Show plain JSON{"id": "CVE-2010-1913", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2010-05-12T11:46:31.830", "references": [{"url": "http://wintercore.com/en/component/content/article/7-media/18-wintercore-releases-an-advisory-for-consona-products.html", "source": "cve@mitre.org"}, {"url": "http://www.kb.cert.org/vuls/id/602801", "tags": ["Patch", "US Government Resource"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/511176/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.wintercore.com/downloads/rootedcon_0day.pdf", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://wintercore.com/en/component/content/article/7-media/18-wintercore-releases-an-advisory-for-consona-products.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.kb.cert.org/vuls/id/602801", "tags": ["Patch", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/511176/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.wintercore.com/downloads/rootedcon_0day.pdf", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-16"}]}], "descriptions": [{"lang": "en", "value": "The default configuration of pluginlicense.ini for the SdcWebSecureBase interface in tgctlcm.dll in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance, when downloaded from a server operated by Telefonica or possibly other companies, contains an incorrect DNS whitelist that includes the DNS hostnames of home computers of many persons, which allows remote attackers to bypass intended restrictions on ActiveX execution by hosting an ActiveX control on an applicable home web server."}, {"lang": "es", "value": "La configuraci\u00f3n por defecto de pluginlicense.ini para la interfaz SdcWebSecureBase en tgctlcm.dll en Consona Live Assistance, Dynamic Agent, y Subscriber Assistance, cuando se descargan de un servidor operado por Telef\u00f3nica o posiblemente otras empresas, contiene una lista blanca de DNS incorrectos que incluye los nombres de host DNS de los ordenadores personales de muchas personas, lo cual permite a atacantes remotos eludir restricciones de ejecuci\u00f3n de ActiveX alojando un control ActiveX en un servidor Web dom\u00e9stico de origen aplicable."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:consona:consona_dynamic_agent:-:-:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E86DC4D-1E5C-4284-AA49-FD5F3AA9056A"}, {"criteria": "cpe:2.3:a:consona:consona_dynamic_agent:-:-:marketing:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76A93E2B-D458-43A4-A4A5-9FA0981B72EF"}, {"criteria": "cpe:2.3:a:consona:consona_dynamic_agent:-:-:support:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1AAF4CD-3D1A-4C44-8338-4F614E4645CB"}, {"criteria": "cpe:2.3:a:consona:consona_live_assistance:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDD3CC62-BB8B-435F-A9F3-CD6DE608F463"}, {"criteria": "cpe:2.3:a:consona:consona_subscriber_assistance:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F445B64-34D5-4372-9861-2216442E4069"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}