Show plain JSON{"id": "CVE-2005-4424", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2005-12-20T11:03:00.000", "references": [{"url": "http://cert.uni-stuttgart.de/archive/bugtraq/2005/11/msg00110.html", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/17479", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/157", "source": "cve@mitre.org"}, {"url": "http://www.hardened-php.net/advisory_212005.80.html", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/20562", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/15354", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23014", "source": "cve@mitre.org"}, {"url": "http://cert.uni-stuttgart.de/archive/bugtraq/2005/11/msg00110.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/17479", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/securityalert/157", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.hardened-php.net/advisory_212005.80.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/20562", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/15354", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23014", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in PHPKIT 1.6.1 R2 and earlier might allow remote authenticated users to execute arbitrary PHP code via a .. (dot dot) in the path parameter and a %00 at the end of the filename, as demonstrated by an avatar filename ending with .png%00."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:phpkit:phpkit:1.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C962F520-4E73-459D-8C5C-9E85426D9B57"}, {"criteria": "cpe:2.3:a:phpkit:phpkit:1.6.1:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F42F08A7-AF6B-4642-8172-6B4C564FBCB3"}, {"criteria": "cpe:2.3:a:phpkit:phpkit:1.6.02:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33C5DDE2-0978-41D2-BCCF-A70BC6CE841A"}, {"criteria": "cpe:2.3:a:phpkit:phpkit:1.6.03:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD305C66-3B8B-468E-945A-DFEE09E6FB8F"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}