CVE-2010-2465

The S2 Security NetBox 2.5, 3.3, and 4.0, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download node logs, photographs of persons, and backup files via unspecified HTTP requests.
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:s2sys:netbox:2.5:*:*:*:*:*:*:*
cpe:2.3:h:s2sys:netbox:3.3:*:*:*:*:*:*:*
cpe:2.3:h:s2sys:netbox:4.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:h:linearcorp:emerge_50:*:*:*:*:*:*:*:*
cpe:2.3:h:linearcorp:emerge_5000:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:h:sonitrol:eaccess:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2010-06-25 21:30

Updated : 2010-07-13 05:52


NVD link : CVE-2010-2465

Mitre link : CVE-2010-2465

CVE.ORG link : CVE-2010-2465


JSON object : View

Products Affected

s2sys

  • netbox

linearcorp

  • emerge_50
  • emerge_5000

sonitrol

  • eaccess
CWE
CWE-264

Permissions, Privileges, and Access Controls