CVE-2008-3555 (GCVE-0-2008-3555)
Vulnerability from cvelistv5 – Published: 2008-08-08 19:00 – Updated: 2024-08-07 09:45
VLAI?
Summary
Directory traversal vulnerability in index.php in (1) WSN Forum 4.1.43 and earlier, (2) Gallery 4.1.30 and earlier, (3) Knowledge Base (WSNKB) 4.1.36 and earlier, (4) Links 4.1.44 and earlier, and possibly (5) Classifieds before 4.1.30 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the TID parameter, as demonstrated by uploading a .jpg file containing PHP sequences.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Date Public ?
2008-08-06 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:45:18.939Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "31392",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31392"
},
{
"name": "4120",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/4120"
},
{
"name": "wsn-tid-file-include(44236)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44236"
},
{
"name": "6208",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/6208"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-08-06T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in index.php in (1) WSN Forum 4.1.43 and earlier, (2) Gallery 4.1.30 and earlier, (3) Knowledge Base (WSNKB) 4.1.36 and earlier, (4) Links 4.1.44 and earlier, and possibly (5) Classifieds before 4.1.30 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the TID parameter, as demonstrated by uploading a .jpg file containing PHP sequences."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "31392",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31392"
},
{
"name": "4120",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/4120"
},
{
"name": "wsn-tid-file-include(44236)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44236"
},
{
"name": "6208",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/6208"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-3555",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in index.php in (1) WSN Forum 4.1.43 and earlier, (2) Gallery 4.1.30 and earlier, (3) Knowledge Base (WSNKB) 4.1.36 and earlier, (4) Links 4.1.44 and earlier, and possibly (5) Classifieds before 4.1.30 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the TID parameter, as demonstrated by uploading a .jpg file containing PHP sequences."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "31392",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31392"
},
{
"name": "4120",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4120"
},
{
"name": "wsn-tid-file-include(44236)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44236"
},
{
"name": "6208",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6208"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-3555",
"datePublished": "2008-08-08T19:00:00.000Z",
"dateReserved": "2008-08-08T00:00:00.000Z",
"dateUpdated": "2024-08-07T09:45:18.939Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2008-3555",
"date": "2026-04-17",
"epss": "0.03295",
"percentile": "0.8724"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:forum:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"4.1.43\", \"matchCriteriaId\": \"0C7106D8-E0FF-477E-9F02-D84B2351D302\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:gallery:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"4.1.30\", \"matchCriteriaId\": \"A4C79627-FB50-4962-A650-FD352D1B6DC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:knowledge_base:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"4.1.36\", \"matchCriteriaId\": \"CF28E434-C74C-4CCF-A5DE-649B8B8A3DF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"760A9211-9646-406F-B7CA-438D3E0E66A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC09F045-5CCF-4A62-8C69-6567CAD32EFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2E3A89E-56FE-4C68-963F-3E97A48BA279\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1706938-BBC5-4D43-99DE-86995A6FDD60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36BB81FF-58DF-4FAB-886A-CDF2603ED38C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD38CE7B-2E32-4DD6-AFA1-4C4DCF04F9AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"809E8844-243C-475A-A620-A942477162D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BC3FFDD-6DC9-4FFF-AD50-030DD7BFAA2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"867CA8A2-0E8D-4824-9DD6-4878BF46078C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21819F3A-AB24-4BAF-A067-8672E825CF1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83BF0DA3-BBC9-4CD8-9848-F9A0C30C9B58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB36FEB6-A7CF-4A4C-9F34-70BFF837EC5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8973C458-D7B2-4CE4-B481-12B680C912CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0DFC0CA-571A-4C59-A960-89A6B9F0F5C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BC0166C-6854-47EC-B324-54ED7A0B2F9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ADF5900-FA60-497F-844B-F9380C93F534\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC6BC3E1-1B05-4FD6-90DB-FF8C98CAAF18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D434EC2-F855-4E29-8B97-76683E361812\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D10BA0D-A3E9-439D-AE51-2DAEF9F3F805\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"531C65A9-78C2-4883-8276-750A61A8693A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3F14F11-74D9-4228-91DF-515E939D0884\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B7587AE-9D5D-45B4-B1DA-62C4E5B07B1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9539DC5B-A109-4111-BF20-22008B8F402D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3F7DBDF-52CD-470A-A2E8-F3C1BB4160A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B92F0373-01B6-44F7-A0B6-1EEC24FC9B02\