René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

143 lines
4.4 KiB
JSON

{
"id": "CVE-2007-6483",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-12-20T20:46:00.000",
"lastModified": "2018-10-15T21:54:33.507",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in SafeNet Sentinel Protection Server 7.0.0 through 7.4.0 and possibly earlier versions, and Sentinel Keys Server 1.0.3 and possibly earlier versions, allows remote attackers to read arbitrary files via a .. (dot dot) in the query string."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en SafeNet Sentinel Protection Server 7.0.0 hasta 7.4.0 y versiones anteriores, y Sentinel Keys Server 1.0.3 y posiblemente versiones anteriores, permite a atacantes remotos leer ficheros de su elecci\u00f3n mediante un .. (punto punto) en la cadena de consulta."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:safenet:sentinel_keys_server:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3D766F1C-934F-407E-AEE5-BA1DD904E693"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:safenet:sentinel_protection_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "86733C86-4D91-47F9-AA69-1517EBD9185C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:safenet:sentinel_protection_server:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AF9F0AF6-18BC-45F9-8D11-982BA9BB7FFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:safenet:sentinel_protection_server:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BCDE352B-1D4E-4EB9-9669-D62670FE45E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:safenet:sentinel_protection_server:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DCE6B275-B786-4BB2-97AA-B7918C30F301"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:safenet:sentinel_protection_server:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "17DBD0D0-57A9-4381-BE18-01D2E4FD97B6"
}
]
}
]
}
],
"references": [
{
"url": "http://safenet-inc.com/support/files/SPI740SecurityPatch.zip",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/3471",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/484201/100/200/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/484224/100/200/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/26583",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.securitytracker.com/id?1018992",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/4011",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38636",
"source": "cve@mitre.org"
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-272-01",
"source": "cve@mitre.org"
}
]
}