Show plain JSON{"id": "CVE-2009-4482", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": true, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2009-12-30T21:30:00.500", "references": [{"url": "http://intevydis.com/vd-list.shtml", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/57761", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/36588", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.intevydis.com/blog/?p=57", "source": "cve@mitre.org"}, {"url": "http://intevydis.com/vd-list.shtml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/57761", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/36588", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.intevydis.com/blog/?p=57", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Buffer overflow in MediaServer.exe in TVersity 1.6 allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by the vd_tversity module in VulnDisco Pack Professional 8.11. NOTE: as of 20091229, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer MediaServer.exe en TVersity v1.6 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados, como se ha demostrado para el m\u00f3dulo vd_tversity en VulnDisco Pack Professional v8.11. NOTA: a partir del 29/12/2009, este fallo no tiene informaci\u00f3n de utilizaci\u00f3n. Sin embargo, dado que el autor de VulnDisco Pack es un investigador fiable, se ha asignado un identificador CVE para este comportamiento con prop\u00f3sitos de rastreo."}], "lastModified": "2024-11-21T01:09:45.017", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:tversity:tversity:1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92C5BC78-A94E-4553-8E77-7D5D0C31C610"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}