fkie_cve-2010-1040
Vulnerability from fkie_nvd
Published
2010-03-23 18:30
Modified
2025-04-11 00:51
Severity ?
Summary
The "IP address range limitation" function in OpenPNE 1.6 through 1.8, 2.0 through 2.8, 2.10 through 2.14, and 3.0 through 3.4, when mobile device support is enabled, allows remote attackers to bypass the "simple login" functionality via unknown vectors related to spoofing.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tejimaya:openpne:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3EA93E5A-FA4D-4CAC-8F14-1C2CD5950118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "9D57EC37-A3AA-4EA4-B734-CDEEB1C0557D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E84B2BA6-B4B0-4026-884A-F055990873EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8120869A-2EF2-40A6-90F8-718496355EE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "130E7194-BE6F-4816-804A-4A264B40E4F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "22FC400E-E1A2-4049-9DA1-E41583143B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1C4FEE-5084-4A5A-9C11-53079DF52F1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9D62FD-3C5E-4018-8EFE-2FAED37C298A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6977D4E5-6654-4C6C-9193-90B43CA9EF6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7218B060-A629-416C-A1C2-688F33287434",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4E72B86E-D217-446A-AF2B-33E303EF8A0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FF5B2964-C1F2-4A13-B7EA-1506DC1248A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C0D378B7-8756-427D-B7BB-C6689951DBED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "20EFF1A1-49BE-41E1-ADA0-D87D8E5AA474",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C7A3703C-9976-423E-A1D3-56E88CCB7724",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.4.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B5BFD1A0-16E2-4634-9ECE-4557BBF426DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "63F5C2A3-7F27-430D-92CB-85A7CF607B65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C4564810-1B53-4C7F-991C-B855EB31A227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "35417F44-2FFF-4D6D-887D-A20C8819D46D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "93F35A9D-1D9F-4235-8B22-28B1FD97C37B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C543C5F8-DA91-4370-B745-E70736B71342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "08E2B5AE-D166-4C48-93A9-AE31EFAE0321",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "70136C65-5FF9-4115-A7BA-2A53B5C8337B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6A033DF0-3927-46E4-95DB-CE7C78C0F482",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52EFE3A6-B7AD-4CC3-933D-1F94CDC873F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B0A989CF-928B-45EC-9FC2-EB52728AE854",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1691CA91-477F-4157-8B47-637AD762E662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AF59773B-62E8-4BC4-8772-10C883F61306",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AB2CD48C-AF78-4240-85D2-67667E2357F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9586D0CF-5C67-4174-863C-C1054F2D13B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "99A9AE5E-D96F-4322-B881-07C37A61EA99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.6.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7ECA4C46-D972-442B-8A8C-1A258C0CFC90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.6.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD72E27-A357-404C-8D8E-AB5EC7586C4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "77FF9DAE-001B-469D-A261-8C0E52DF7591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4E22BDFD-D884-4BEF-A047-A956EEEB6A3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6E0A291F-54FD-4987-AEC2-CD9AEBADD262",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C86E89E4-7425-48CC-965E-B8A1A0AB9C94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.6.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "80D3FA6A-236C-4A47-8239-38B4118DF3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5BB17553-5290-4BCA-A408-6D3FDEA0FA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E7F63D2B-8BF6-4393-8F14-E75EE0CF5F91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "63F77666-0274-435E-B36A-E9AAE971C6B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "27B0B520-66FC-46F8-B109-1FE9840BBF75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2DEADC17-0E12-4EE0-866E-377F51565C90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8375C597-4CD1-473F-AFF6-095434129997",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C4E39442-0EB0-4B34-A9C2-DE28EC104687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E3AFE207-087B-4FD2-A8F1-87B6A1AFF7CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EDE811B5-A37F-4DB8-8845-EF6DCFF0F3CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE784A53-3122-4C3C-84BE-DE4610523531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B56E083E-A1BC-4F53-9305-4E5FD1B787F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2D8759F3-5193-4835-BC97-FF370432CAB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "651499BE-8209-471C-928D-2087BD394A61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B537A02E-DD98-494D-AB51-93ABF638D4A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "41328824-5093-40CD-8FC6-8E8A68FA0BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.6:*:*:*:*:*:*:*",
"matchCriteriaId": "083C6DDA-20F4-4650-B072-833FEC1E2ADE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3EFBB089-97BD-4763-9F93-EAC2BCA4A349",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F61031F2-A331-482E-BD02-B478E5F63092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.9:*:*:*:*:*:*:*",
"matchCriteriaId": "160151E0-9030-4637-808A-BE9696B8026E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.10:*:*:*:*:*:*:*",
"matchCriteriaId": "DA4AABA3-703F-4044-A862-FC39D840B1C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.11:*:*:*:*:*:*:*",
"matchCriteriaId": "36AE7823-2D9F-4FAE-88DA-10016116472F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.12:*:*:*:*:*:*:*",
