2024-07-14 02:06:08 +00:00

169 lines
5.3 KiB
JSON

{
"id": "CVE-2005-1874",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-06-09T04:00:00.000",
"lastModified": "2011-03-08T02:23:01.437",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in Dzip before 2.9 allows remote attackers to create arbitrary files via a filename containing a .. (dot dot) in a .dz archive."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:evan_wagner:dzip:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.0",
"matchCriteriaId": "B73B34CC-62EE-4646-A38A-7CA4AD29E6A1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:evan_wagner:dzip:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAB1BA3-4771-44B6-9B9B-26FDEAEE7A03"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:evan_wagner:dzip:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D75409E0-6C93-4405-8812-2F82C560D78A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:evan_wagner:dzip:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE08C442-B4A1-4D1D-82A7-C5E73C81F379"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:evan_wagner:dzip:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "52A6C225-8668-4DCD-A52F-0891F00F2535"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:evan_wagner:dzip:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AE20FDC0-C67A-4E82-909E-1C9CE148E4DB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:evan_wagner:dzip:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3D6844D2-C51D-46E4-9241-145BC3BBC620"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:evan_wagner:dzip:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2890D170-B012-4DE7-93F9-5178D0796616"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:evan_wagner:dzip:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "9EED703B-61C9-452A-AC2E-49C2A6787F3C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:evan_wagner:dzip:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "95D94608-D5D7-4DD5-A457-A9580D08672D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:evan_wagner:dzip:2.55:*:*:*:*:*:*:*",
"matchCriteriaId": "6D13B39D-E460-4ECA-A83E-276727E87D44"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:evan_wagner:dzip:2.81:*:*:*:*:*:*:*",
"matchCriteriaId": "845AD62C-BBC9-4DF6-9848-D2662F399A73"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:evan_wagner:dzip:2.82:*:*:*:*:*:*:*",
"matchCriteriaId": "9B747D7F-21B7-461A-B8C0-24F464379FC0"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:evan_wagner:dzip:2.83:*:*:*:*:*:*:*",
"matchCriteriaId": "22AFBFA7-B9A2-4980-B88E-51D7770E4B00"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:evan_wagner:dzip:2.84:*:*:*:*:*:*:*",
"matchCriteriaId": "6A14C51B-3566-4555-82D2-366CA68E3903"
}
]
}
]
}
],
"references": [
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=93079",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://secunia.com/advisories/15599",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/15614",
"source": "cve@mitre.org"
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200506-03.xml",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2005/0692",
"source": "cve@mitre.org"
}
]
}