René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

115 lines
3.9 KiB
JSON

{
"id": "CVE-2007-5320",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-10-09T22:17:00.000",
"lastModified": "2017-07-29T01:33:35.850",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple absolute path traversal vulnerabilities in Pegasus Imaging ImagXpress 8.0 allow remote attackers to (1) delete arbitrary files via the CacheFile attribute in the ThumbnailXpres.1 ActiveX control (PegasusImaging.ActiveX.ThumnailXpress1.dll) or (2) overwrite arbitrary files via the CompactFile function in the ImagXpress.8 ActiveX control (PegasusImaging.ActiveX.ImagXpress8.dll)."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de salto de directorio absoluto en Pegasus Imaging ImagXpress 8.0 permite a atacantes remotos (1) borrar ficheros de su elecci\u00f3n mediante el atributo CacheFile en el control ActiveX ThumbnailXpres.1 (PegasusImaging.ActiveX.ThumnailXpress1.dll) o (2) sobrescribir ficheros de su elecci\u00f3n mediante la funci\u00f3n CompactFile en el control ActiveX ImagXpress.8 (PegasusImaging.ActiveX.ImagXpress8.dll)."
}
],
"vendorComments": [
{
"organization": "Pegasus Imaging Corp.",
"comment": "Pegasus Imaging acknowledges these issues as affecting our controls in the same way that they affect any ActiveX control that allows files to be saved to absolute directory paths. We\u2019re working on reducing the vulnerabilities of these issues and will publish additional information when available at www.pegasusimaging.com/faq.htm. In the meantime we recommend that users follow the Microsoft guidelines for reducing the vulnerability by increasing their browser security settings for ActiveX controls.",
"lastModified": "2007-11-08T00:00:00"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pegasus_imaging:imagxpress:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D383BF0D-6A09-406D-B485-33D1DC3D341D"
}
]
}
]
}
],
"references": [
{
"url": "http://shinnai.altervista.org/exploits/txt/TXT_3DQ1nIkI6zmWCek4zP5U.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://shinnai.altervista.org/exploits/txt/TXT_wfv7ZG0G6KnQlk1SieLd.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/25948",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/25949",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/3388",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37012",
"source": "cve@mitre.org"
}
]
}