{ "id": "CVE-2005-0520", "sourceIdentifier": "cve@mitre.org", "published": "2005-02-23T05:00:00.000", "lastModified": "2024-11-20T23:55:19.400", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ArGoSoft FTP Server before 1.4.2.8 allows remote attackers to read arbitrary files via shortcut (.LNK) files in the SITE COPY command, a different vulnerability than CVE-2005-0519." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E52B7406-3481-4692-A897-7B8E4BCF4ADE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "92A87072-6A64-4400-B839-D7E178AA03AB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "47EA17F1-AE32-43AF-B11C-13B8D1D5B448" }, { "vulnerable": true, "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FED4F896-AC49-44C5-A7DE-13052F6B9C26" }, { "vulnerable": true, "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C462CC04-10A2-4F4C-9E6D-139599D03E23" }, { "vulnerable": true, "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B8BA120-D506-4688-B524-275A1FB54C18" }, { "vulnerable": true, "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "00BEE9B9-B5B9-4FC5-8BE7-554629042868" }, { "vulnerable": true, "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA27A4CC-41E2-424D-A9EF-93FE0D8F1DEA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "DFE4FC9C-2281-4BDD-88FA-8E94D5CA08FE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5D0097A7-8713-4979-A6CD-F5086741706D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "68592EA7-2237-4BF0-8769-5942B6D065D7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9955ED25-075F-4818-BFAD-070D19EBBA30" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/14372", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.argosoft.com/ftpserver/changelist.aspx", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.osvdb.org/14061", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/12632", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19442", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/14372", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.argosoft.com/ftpserver/changelist.aspx", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.osvdb.org/14061", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/12632", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19442", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }