Vulnerabilites related to claudio_klingler - quixplorer
Vulnerability from fkie_nvd
Published
2009-06-04 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php.
Impacted products
Vendor Product Version
tinywebgallery tinywebgallery *
tinywebgallery tinywebgallery 1.0
tinywebgallery tinywebgallery 1.1
tinywebgallery tinywebgallery 1.01
tinywebgallery tinywebgallery 1.1.1
tinywebgallery tinywebgallery 1.1.2
tinywebgallery tinywebgallery 1.02
tinywebgallery tinywebgallery 1.2
tinywebgallery tinywebgallery 1.3
tinywebgallery tinywebgallery 1.03
tinywebgallery tinywebgallery 1.3a
tinywebgallery tinywebgallery 1.3b
tinywebgallery tinywebgallery 1.3c
tinywebgallery tinywebgallery 1.04
tinywebgallery tinywebgallery 1.4
tinywebgallery tinywebgallery 1.4.0.1
tinywebgallery tinywebgallery 1.4.0.2
tinywebgallery tinywebgallery 1.4.0.3
tinywebgallery tinywebgallery 1.4.0.4
tinywebgallery tinywebgallery 1.4.1
tinywebgallery tinywebgallery 1.4.1.1
tinywebgallery tinywebgallery 1.4.1.2
tinywebgallery tinywebgallery 1.4.1.3
tinywebgallery tinywebgallery 1.4.2
tinywebgallery tinywebgallery 1.05
tinywebgallery tinywebgallery 1.5
tinywebgallery tinywebgallery 1.5.0.1_15.08.2006
tinywebgallery tinywebgallery 1.5.0.2_17.08.2006
tinywebgallery tinywebgallery 1.5.1_03.09.2006
tinywebgallery tinywebgallery 1.5.2.1_20.09.2006_1000
tinywebgallery tinywebgallery 1.5.2.2_21.09.2006_1000
tinywebgallery tinywebgallery 1.5.2_17.09.2006_1000
tinywebgallery tinywebgallery 1.5.3.1_11.10.2006_1000
tinywebgallery tinywebgallery 1.5.3.2_12.10.2006_1000
tinywebgallery tinywebgallery 1.5.3_08.10.2006_1000
tinywebgallery tinywebgallery 1.5.4_13.10.2006
tinywebgallery tinywebgallery 1.5.5_30.10.2006_2200
tinywebgallery tinywebgallery 1.6
tinywebgallery tinywebgallery 1.6.1
tinywebgallery tinywebgallery 1.6.2
tinywebgallery tinywebgallery 1.6.3
tinywebgallery tinywebgallery 1.6.3.4
tinywebgallery tinywebgallery 1.7
tinywebgallery tinywebgallery 1.7.1
tinywebgallery tinywebgallery 1.7.2-18.04.2008
tinywebgallery tinywebgallery 1.7.3-12.05.2008
tinywebgallery tinywebgallery 1.7.3.1
tinywebgallery tinywebgallery 1.7.3.2
tinywebgallery tinywebgallery 1.7.3.3
tinywebgallery tinywebgallery 1.7.4
tinywebgallery tinywebgallery 1.7.4.1
tinywebgallery tinywebgallery 1.7.4.2
tinywebgallery tinywebgallery 1.7.4.3
tinywebgallery tinywebgallery 1.7.4.4
tinywebgallery tinywebgallery 1.7.4.5
tinywebgallery tinywebgallery 1.7.5
tinywebgallery tinywebgallery 1.7.5.1
claudio_klingler quixplorer *
claudio_klingler quixplorer 1.0
claudio_klingler quixplorer 1.1
claudio_klingler quixplorer 1.2
claudio_klingler quixplorer 1.4
claudio_klingler quixplorer 1.5
claudio_klingler quixplorer 1.6
claudio_klingler quixplorer 2.0
claudio_klingler quixplorer 2.1.1
claudio_klingler quixplorer 2.2
claudio_klingler quixplorer 2.3
claudio_klingler quixplorer 2.3.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7075F8-B97F-4B8D-8BB4-A4990FFA1604",
              "versionEndIncluding": "1.7.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC860783-7018-4421-8ACE-6F6C522E41DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "21630514-7C0A-4B74-8E3A-4F32F9366EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E4CEDD-095B-40E1-9AD5-419CC63CAA50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C5722B-0221-4CE2-84E9-C4A6007DFB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "634AAE01-C70F-4B79-9FFB-E902AED7A6DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D2F0E0E-D32E-49C0-8710-B93E9D825925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "91115B08-3533-4027-B80A-3CDFDC38A915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE1A1DE-DD29-4A96-B483-1CA2B5AA59F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F0C7694-9978-4F85-8B81-A5AA558780BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "26CDEB37-98C9-42AD-BC50-415FEF0E5943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5A20998-E0B8-4AA4-9525-16451E163EDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F8E7335-EEA2-42AB-BFB3-D2F00303419F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3EE4A5E-DE0F-45E1-8950-53A1C35AEF15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEF8C28C-3AE4-4031-949A-B120097B93EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08EB1FD6-A790-40D0-A931-EAD9983D983C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E6D0D3-10F2-4D8C-BC26-BA4AB513B33B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "16028F35-AE2B-4C10-96C5-8C3ABBD59B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "372DA1CA-691A-4510-9ECE-86B4914ABE15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E99F2224-6DF4-4E8F-B5AD-6D474C4F27D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "99C0289F-F5D6-46D1-9D5F-4BBB7762E396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "864C47CE-7BE4-4927-83F1-F563C3E12034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "04274BC9-E353-4FD9-8BB6-7F431453B95C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9BA5727-3AD1-4169-8E94-231BD2CAFD24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "73AD8BD9-03BB-4E89-9D4D-50D095C38F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7468212F-EB58-4E20-888B-679D4242AC6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.0.1_15.08.2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D00E3AF-4649-4AE6-AD50-1166BC89FC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.0.2_17.08.2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B0E1423-82D3-42E8-B90E-E0A2DECF9948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.1_03.09.2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "511C256A-649F-47AD-88A7-4DF6CCAB4DB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.2.1_20.09.2006_1000:*:*:*:*:*:*:*",
