- Description
- Multiple absolute path traversal vulnerabilities in Pegasus Imaging ImagXpress 8.0 allow remote attackers to (1) delete arbitrary files via the CacheFile attribute in the ThumbnailXpres.1 ActiveX control (PegasusImaging.ActiveX.ThumnailXpress1.dll) or (2) overwrite arbitrary files via the CompactFile function in the ImagXpress.8 ActiveX control (PegasusImaging.ActiveX.ImagXpress8.dll).
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 4.9
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:N/I:P/A:P
- nvd@nist.gov
- CWE-22
- Hype score
- Not currently trending
- Pegasus Imaging Corp.Pegasus Imaging acknowledges these issues as affecting our controls in the same way that they affect any ActiveX control that allows files to be saved to absolute directory paths. We’re working on reducing the vulnerabilities of these issues and will publish additional information when available at www.pegasusimaging.com/faq.htm. In the meantime we recommend that users follow the Microsoft guidelines for reducing the vulnerability by increasing their browser security settings for ActiveX controls.
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pegasus_imaging:imagxpress:8.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D383BF0D-6A09-406D-B485-33D1DC3D341D"
}
],
"operator": "OR"
}
]
}
]