"matchCriteriaId": "BEDB34BE-47D8-4758-AF32-7FA1714AD182",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3A95FFEA-C9E0-40DB-873D-05E3F54398C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.10.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5426604F-D296-4873-BE48-70D7E591BD4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "36456FA4-B7E3-446E-9888-408630330193",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8CAA8638-3D15-4C72-85CD-5D52EFBE980F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9E907E5-F734-45B0-8ADA-36D6AABF114C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.11.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "723F8977-F1C7-4ABD-9E20-3DE0D39DBF9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7E3FD8F6-8499-411D-9F26-DDC7BBEAA96C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4435F098-D4B4-48FE-BB36-9310E257F6D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.11.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4FA2A-4E4D-48EC-A414-0DEFA93BE835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.11.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D1CAEC22-227C-4062-A70C-76B30146D620",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.11.7:*:*:*:*:*:*:*",
"matchCriteriaId": "F237351A-BE41-4213-8567-5E21D6C3D071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA70C41-9375-435F-A757-9FB1E494F96E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C9598E30-6039-4856-AC5B-C8FC69DE0DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E7A186A2-8932-4A18-834A-2AD6A02D6D7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7765EF3F-E761-4B3E-A0EF-43D16211A979",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E966E410-07EE-4BD1-8FDA-FF6012396FA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A4120011-7517-4B6F-86ED-94859E64FB35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B59F75C-D73B-41AB-B0D3-F4B7839752F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "69FD6F1A-AD0E-452F-A36B-CD178DEA2EC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "AB156548-FDF9-47C4-A08C-A1B770D8B914",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6211E1CE-7905-437E-B7DD-C838CD521815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "18B4B76F-E32D-4184-B9FD-C5A5E8CAEF0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "14BB8849-5D37-4FFB-BE5C-1D430AE2F20C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "3C484BE1-65F4-4575-907B-7CAD4D082478",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6B9B0CC7-AA51-46C1-94AD-61EFD2E59833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.14:*:*:*:*:*:*:*",
"matchCriteriaId": "3432CDB2-0DC3-47E1-9D40-71C6E7238762",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A293CFF3-D001-4A94-91D2-8009973ABFEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.15:*:*:*:*:*:*:*",
"matchCriteriaId": "1B7DD944-617F-4D6D-86E9-82B7D94B1820",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.16:*:*:*:*:*:*:*",
"matchCriteriaId": "08AD11FF-46FB-49FA-851E-164CAE8CF92D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.17:*:*:*:*:*:*:*",
"matchCriteriaId": "3BA553CC-492D-4AFB-A396-C8D8ABD0ED1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F17FF8E8-B5BF-4BD4-96D5-7074B4B8806E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.12.18:*:*:*:*:*:*:*",
"matchCriteriaId": "D742CB0D-0663-4B61-A28B-240D08527F8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A0AB51A-9298-41FE-85EA-951E097DDFDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7B3F113-1286-4967-9A28-4D4067C6E7E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "89CD0F0E-6C66-4FE9-B859-B33708ED5554",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD9FC6FD-CED1-49BD-AE25-E3C2873BA04A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.13.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2DEF6584-FDD1-4FB3-B5D7-CCE939C91393",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DDB01AFC-B4C1-4371-9F6B-19D6436CD005",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.13.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C36977C-348F-4638-88A9-5F57C4B210A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.13.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1927F5-1794-40E6-BF84-F94D7C409C2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.13.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B0898BEB-DF50-48B6-AF9F-5DB0EFB91D4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tejimaya:openpne:2.14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E0FC9783-CA9C-4AFC-B412-7CE7C3F6C02C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The \"IP address range limitation\" function in OpenPNE 1.6 through 1.8, 2.0 through 2.8, 2.10 through 2.14, and 3.0 through 3.4, when mobile device support is enabled, allows remote attackers to bypass the \"simple login\" functionality via unknown vectors related to spoofing."
},
{
"lang": "es",
"value": "La funci\u00f3n \"limitaci\u00f3n de rango de la direcci\u00f3n IP\" en OpenPNE v1.6 hasta v1.8, v2.0 hasta v2.8, v2.10 hasta v2.14 y v3.0 hasta v3.4, cuando est\u00e1 habilitado el soporte a dispositivos m\u00f3viles, permite a atacantes remotos evitar la funcionalidad \"registro simple\" -simple login- a trav\u00e9s de vectores desconocidos relacionados con la suplantaci\u00f3n -spoofing-."
}
],
"id": "CVE-2010-1040",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-03-23T18:30:00.377",
"references": [
{
"source": "cve@mitre.org",
"url": "http://jvn.jp/en/jp/JVN06874657/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000006.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/38857"
},
{
"source": "cve@mitre.org",
"url": "http://www.ipa.go.jp/security/vuln/alert/201003_openpne.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.openpne.jp/archives/4612/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN06874657/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/38857"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ipa.go.jp/security/vuln/alert/201003_openpne.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.openpne.jp/archives/4612/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…