              "matchCriteriaId": "A35930C6-663F-49A8-9C05-5F9CC985ABE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.2.2_21.09.2006_1000:*:*:*:*:*:*:*",
              "matchCriteriaId": "19C91295-E4A9-45B8-916F-7A34BF553611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.2_17.09.2006_1000:*:*:*:*:*:*:*",
              "matchCriteriaId": "0028B129-B45A-46A8-BD09-D3F8B383B9C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.3.1_11.10.2006_1000:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1B7DE42-BE41-4827-966F-BFE294CD9F03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.3.2_12.10.2006_1000:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D2C36F4-9F45-4E37-923A-5A3650132997",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.3_08.10.2006_1000:*:*:*:*:*:*:*",
              "matchCriteriaId": "F324A21B-69A7-4618-BB0B-0A5BF85A8655",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.4_13.10.2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2772FF4-E46F-4859-B7B1-BA1E2966BEBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.5_30.10.2006_2200:*:*:*:*:*:*:*",
              "matchCriteriaId": "660D356C-164C-47DA-8DB4-9E45DD876FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "080E4F0F-16E8-402F-9A11-2326469D65C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEC23AAE-37F6-4842-9BB7-E46BB6348B1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F8B14D-F020-4C93-A9A6-EEBF14A910B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FFFABF7-960A-4BB9-BCCC-C7CB4FCEA946",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "09EE1C8F-F520-4E77-BF1E-CDFC4F33FD5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1A7E5B-A04E-48E2-8761-11C8661C1D3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8412E8AF-BDB8-4DCF-AFEA-E3E69F37DC0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.2-18.04.2008:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B77756A-09FA-4B82-BF4F-FB15EEB66F2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3-12.05.2008:*:*:*:*:*:*:*",
              "matchCriteriaId": "153B15B9-280D-437A-B605-73879A0A1CCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "12116393-BFD8-473F-956F-5F6C0B27C63D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "363CC2F1-493E-42EB-ABF5-AECBBAEE64DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1591D7EE-1188-4EF4-8271-00B1F54EC92A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6546FC7A-5392-4741-B942-EACC360C958D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E0B254B-F9CF-4484-B7BE-331D009DDDFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3CCB8A7-BA0E-46AF-90FC-C2AE98A570F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "754912C5-01EF-4F98-9AF7-FFC4FEC5A5C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E3FAC1D-008A-4088-86EC-8A96DBDA8614",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EFCC874-3498-4F1A-8B51-DCA83B4C2B80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "38D8EFE9-B6A9-44BC-9041-2E1CCE8FB520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D30C4A2A-6759-474C-82EC-FFD97BFCEA1A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE67329A-7862-470A-AF78-DA135587E442",
              "versionEndIncluding": "2.3.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "354BBE12-96AA-4F3C-8B51-CFE80E4808D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FCFC487-FDA2-4D26-8140-1F16BAA7A658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B19E0034-0B67-4A71-83E8-98A148FF89F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F06FAD64-5233-44BB-9FDA-ED019967B7D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9541428-5609-43FE-BF9B-49414E64D0B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE410E3-E0AB-4C47-AB4A-7290460BB9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF42BE37-1569-4D22-9302-B1F5AB12C0B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFF152CB-58C1-4B9A-87E0-16A7E9EFF7EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "83892CE6-D168-4B03-94C8-CE167326FA60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3907B16C-0DEC-40AE-BB6F-5E6317E083BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D221E893-172F-49F7-BA83-149F88BADB7C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en .include/init.php (tambi\u00e9n conocido como admin/_include/init.php) en QuiXplorer v2.3.2 y anteriores, utilizado en TinyWebGallery v1.7.6 y anteriores, permite a los atacantes remotos, incluir y ejecutar arbitrariamente archivos locales a trav\u00e9s de ..(punto punto) en el par\u00e1metro \"lang\" para admin/index.php."
