPF in loose mode and IPv4 Unicast RPF are not affected by this vulnerability.Packets that should be discarded, such as when an IP address is spoofed, may be transferred without being discarded. Seil/x2 Firmware is prone to a security bypass vulnerability. ---------------------------------------------------------------------- Secunia receives 'Frost & Sullivan's Global 2010 Customer Value Enhancement Award Secunia outshines its competitors and receives the Frost & Sullivan’s Global 2010 Customer Value Enhancement Award. Based on its recent analysis of the vulnerability research market, Frost & Sullivan concluded: "Secunia provides tremendous value for their customers, end-users, and to other security vendors." Read more: http://secunia.com/blog/117/ ---------------------------------------------------------------------- TITLE: SEIL Routers IPv6 Unicast RPF Spoofing Vulnerability SECUNIA ADVISORY ID: SA41088 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/41088/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=41088 RELEASE DATE: 2010-08-26 DISCUSS ADVISORY: http://secunia.com/advisories/41088/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/41088/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=41088 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in SEIL routers, which can be exploited by malicious people to conduct spoofing attacks. The vulnerability is reported in the following products: * SEIL/X1 firmware version 1.00 through 2.73 * SEIL/X2 firmware version 1.00 through 2.73 * SEIL/B1 firmware version 1.00 through 2.73 SOLUTION: Upgrade to firmware version 2.74. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: SEIL: http://www.seil.jp/seilseries/security/2010/a00875.php OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2010-2363 // JVNDB: JVNDB-2010-000032 // BID: 78900 // VULHUB: VHN-44968 // VULMON: CVE-2010-2363 // PACKETSTORM: 93040

