Show plain JSON{"id": "CVE-2009-3451", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2009-09-29T15:30:00.563", "references": [{"url": "http://radnet.radactive.com/forum/Default.aspx?g=posts&t=339", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/23807", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/58196", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/506555/100/0/threaded", "source": "cve@mitre.org"}, {"url": "https://www.sec-consult.com/files/20090917-0_RADactive_I-Load_Multiple_Vulnerabilities.txt", "source": "cve@mitre.org"}, {"url": "http://radnet.radactive.com/forum/Default.aspx?g=posts&t=339", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/23807", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/58196", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/506555/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.sec-consult.com/files/20090917-0_RADactive_I-Load_Multiple_Vulnerabilities.txt", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in WebCoreModule.ashx in RADactive I-Load before 2008.2.5.0 allows remote attackers to read arbitrary files via unspecified vectors."}, {"lang": "es", "value": "Vulnerabilidad de salto de directorio en WebCoreModule.ashx en RADactive I-Load anterior a v2008.2.5.0 permite a atacantes remotos leer ficheros de su elecci\u00f3n a trav\u00e9s de vectores no especificados."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:radactive:i-load:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F139A75-38DA-423B-BF6A-0F72D289C3FB", "versionEndIncluding": "2008.2.4.0"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE74540D-CEF8-4D69-9B5C-EF65AB75297E"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.6.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D9C87F5-72A5-4067-88B3-AF93063D299E"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.6.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "013704F2-FE79-4576-8A9B-5BF8F57B64B2"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.6.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5482B06C-8E4E-46CD-B828-33BB9A535EEF"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D7C075F-0A1B-4216-B32C-B95CD73442E4"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E66E491-7785-4371-AE45-DA957D48DC3B"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E1B949F-5984-4726-B0AA-901A7C9B82C8"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F93132F-BD03-4731-9EBF-607F0C1E2CD8"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73C8F452-D278-4B4D-9C35-BF993894DF19"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A99B631-3142-413E-A00E-2A914A941A73"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD79EE0A-1603-43C3-BD22-3D3E6E3A542B"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10AC750D-2FD5-40B2-807E-3A7693FAB4C5"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A765BE3-9BE1-46B1-8C9C-A274D8AFBEC5"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C06A2416-1CD5-4F22-AD19-FADFE6D94997"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A30F2246-03AB-4A99-B2CB-2B116F70F7B4"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "508A871B-64F7-411E-9911-95E51D070D6B"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "556A339D-308F-4B16-8080-2756CC4225FC"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54F277DA-2B18-4CFF-8C0B-03D8B226982D"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88B1BC55-4481-4B17-8137-C65D5F4BD651"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D573A940-3848-4653-B92A-3D0CA07962E6"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AE4CC98-79E6-4F92-86D8-31902D071556"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5222097B-5239-4545-BBC8-9EEDA96372F9"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "574A108B-091A-4061-88A0-3A4AC75737DE"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "344775B7-18C6-4689-A513-C9A9E2F0B7DD"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C348E59F-085B-481D-A18F-CD9F20AE31F4"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32BBAACD-9D5B-4160-9266-D2C31C19990F"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EF467CB-26D0-49C8-B0D5-20089E907FA5"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01F0EDCD-B278-4B01-9048-5C316AB156AA"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E72C34E7-9E2E-4EB8-B942-9314444A4F9D"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55656D0E-1017-4C5A-BDC4-1182A744035E"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B83A4E9F-9188-438B-BA04-293460EAAA7D"}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F9EFA57-7AB4-4662-94CC-902C71546D12"}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C02639B-16A5-499A-959C-7BA9DC1696D2"}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9F506BE-4540-4419-866C-70D67F9B5A9B"}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "727B9CEA-AE45-4839-83A5-36D845823D84"}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90FBD2D6-A917-4BBF-A215-4B61056EF5CF"}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D97E6B5-22B8-47F4-9C4B-61EB3E82FAD1"}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FCA880C-7A43-42F0-B918-708A52301E58"}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A88B8238-3B59-4005-9368-707F0AD6DD2F"}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B881471-9471-4C0C-8075-C13039237850"}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65A4543A-1774-4DD2-B7CA-59B373D9A285"}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.2.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "302B973C-E014-4A4E-8F5D-558A18DF806E"}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.2.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "380F947D-2B8A-4768-B1F4-B04F6CC1E855"}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.2.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E93F09B9-FD14-4ABE-A650-1CAE4727FE90"}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.2.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "221D2428-6648-4B8D-8C38-68ED6480748A"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}