Show plain JSON{"id": "CVE-2008-5965", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2009-01-26T20:30:00.203", "references": [{"url": "http://secunia.com/advisories/30472", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/31730", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2008/2798", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45822", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/6737", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/30472", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/31730", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2008/2798", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45822", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/6737", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in index.php in LokiCMS 0.3.4 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to check for the existence of arbitrary files via a .. (dot dot) in the page parameter."}, {"lang": "es", "value": "Una vulnerabilidad de salto de directorio en index.php en versiones de LokiCMS 0.3.4 y anteriores, con magic_quotes_gpc desactivado, permite a atacantes remotos comprobar la existencia de archivos arbitrarios a trav\u00e9s de un .. (punto punto) en el par\u00e1metro page (p\u00e1gina)."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:lokicms:lokicms:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "372FDEE4-6899-45E9-A973-013A0AE54118", "versionEndIncluding": "0.3.4"}, {"criteria": "cpe:2.3:a:lokicms:lokicms:0.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "524DB171-D7DE-4B7D-BCCB-C0C9AE508CD2"}, {"criteria": "cpe:2.3:a:lokicms:lokicms:0.1.0rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE0504E9-7090-4D4A-A9B8-A9B79A489840"}, {"criteria": "cpe:2.3:a:lokicms:lokicms:0.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "483D2A1D-6C0D-41B3-A0AB-BC831103D3CF"}, {"criteria": "cpe:2.3:a:lokicms:lokicms:0.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3FFAD14-7710-4D6C-BC50-E12C2DA8AE55"}, {"criteria": "cpe:2.3:a:lokicms:lokicms:0.3.1b1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "995173AA-DAA3-4D0C-8727-E6079AEC6146"}, {"criteria": "cpe:2.3:a:lokicms:lokicms:0.3.1b2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EC01CBD-2414-4AC6-81C5-C91124EAA176"}, {"criteria": "cpe:2.3:a:lokicms:lokicms:0.3.2b1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99744F88-CF80-4635-A23D-B9EFED94F126"}, {"criteria": "cpe:2.3:a:lokicms:lokicms:0.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CAC7E2E9-B14C-4A9F-8AD8-93412792B69E"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}