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B0EFD6-EBDE-48A3-906A-BD2C2414F3D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C3A5027-0511-4F76-A22B-578699D28EC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"579C5A69-EFB9-49A9-B8CF-4D3EFF51E870\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E51D9921-F78D-490E-BA06-98040A614829\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88A2B713-04BE-445E-B142-1E57E700F389\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DDECBE5-F7AC-4FCD-A83C-0E16CE5597DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8C5F96E-98B3-4F37-8D0F-A3801451172C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00EE6124-1BBA-4A42-8B4B-8B457746499A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"158808D7-1A89-4337-A205-78DF76E3941E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F2E27C8-A458-4297-B9CF-3BED317074A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"719D9D0F-79E0-4EC8-83BE-040CE14823B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2DD1347-113E-460F-BF62-5EC7A2127D24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56671280-D2E9-4EC5-A157-C7E3F14BD22D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47F8BA81-6F96-496D-A697-BB8ABE1C1235\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75B59770-F49B-423A-AF42-30498B56B782\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2476C3B-E58D-4808-BA97-9B4A4A0CAB87\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.0.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49D6910C-F49D-4A95-B703-32C810A404D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3729CCBC-41C6-415A-8F0F-1C0101CF1511\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F177F867-3AEB-4DF9-A9AF-0D0284A85762\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C70248B-29BC-40D0-89A6-7CBAF65E84A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97D5B9CD-828D-404B-BD46-38BFA1FF1F97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01B5E2AD-AE16-49FD-B245-8E16D16E2BB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0805C33B-AE85-4D65-86A0-9327071D51D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B691B9F-AE88-452B-9F2D-3662A9BD3FBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED698DE4-0B2A-4D2F-ADB2-2D4B95153008\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D01DADB-9F4D-4757-9CEF-CD69F10B1AE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6018F94-326C-4AC3-8872-37988D3D8D39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15B79206-A902-4B5A-BD81-EBEBD667B86E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C0C1EE1-5BC8-4923-92F1-5211EF3CF783\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76E72AED-661F-448D-AD5A-5C991C5C91BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84CB8AD7-1FD6-4699-9025-101DBE7C802A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D90EFAEB-2179-4254-9DE0-D158F3A5693B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E99BB789-5B84-455B-8051-2C30A0A475FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85F49273-5205-400F-A497-90D68405E29A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26B2BCC9-E130-4272-9675-E1C5B8FCFB7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A6427E0-7464-4714-8857-9017B2466D47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B313BB95-2D0B-48BA-9E14-95583E418647\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A24DA00-A4E9-4B08-AE83-A2F075717268\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF3F6764-940E-455C-830F-BE102A1488C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59B8A7BC-2B25-456E-B399-55BE2A555AFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C832715-0D32-4BDC-9E3F-336CC7C987BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D1FCD19-EC28-4EB6-8ED5-719ECAA77FA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D89DD06E-8791-4027-AAE9-5E2566094C0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D86C4C4C-ED32-4489-9C1B-163E95CD7F5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"969C429D-EC80-4F31-ABF2-CF0019EB8673\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE2EF4DD-34B8-4382-9BD1-E8F35C24F828\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04C80364-7B20-4C97-8036-0B18F2213D31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F58E2F9-38CA-4948-8EDB-A8D1CCB4B683\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF4A1F88-D24A-4862-ADD2-55D57D699052\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A45B1611-192F-41EA-AF41-ACED2FD6E864\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD936A53-113B-4BDE-BEFA-BD2DA76F5C31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E99FF20E-68D9-4A9E-B014-EA1B47B0158D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D3ABB00-E8DE-41BF-B6F5-09CD2A5A2ED1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DCA2630-95A0-4EB9-9DD3-80952B8833D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6E1F153-023B-4296-8CBD-C41D941E5E4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84C8B5B8-16E0-4E21-BD15-9FBCECFECB3F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04B3717A-8055-4736-A168-33213D65A3EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B07C23B-253D-4C98-A53D-549CB759257B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AA23ADB-1B18-4CC2-ADD3-7BC3E062234E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AB8C1C0-102B-40EC-A392-957F4DCE4A9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7959131D-FFFF-4423-AE12-6ED0AE4E13D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wsn:links:4.1.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B089BA1F-BAD2-4E2C-9A91-D227A18CA788\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Directory traversal vulnerability in index.php in (1) WSN Forum 4.1.43 and earlier, (2) Gallery 4.1.30 and earlier, (3) Knowledge Base (WSNKB) 4.1.36 and earlier, (4) Links 4.1.44 and earlier, and possibly (5) Classifieds before 4.1.30 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the TID parameter, as demonstrated by uploading a .jpg file containing PHP sequences.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de salto de directorio en el archivo index.php en (1) WSN Forum versi\\u00f3n 4.1.43 y anteriores, (2) Gallery versi\\u00f3n 4.1.30 y anteriores, (3) Knowledge Base (WSNKB) versi\\u00f3n 4.1.36 y anteriores, (4) Links versi\\u00f3n 4.1.44 y anteriores, y posiblemente (5) Classifieds anterior a versi\\u00f3n 4.1.30, permite a los atacantes remotos incluir y ejecutar archivos locales arbitrarios por medio de un .. (punto punto) en el par\\u00e1metro TID, como es demostrado mediante la carga de un archivo .jpg que contiene secuencias de PHP.\"}]",
