Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2010-0219
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache SAP BusinessObjects Enterprise XI Apache Axis2信任管理漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Axis2 是一个Web服务的核心支援引擎。AXIS2对旧有的AXIS重新设计及重写,并提供两种语言Java 及 C 的开发版本。 在SAP BusinessObjects Enterprise XI 3.2,CA ARCserve D2D r15和其他产品的dswsbobje.war中使用的Apache Axis2拥有管理员账户axis2的默认密码。远程攻击者可通过上传特制的web服务执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2010-0219
#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/veritas-rt/CVE-2010-0219POC Details
2Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2010/CVE-2010-0219.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2010-0219
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2010-0219

No comments yet


Leave a comment