2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2002-0264" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2002-05-29T04:00:00.000" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-20T23:38:41.173" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "PowerFTP Personal FTP Server 2.03 through 2.10 stores sensitive account information in plaintext in the ftpserver.ini file, which allows attackers with access to the file to gain privileges."
} ,
{
"lang" : "es" ,
"value" : "El servidor FTP PowerFTP Personal 2.03 hasta 2.10 almacena importante informaci\u00f3n de cuenta en texto plano en el fichero ftpserver.ini file. Esto permite que atacantes remotos con acceso al fichero obtengan privilegios."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : true ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cooolsoft:powerftp:2.03:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "903FAB8A-5EEB-4D29-BC74-104BE5DD5F62"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cooolsoft:powerftp:2.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D8DCE78C-8579-4111-BADF-ACD04FB04EA0"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://marc.info/?l=bugtraq&m=101361745222207&w=2" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.iss.net/security_center/static/8183.php" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/4074" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=101361745222207&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.iss.net/security_center/static/8183.php" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/4074" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}