"id": "CVE-2008-3555",
"lastModified": "2024-11-21T00:49:31.780",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}",
"published": "2008-08-08T19:41:00.000",
"references": "[{\"url\": \"http://secunia.com/advisories/31392\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securityreason.com/securityalert/4120\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/44236\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.exploit-db.com/exploits/6208\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/31392\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securityreason.com/securityalert/4120\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/44236\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.exploit-db.com/exploits/6208\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2008-3555\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-08-08T19:41:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Directory traversal vulnerability in index.php in (1) WSN Forum 4.1.43 and earlier, (2) Gallery 4.1.30 and earlier, (3) Knowledge Base (WSNKB) 4.1.36 and earlier, (4) Links 4.1.44 and earlier, and possibly (5) Classifieds before 4.1.30 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the TID parameter, as demonstrated by uploading a .jpg file containing PHP sequences.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de salto de directorio en el archivo index.php en (1) WSN Forum versi\u00f3n 4.1.43 y anteriores, (2) Gallery versi\u00f3n 4.1.30 y anteriores, (3) Knowledge Base (WSNKB) versi\u00f3n 4.1.36 y anteriores, (4) Links versi\u00f3n 4.1.44 y anteriores, y posiblemente (5) Classifieds anterior a versi\u00f3n 4.1.30, permite a los atacantes remotos incluir y ejecutar archivos locales arbitrarios por medio de un .. (punto punto) en el par\u00e1metro TID, como es demostrado mediante la carga de un archivo .jpg que contiene secuencias de PHP.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:forum:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.1.43\",\"matchCriteriaId\":\"0C7106D8-E0FF-477E-9F02-D84B2351D302\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:gallery:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.1.30\",\"matchCriteriaId\":\"A4C79627-FB50-4962-A650-FD352D1B6DC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:knowledge_base:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.1.36\",\"matchCriteriaId\":\"CF28E434-C74C-4CCF-A5DE-649B8B8A3DF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"760A9211-9646-406F-B7CA-438D3E0E66A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC09F045-5CCF-4A62-8C69-6567CAD32EFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2E3A89E-56FE-4C68-963F-3E97A48BA279\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1706938-BBC5-4D43-99DE-86995A6FDD60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36BB81FF-58DF-4FAB-886A-CDF2603ED38C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD38CE7B-2E32-4DD6-AFA1-4C4DCF04F9AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809E8844-243C-475A-A620-A942477162D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BC3FFDD-6DC9-4FFF-AD50-030DD7BFAA2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"867CA8A2-0E8D-4824-9DD6-4878BF46078C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21819F3A-AB24-4BAF-A067-8672E825CF1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83BF0DA3-BBC9-4CD8-9848-F9A0C30C9B58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB36FEB6-A7CF-4A4C-9F34-70BFF837EC5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8973C458-D7B2-4CE4-B481-12B680C912CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0DFC0CA-571A-4C59-A960-89A6B9F0F5C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BC0166C-6854-47EC-B324-54ED7A0B2F9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ADF5900-FA60-497F-844B-F9380C93F534\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC6BC3E1-1B05-4FD6-90DB-FF8C98CAAF18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D434EC2-F855-4E29-8B97-76683E361812\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D10BA0D-A3E9-439D-AE51-2DAEF9F3F805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"531C65A9-78C2-4883-8276-750A61A8693A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3F14F11-74D9-4228-91DF-515E939D0884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B7587AE-9D5D-45B4-B1DA-62C4E5B07B1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9539DC5B-A109-4111-BF20-22008B8F402D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3F7DBDF-52CD-470A-A2E8-F3C1BB4160A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92F0373-01B6-44F7-A0B6-1EEC24FC9B02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B0EFD6-EBDE-48A3-906A-BD2C2414F3D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C3A5027-0511-4F76-A22B-578699D28EC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"579C5A69-EFB9-49A9-B8CF-4D3EFF51E870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51D9921-F78D-490E-