{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T08:01:56.490","vulnerabilities":[{"cve":{"id":"CVE-2010-1577","sourceIdentifier":"psirt@cisco.com","published":"2010-07-28T12:48:52.463","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in Cisco Internet Streamer, as used in Cisco Content Delivery System (CDS) 2.2.x, 2.3.x, 2.4.x, and 2.5.x before 2.5.7 allows remote attackers to read arbitrary files via a crafted URL."},{"lang":"es","value":"Vulnerabilidad de salto de directorio en Cisco Internet Streamer, usado en Cisco Content Delivery System (CDS) v2.2.x, v2.3.x, v2.4.x, y v2.5.x anterior a v2.5.7, permite a atacantes remotos leer archivos de su elección a través de una URL manipulada."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:N/A:N","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:internet_streamer:2.2\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"0A355FDB-1D1A-4AD2-A7EB-7F6BD0C0510D"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:internet_streamer:2.3\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"D98295A3-A1F9-4DCC-A0B1-76B0A5491324"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:internet_streamer:2.3\\(3\\):*:*:*:*:*:*:*","matchCriteriaId":"8657D61D-BA06-4D0E-AAD2-E43101992509"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:internet_streamer:2.3\\(5\\):*:*:*:*:*:*:*","matchCriteriaId":"46ED5C00-821B-4833-B859-D2CB4C1EF691"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:internet_streamer:2.3\\(7\\):*:*:*:*:*:*:*","matchCriteriaId":"6A75C02F-61B8-4831-A1F7-7888DF0C164C"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:internet_streamer:2.3\\(9\\):*:*:*:*:*:*:*","matchCriteriaId":"16B00678-CF1E-4971-B2BE-4A86D0AEB825"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:internet_streamer:2.4\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"88C2AD41-B550-4EE8-9276-15B999A812AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:internet_streamer:2.4\\(3\\):*:*:*:*:*:*:*","matchCriteriaId":"D8F27D26-AB37-4F78-A866-7A3FF4BA048C"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:internet_streamer:2.4\\(5\\):*:*:*:*:*:*:*","matchCriteriaId":"DB985228-A581-4E98-B5D0-788B016B27AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:internet_streamer:2.5\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"48B82A9D-FEEE-4734-95BF-C1AEDC330349"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:internet_streamer:2.5\\(3\\):*:*:*:*:*:*:*","matchCriteriaId":"0A55DDBD-2FAC-442C-8B09-38BBC6C93E7C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:content_delivery_system:*:*:*:*:*:*:*:*","matchCriteriaId":"052532BD-AE1E-47D8-8814-B6B873CCFAB2"}]}]}],"references":[{"url":"http://osvdb.org/66508","source":"psirt@cisco.com"},{"url":"http://secunia.com/advisories/40701","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3bd1c.shtml","source":"psirt@cisco.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securitytracker.com/id?1024234","source":"psirt@cisco.com"},{"url":"http://www.vupen.com/english/advisories/2010/1881","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60567","source":"psirt@cisco.com"},{"url":"http://osvdb.org/66508","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/40701","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3bd1c.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securitytracker.com/id?1024234","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2010/1881","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60567","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}