Vulnerability Details : CVE-2010-2276
The default configuration of the build process in Dojo 0.4.x before 0.4.4, 1.0.x before 1.0.3, 1.1.x before 1.1.2, 1.2.x before 1.2.4, 1.3.x before 1.3.3, and 1.4.x before 1.4.2 has the copyTests=true and mini=false options, which makes it easier for remote attackers to have an unspecified impact via a request to a (1) test or (2) demo component.
Threat overview for CVE-2010-2276
Top countries where our scanners detected CVE-2010-2276
Top open port discovered on systems with this issue
80
IPs affected by CVE-2010-2276 19
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2010-2276!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2010-2276
Probability of exploitation activity in the next 30 days: 2.00%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 87 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-2276
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
nvd@nist.gov |
CWE ids for CVE-2010-2276
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-2276
-
http://dojotoolkit.org/blog/post/dylan/2010/03/dojo-security-advisory/
Page not found | The Dojo Toolkit BlogPatch;Vendor Advisory
-
http://www.vupen.com/english/advisories/2010/1281
Webmail | OVH- OVHVendor Advisory
-
http://www-1.ibm.com/support/docview.wss?uid=swg1LO50994
IBM LO50994: DOJO SECURITY PATCH AFFECTING DOJO 1.1.1, 1.1.0 AND 1.2.3
-
http://www-01.ibm.com/support/docview.wss?uid=swg21431472
IBM notice: The page you requested cannot be displayed
Products affected by CVE-2010-2276
- cpe:2.3:a:dojotoolkit:dojo:0.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:0.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:0.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:0.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:dojotoolkit:dojo:1.4:*:*:*:*:*:*:*