René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

111 lines
3.3 KiB
JSON

{
"id": "CVE-2008-1221",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-03-10T17:44:00.000",
"lastModified": "2018-10-11T20:30:12.103",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Absolute path traversal vulnerability in the FTP server in MicroWorld eScan Corporate Edition 9.0.742.98 and eScan Management Console (aka eScan Server) 9.0.742.1 allows remote attackers to read arbitrary files via an absolute pathname in the RETR (get) command."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio absoluto en el servidor FTP de MicroWorld eScan Corporate Edition 9.0.742.98 y eScan Management Console (tambi\u00e9n conocido como eScan Server) 9.0.742.1, permite a atacantes remotos leer ficheros de su elecci\u00f3n mediante un nombre de ruta absoluto en el comando RETR (get)."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microworld_technologies:escan:9.0.742.98:*:corporate:*:*:*:*:*",
"matchCriteriaId": "E907C054-C11D-4615-94A8-7B62F53F55FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microworld_technologies:escan_management_console:9.0.742.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C0D2471F-45F6-4D2F-8DB2-DE33A3223ED1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microworld_technologies:escan_server:9.0.742.1:*:*:*:*:*:*:*",
"matchCriteriaId": "135425E9-78BB-4858-8D76-91F7D5159254"
}
]
}
]
}
],
"references": [
{
"url": "http://aluigi.altervista.org/adv/escaz-adv.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://securityreason.com/securityalert/3723",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/489228/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/28127",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41033",
"source": "cve@mitre.org"
}
]
}