mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
143 lines
4.4 KiB
JSON
143 lines
4.4 KiB
JSON
{
|
|
"id": "CVE-2007-6483",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-12-20T20:46:00.000",
|
|
"lastModified": "2018-10-15T21:54:33.507",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Directory traversal vulnerability in SafeNet Sentinel Protection Server 7.0.0 through 7.4.0 and possibly earlier versions, and Sentinel Keys Server 1.0.3 and possibly earlier versions, allows remote attackers to read arbitrary files via a .. (dot dot) in the query string."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de salto de directorio en SafeNet Sentinel Protection Server 7.0.0 hasta 7.4.0 y versiones anteriores, y Sentinel Keys Server 1.0.3 y posiblemente versiones anteriores, permite a atacantes remotos leer ficheros de su elecci\u00f3n mediante un .. (punto punto) en la cadena de consulta."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:safenet:sentinel_keys_server:1.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3D766F1C-934F-407E-AEE5-BA1DD904E693"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:safenet:sentinel_protection_server:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86733C86-4D91-47F9-AA69-1517EBD9185C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:safenet:sentinel_protection_server:7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AF9F0AF6-18BC-45F9-8D11-982BA9BB7FFB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:safenet:sentinel_protection_server:7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BCDE352B-1D4E-4EB9-9669-D62670FE45E7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:safenet:sentinel_protection_server:7.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DCE6B275-B786-4BB2-97AA-B7918C30F301"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:safenet:sentinel_protection_server:7.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17DBD0D0-57A9-4381-BE18-01D2E4FD97B6"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://safenet-inc.com/support/files/SPI740SecurityPatch.zip",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://securityreason.com/securityalert/3471",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/484201/100/200/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/484224/100/200/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/26583",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1018992",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/4011",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38636",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-272-01",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |