Show plain JSON{"id": "CVE-2008-1319", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2008-03-13T14:44:00.000", "references": [{"url": "http://aluigi.altervista.org/adv/versantcmd-adv.txt", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=120468784112145&w=2", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/29230", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/3738", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/489139/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/28097", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2008/0764/references", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40997", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/5213", "source": "cve@mitre.org"}, {"url": "http://aluigi.altervista.org/adv/versantcmd-adv.txt", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://marc.info/?l=bugtraq&m=120468784112145&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/29230", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/securityalert/3738", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/489139/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/28097", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2008/0764/references", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40997", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/5213", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Untrusted search path and argument injection vulnerability in the VersantD service in Versant Object Database 7.0.1.3 and earlier, as used in Borland CaliberRM and probably other products, allows remote attackers to execute arbitrary commands via a request to TCP port 5019 with a modified VERSANT_ROOT field."}, {"lang": "es", "value": "Vulnerabilidad de b\u00fasqueda no permitida de directorio e inyecci\u00f3n de argumentos en el servicio VersantD de Versant Object Database versi\u00f3n 7.0.1.3 y anteriores, usado en Borland CaliberRM y probablemente en otros productos, permite a atacantes remotos ejecutar comandos de su elecci\u00f3n mediante una petici\u00f3n al puerto 5019 TCP con el campo VERSANT_ROOT modificado."}], "lastModified": "2024-11-21T00:44:15.510", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:versant:versant_object_database:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AEB981B3-B3F8-420F-A0F6-FA82DB78E240", "versionEndIncluding": "7.0.1.3"}, {"criteria": "cpe:2.3:a:versant:versant_object_database:7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B69E87FF-8CBB-4BB1-9599-977925E0CBD7"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}