Show plain JSON{"id": "CVE-2009-2658", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2009-08-04T16:30:00.420", "references": [{"url": "http://en.znc.in/w/index.php?title=ZNC&oldid=3209#WARNING", "source": "cve@mitre.org"}, {"url": "http://en.znc.in/wiki/ChangeLog/0.072", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/35916", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.debian.org/security/2009/dsa-1848", "source": "cve@mitre.org"}, {"url": "http://www.openwall.com/lists/oss-security/2009/07/21/5", "source": "cve@mitre.org"}, {"url": "http://znc.svn.sourceforge.net/viewvc/znc?view=rev&sortby=rev&sortdir=down&revision=1570", "source": "cve@mitre.org"}, {"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00965.html", "source": "cve@mitre.org"}, {"url": "http://en.znc.in/w/index.php?title=ZNC&oldid=3209#WARNING", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://en.znc.in/wiki/ChangeLog/0.072", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/35916", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2009/dsa-1848", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2009/07/21/5", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://znc.svn.sourceforge.net/viewvc/znc?view=rev&sortby=rev&sortdir=down&revision=1570", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00965.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in ZNC before 0.072 allows remote attackers to overwrite arbitrary files via a crafted DCC SEND request."}, {"lang": "es", "value": "Vulnerabilidad de salto de directorio en ZNC anterior a v0.072 permite a atacantes remotos sobrescribir ficheros de su elecci\u00f3n a trav\u00e9s de una petici\u00f3n DCC SEND manipulada."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:znc:znc:0.044:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C012D55-9039-4D68-9CA0-5624ADEF583F"}, {"criteria": "cpe:2.3:a:znc:znc:0.045:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C185E34-735D-4839-8C05-B46CE7028765"}, {"criteria": "cpe:2.3:a:znc:znc:0.047:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60AEE9F9-78B7-40B4-B28A-1B8F068CA953"}, {"criteria": "cpe:2.3:a:znc:znc:0.052:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AECFB9F-9630-438F-9BE4-E4A44A5023FB"}, {"criteria": "cpe:2.3:a:znc:znc:0.054:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA564C01-2757-479C-9E33-2D7F0890C61C"}, {"criteria": "cpe:2.3:a:znc:znc:0.056:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BFE27D3-487B-41A2-A6CE-AA36E07506BE"}, {"criteria": "cpe:2.3:a:znc:znc:0.058:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13E7CC41-1923-4295-8AFC-8D295FDD9C5D"}, {"criteria": "cpe:2.3:a:znc:znc:0.060:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C2127D9-936F-4E71-BB78-02DE61FF44C6"}, {"criteria": "cpe:2.3:a:znc:znc:0.062:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89151E35-63D2-440E-AD2F-A2BAECA6884B"}, {"criteria": "cpe:2.3:a:znc:znc:0.064:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "952BC3B5-4D07-4C61-B3FE-650FBC699B8F"}, {"criteria": "cpe:2.3:a:znc:znc:0.066:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9983141A-3B1F-41EE-809A-0F435EC067C2"}, {"criteria": "cpe:2.3:a:znc:znc:0.068:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A505A45-4404-4E0E-97AD-69D9C5D280DC"}, {"criteria": "cpe:2.3:a:znc:znc:0.070:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AB8B51F-4FD7-463B-9E8B-6846E7E690A5"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}