BA06-98040A614829\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88A2B713-04BE-445E-B142-1E57E700F389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DDECBE5-F7AC-4FCD-A83C-0E16CE5597DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C5F96E-98B3-4F37-8D0F-A3801451172C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EE6124-1BBA-4A42-8B4B-8B457746499A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"158808D7-1A89-4337-A205-78DF76E3941E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F2E27C8-A458-4297-B9CF-3BED317074A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"719D9D0F-79E0-4EC8-83BE-040CE14823B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2DD1347-113E-460F-BF62-5EC7A2127D24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56671280-D2E9-4EC5-A157-C7E3F14BD22D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47F8BA81-6F96-496D-A697-BB8ABE1C1235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B59770-F49B-423A-AF42-30498B56B782\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2476C3B-E58D-4808-BA97-9B4A4A0CAB87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.0.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49D6910C-F49D-4A95-B703-32C810A404D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3729CCBC-41C6-415A-8F0F-1C0101CF1511\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F177F867-3AEB-4DF9-A9AF-0D0284A85762\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C70248B-29BC-40D0-89A6-7CBAF65E84A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97D5B9CD-828D-404B-BD46-38BFA1FF1F97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01B5E2AD-AE16-49FD-B245-8E16D16E2BB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0805C33B-AE85-4D65-86A0-9327071D51D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B691B9F-AE88-452B-9F2D-3662A9BD3FBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED698DE4-0B2A-4D2F-ADB2-2D4B95153008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D01DADB-9F4D-4757-9CEF-CD69F10B1AE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6018F94-326C-4AC3-8872-37988D3D8D39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15B79206-A902-4B5A-BD81-EBEBD667B86E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C0C1EE1-5BC8-4923-92F1-5211EF3CF783\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76E72AED-661F-448D-AD5A-5C991C5C91BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84CB8AD7-1FD6-4699-9025-101DBE7C802A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D90EFAEB-2179-4254-9DE0-D158F3A5693B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E99BB789-5B84-455B-8051-2C30A0A475FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F49273-5205-400F-A497-90D68405E29A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26B2BCC9-E130-4272-9675-E1C5B8FCFB7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A6427E0-7464-4714-8857-9017B2466D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B313BB95-2D0B-48BA-9E14-95583E418647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A24DA00-A4E9-4B08-AE83-A2F075717268\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF3F6764-940E-455C-830F-BE102A1488C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59B8A7BC-2B25-456E-B399-55BE2A555AFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C832715-0D32-4BDC-9E3F-336CC7C987BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D1FCD19-EC28-4EB6-8ED5-719ECAA77FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D89DD06E-8791-4027-AAE9-5E2566094C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D86C4C4C-ED32-4489-9C1B-163E95CD7F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"969C429D-EC80-4F31-ABF2-CF0019EB8673\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE2EF4DD-34B8-4382-9BD1-E8F35C24F828\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04C80364-7B20-4C97-8036-0B18F2213D31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F58E2F9-38CA-4948-8EDB-A8D1CCB4B683\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF4A1F88-D24A-4862-ADD2-55D57D699052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A45B1611-192F-41EA-AF41-ACED2FD6E864\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD936A53-113B-4BDE-BEFA-BD2DA76F5C31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E99FF20E-68D9-4A9E-B014-EA1B47B0158D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D3ABB00-E8DE-41BF-B6F5-09CD2A5A2ED1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DCA2630-95A0-4EB9-9DD3-80952B8833D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E1F153-023B-4296-8CBD-C41D941E5E4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84C8B5B8-16E0-4E21-BD15-9FBCECFECB3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B3717A-8055-4736-A168-33213D65A3EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B07C23B-253D-4C98-A53D-549CB759257B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AA23ADB-1B18-4CC2-ADD3-7BC3E062234E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AB8C1C0-102B-40EC-A392-957F4DCE4A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7959131D-FFFF-4423-AE12-6ED0AE4E13D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wsn:links:4.1.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B089BA1F-BAD2-4E2C-9A91-D227A18CA788\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/31392\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/4120\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44236\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.exploit-db.com/exploits/6208\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/31392\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/4120\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44236\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/6208\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…