Show plain JSON{"id": "CVE-2014-3777", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-07-16T14:19:03.667", "references": [{"url": "http://packetstormsecurity.com/files/127280/Reportico-Admin-Credential-Leak.html", "source": "cve@mitre.org"}, {"url": "http://seclists.org/fulldisclosure/2014/Jun/144", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/108612", "source": "cve@mitre.org"}, {"url": "http://www.secveritas.com/secv-05-1402.html", "source": "cve@mitre.org"}, {"url": "http://packetstormsecurity.com/files/127280/Reportico-Admin-Credential-Leak.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://seclists.org/fulldisclosure/2014/Jun/144", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/108612", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.secveritas.com/secv-05-1402.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in Reportico PHP Report Designer before 4.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the xmlin parameter."}, {"lang": "es", "value": "Vulnerabilidad de salto de directorio en Reportico PHP Report Designer anterior a 4.0 permite a atacantes remotos leer ficheros arbitrarios a trav\u00e9s de un .. (punto punto) en el par\u00e1metro xmlin."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:reportico:php_report_designer:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D608202-2EA1-4324-B646-D49A8EECFA5D", "versionEndIncluding": "3.3"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "809CDA5E-8B2D-4016-963E-EB65C1EFF521"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F744CF6-E5AD-4991-AE43-BE544EA81C79"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D6F5B61-25CE-4C48-B76D-4070FAE786D3"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C82F6F3B-8EE3-4F37-A388-29B2BC379B29"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6594755-63B6-4FBB-8505-9C3CB583F0B9"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4648CB21-E557-41B9-BA4A-CB518BA97AD9"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65626120-6D1E-4C6A-B131-638D46E80E4C"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "163F0101-078D-471B-8A25-5FC1872AF059"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15469291-8713-4308-9189-5371010EC406"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A760F5E-6F78-4B39-BAF7-BDB80BEDD5D8"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "951ED785-B52C-4F05-AD91-0FDD999DACCE"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43B90C4C-9590-44CA-BBFB-281D8D4ABDC3"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:2.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9839AFD0-751E-47A6-B53F-498232254782"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27730675-213C-4BF0-AB62-54BB5AEB323D"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:2.4:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3426856B-880F-49A7-8057-1FD3ADE1B077"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AFB7418-50C4-4623-A53E-D41F79F2A51A"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90F3E1E9-9DE0-410C-B6A8-71B658C58480"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F81F8111-AF6D-44B5-A4D9-DB37851AA84E"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE683882-C518-4B0F-9BB3-87ED0DF4A4C3"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20590D12-6E2D-4488-8276-2E13AD84622F"}, {"criteria": "cpe:2.3:a:reportico:php_report_designer:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3FF8176-A8A2-4713-9ABE-5605390CDA3C"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}