92 lines
2.4 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-3484",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-11-03T22:02:00.000",
"lastModified": "2016-10-18T03:35:42.183",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in NeroNET 1.2.0.2 and earlier allows remote attackers to read arbitrary files with certain file extensions (such as ZIP, AVI, JPG, TXT, and HTML) via \"..\" and hex-encoded (1) slash \"/\" (\"%2f\") or (2) backslash \"\\\" (\"%5c\") sequences."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nero:neronet:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.2.0.2",
"matchCriteriaId": "05901785-5CAF-4D3A-A4EA-D46196EB17DD"
}
]
}
]
}
],
"references": [
{
"url": "http://aluigi.altervista.org/adv/neronet-adv.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://marc.info/?l=full-disclosure&m=113096009930152&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/15288",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2005/2287",
"source": "cve@mitre.org"
}
]
}