AFFECTED PRODUCTS

vendor:iijmodel:seil\/x1scope:eqversion:1.10

Trust: 1.6

vendor:iijmodel:seil\/x1scope:eqversion:2.51

Trust: 1.6

vendor:iijmodel:seil\/x1scope:eqversion:2.62

Trust: 1.6

vendor:iijmodel:seil\/x1scope:eqversion:1.11

Trust: 1.6

vendor:iijmodel:seil\/x1scope:eqversion:2.72

Trust: 1.6

vendor:iijmodel:seil\/x1scope:eqversion:2.63

Trust: 1.6

vendor:iijmodel:seil\/x1scope:eqversion:2.70

Trust: 1.6

vendor:iijmodel:seil\/x1scope:eqversion:1.20

Trust: 1.6

vendor:iijmodel:seil\/x1scope:eqversion:2.52

Trust: 1.6

vendor:iijmodel:seil\/x1scope:eqversion:2.73

Trust: 1.6

vendor:iijmodel:seil\/x1scope:eqversion:1.30

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.40

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.60

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.20

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.30

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.72

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.61

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.50

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.31

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.41

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.40

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.72

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.62

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.41

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.20

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.60

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.32

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.43

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.44

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.30

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.50

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.41

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.70

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.30

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.40

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.42

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.60

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.50

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.42

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.22

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.70

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.43

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.44

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:1.00

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.21

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.40

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.42

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.00

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.11

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.22

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.52

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.21

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.40

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.52

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.63

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.51

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.10

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.51

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.61

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.63

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.31

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.41

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.20

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.20

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.10

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.10

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.32

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.61

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.62

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.30

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.01

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.41

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.10

Trust: 1.0

vendor:internet initiativemodel:seil/b1scope:eqversion:firmware 1.00 to 2.73

Trust: 0.8

vendor:internet initiativemodel:seil/x1scope:eqversion:firmware 1.00 to 2.73

Trust: 0.8

vendor:internet initiativemodel:seil/x2scope:eqversion:firmware 1.00 to 2.73

Trust: 0.8

vendor:iijmodel:seil%2fx2scope:eqversion:2.72

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:2.70

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:2.63

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:2.62

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:2.61

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:2.60

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:2.52

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:2.51

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:2.50

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:2.42

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:2.41

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:2.40

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:2.30

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:2.20

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:2.10

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:1.44

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:1.43

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:1.41

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:1.40

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:1.32

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:1.31

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:1.30

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:1.22

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:1.21

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:1.20

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:1.11

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:1.10

Trust: 0.3

vendor:iijmodel:seil%2fx2scope:eqversion:1.00

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.73

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.72

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.70

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.63

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.62

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.61

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.60

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.52

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.51

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.50

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.42

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.41

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.40

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.30

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.20

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:2.10

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:1.44

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:1.43

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:1.41

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:1.40

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:1.32

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:1.31

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:1.30

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:1.22

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:1.21

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:1.20

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:1.11

Trust: 0.3

vendor:iijmodel:seil%2fx1scope:eqversion:1.10

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.72

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.70

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.63

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.62

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.61

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.60

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.52

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.51

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.50

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.42

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.41

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.40

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.30

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.20

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.10

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:2.01

Trust: 0.3

vendor:iijmodel:seil%2fb1scope:eqversion:1.00

Trust: 0.3

sources: BID: 78900 // JVNDB: JVNDB-2010-000032 // CNNVD: CNNVD-201008-364 // NVD: CVE-2010-2363

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-2363
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2010-000032
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201008-364
value: MEDIUM

Trust: 0.6

VULHUB: VHN-44968
value: MEDIUM

Trust: 0.1

VULMON: CVE-2010-2363
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-2363
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

IPA: JVNDB-2010-000032
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-44968
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-44968 // VULMON: CVE-2010-2363 // JVNDB: JVNDB-2010-000032 // CNNVD: CNNVD-201008-364 // NVD: CVE-2010-2363

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-44968 // JVNDB: JVNDB-2010-000032 // NVD: CVE-2010-2363

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201008-364

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201008-364

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-000032

PATCH

title:a00875url:http://www.seil.jp/seilseries/security/2010/a00875.php

Trust: 0.8

sources: JVNDB: JVNDB-2010-000032

EXTERNAL IDS

db:NVDid:CVE-2010-2363

Trust: 2.9

db:JVNid:JVN12683004

Trust: 2.6

db:JVNDBid:JVNDB-2010-000032

Trust: 2.6

db:SECUNIAid:41088

Trust: 1.3

db:CNNVDid:CNNVD-201008-364

Trust: 0.7

db:JVNid:JVN#12683004

Trust: 0.6

db:BIDid:78900

Trust: 0.5

db:XFid:61382

Trust: 0.3

db:VULHUBid:VHN-44968

Trust: 0.1

db:VULMONid:CVE-2010-2363

Trust: 0.1

db:PACKETSTORMid:93040

Trust: 0.1

sources: VULHUB: VHN-44968 // VULMON: CVE-2010-2363 // BID: 78900 // JVNDB: JVNDB-2010-000032 // PACKETSTORM: 93040 // CNNVD: CNNVD-201008-364 // NVD: CVE-2010-2363

REFERENCES

url:http://jvn.jp/en/jp/jvn12683004/index.html

Trust: 2.6

url:http://www.seil.jp/seilseries/security/2010/a00875.php

Trust: 2.2

url:http://jvndb.jvn.jp/en/contents/2010/jvndb-2010-000032.html

Trust: 1.8

url:http://secunia.com/advisories/41088

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/61382

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2363

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2363

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/61382

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.securityfocus.com/bid/78900

Trust: 0.1

url:http://secunia.com/advisories/41088/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=41088

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/41088/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/blog/117/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-44968 // VULMON: CVE-2010-2363 // BID: 78900 // JVNDB: JVNDB-2010-000032 // PACKETSTORM: 93040 // CNNVD: CNNVD-201008-364 // NVD: CVE-2010-2363

CREDITS

Unknown

Trust: 0.3

sources: BID: 78900

SOURCES

db:VULHUBid:VHN-44968
db:VULMONid:CVE-2010-2363
db:BIDid:78900
db:JVNDBid:JVNDB-2010-000032
db:PACKETSTORMid:93040
db:CNNVDid:CNNVD-201008-364
db:NVDid:CVE-2010-2363

LAST UPDATE DATE

2025-04-11T23:03:18.973000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-44968date:2017-08-17T00:00:00
db:VULMONid:CVE-2010-2363date:2017-08-17T00:00:00
db:BIDid:78900date:2010-08-30T00:00:00
db:JVNDBid:JVNDB-2010-000032date:2010-08-25T00:00:00
db:CNNVDid:CNNVD-201008-364date:2010-09-02T00:00:00
db:NVDid:CVE-2010-2363date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-44968date:2010-08-30T00:00:00
db:VULMONid:CVE-2010-2363date:2010-08-30T00:00:00
db:BIDid:78900date:2010-08-30T00:00:00
db:JVNDBid:JVNDB-2010-000032date:2010-08-25T00:00:00
db:PACKETSTORMid:93040date:2010-08-25T05:39:54
db:CNNVDid:CNNVD-201008-364date:2010-08-30T00:00:00
db:NVDid:CVE-2010-2363date:2010-08-30T20:00:01.983