Show plain JSON{"id": "CVE-2008-0396", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2008-01-23T12:00:00.000", "references": [{"url": "http://oliver.greyhat.de/2008/01/19/bitdefender-unauthorized-remote-file-access-vulnerability/", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/28578", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/3568", "source": "cve@mitre.org"}, {"url": "http://www.oliverkarow.de/research/bitdefender.txt", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/486701/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/27358", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2008/0213", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39802", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in BitDefender Update Server (http.exe), as used in BitDefender products including Security for Fileservers and Enterprise Manager (BDEM), allows remote attackers to read arbitrary files via .. (dot dot) sequences in an HTTP request."}, {"lang": "es", "value": "Vulnerabilidad de salto de directorio en BitDefender Update Server (http.exe), tal y como se utiliza en los productos BitDefender incluyendo Security for Fileservers and Enterprise Manager (BDEM), permite a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s de la secuencia .. en una respuesta HTTP."}], "lastModified": "2018-10-15T21:59:16.033", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bitdefender:update_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E81A03E-FA83-4446-9DB1-F7F8656004F7"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}