    }
  ],
  "id": "CVE-2009-1911",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-06-04T16:30:00.467",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35020"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35060"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/34892"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/8649"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35020"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35060"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/34892"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/8649"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-12-25 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13FBDE35-7E96-4CB0-AA02-20A54E25C034",
              "versionEndIncluding": "2.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "354BBE12-96AA-4F3C-8B51-CFE80E4808D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FCFC487-FDA2-4D26-8140-1F16BAA7A658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B19E0034-0B67-4A71-83E8-98A148FF89F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F06FAD64-5233-44BB-9FDA-ED019967B7D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9541428-5609-43FE-BF9B-49414E64D0B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE410E3-E0AB-4C47-AB4A-7290460BB9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF42BE37-1569-4D22-9302-B1F5AB12C0B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFF152CB-58C1-4B9A-87E0-16A7E9EFF7EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "83892CE6-D168-4B03-94C8-CE167326FA60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "BE727C14-8517-4996-8D34-FAF238CB3429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A9826B-068A-4923-B3C7-02EA3C732038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C03C88C-5D51-4720-90C8-EDFF288702AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B77C9D-C67F-4D46-928F-50811DEF43F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA0BD9C3-199A-4C23-B9E2-FC30C8461B0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D26478C-CF65-43D7-81F9-A2EB14F94689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B9A49E-17E4-4118-8AB4-B42259123E4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A423F65-9148-4393-BB29-0BCB72557C83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "13CB2420-FEDA-41E7-B650-84C71BFC0EAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8995BEFE-4E47-47ED-88DA-3BA06D4B2392",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de subida no restringida de ficheros en QuiXplorer v2.3 y anteriores permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n al subir un fichero con una extensi\u00f3n ejecutable usando la opci\u00f3n de subir en index.php, accediendo posteriormente mediante una petici\u00f3n directa del fichero en un directorio no especificado"
    }
  ],
  "id": "CVE-2011-5005",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-12-25T01:55:04.523",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.exploit-db.com/exploits/18118"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.exploit-db.com/exploits/18118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2011-5005 (GCVE-0-2011-5005)
Vulnerability from cvelistv5
Published
2011-12-25 01:00
Modified
2024-08-07 00:23
Severity ?
CWE
  • n/a
Summary
Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:39.630Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18118",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/18118"
          },
          {
            "name": "quixplorer-index-file-upload(71323)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-11-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18118",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/18118"
        },
        {
          "name": "quixplorer-index-file-upload(71323)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5005",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18118",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/18118"
            },
            {
              "name": "quixplorer-index-file-upload(71323)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5005",
    "datePublished": "2011-12-25T01:00:00",
    "dateReserved": "2011-12-24T00:00:00",
    "dateUpdated": "2024-08-07T00:23:39.630Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1911 (GCVE-0-2009-1911)
Vulnerability from cvelistv5
Published
2009-06-04 16:00
Modified
2024-08-07 05:27
Severity ?
CWE
  • n/a
Summary
Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php.
References
http://secunia.com/advisories/35060 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/503396/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/35020 third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/50408 vdb-entry, x_refsource_XF
http://www.tinywebgallery.com/forum/viewtopic.php?t=1653 x_refsource_CONFIRM
http://www.securityfocus.com/bid/34892 vdb-entry, x_refsource_BID
https://www.exploit-db.com/exploits/8649 exploit, x_refsource_EXPLOIT-DB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:27:54.931Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "35060",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35060"
          },
          {
            "name": "20090510 TinyWebGallery \u003c= 1.7.6 LFI / Remote Code Execution Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded"
          },
          {
            "name": "35020",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35020"
          },
          {
            "name": "tinywebgallery-init-file-include(50408)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653"
          },
          {
            "name": "34892",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34892"
          },
          {
            "name": "8649",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/8649"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-05-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "35060",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35060"
        },
        {
          "name": "20090510 TinyWebGallery \u003c= 1.7.6 LFI / Remote Code Execution Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded"
        },
        {
          "name": "35020",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35020"
        },
        {
          "name": "tinywebgallery-init-file-include(50408)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653"
        },
        {
          "name": "34892",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34892"
        },
        {
          "name": "8649",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/8649"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1911",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "35060",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35060"
            },
            {
              "name": "20090510 TinyWebGallery \u003c= 1.7.6 LFI / Remote Code Execution Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded"
            },
            {
              "name": "35020",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35020"
            },
            {
              "name": "tinywebgallery-init-file-include(50408)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408"
            },
            {
              "name": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653",
              "refsource": "CONFIRM",
              "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653"
            },
            {
              "name": "34892",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34892"
            },
            {
              "name": "8649",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/8649"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1911",
    "datePublished": "2009-06-04T16:00:00",
    "dateReserved": "2009-06-04T00:00:00",
    "dateUpdated": "2024-08-07T05:27:54.931Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}