CVE-2009-3451
Published Sep 29, 2009
Last updated 6 years ago
Overview
- Description
- Directory traversal vulnerability in WebCoreModule.ashx in RADactive I-Load before 2008.2.5.0 allows remote attackers to read arbitrary files via unspecified vectors.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-22
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:radactive:i-load:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F139A75-38DA-423B-BF6A-0F72D289C3FB", "versionEndIncluding": "2008.2.4.0" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE74540D-CEF8-4D69-9B5C-EF65AB75297E" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.6.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D9C87F5-72A5-4067-88B3-AF93063D299E" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.6.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "013704F2-FE79-4576-8A9B-5BF8F57B64B2" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.6.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5482B06C-8E4E-46CD-B828-33BB9A535EEF" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D7C075F-0A1B-4216-B32C-B95CD73442E4" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E66E491-7785-4371-AE45-DA957D48DC3B" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E1B949F-5984-4726-B0AA-901A7C9B82C8" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F93132F-BD03-4731-9EBF-607F0C1E2CD8" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73C8F452-D278-4B4D-9C35-BF993894DF19" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A99B631-3142-413E-A00E-2A914A941A73" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD79EE0A-1603-43C3-BD22-3D3E6E3A542B" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10AC750D-2FD5-40B2-807E-3A7693FAB4C5" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A765BE3-9BE1-46B1-8C9C-A274D8AFBEC5" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C06A2416-1CD5-4F22-AD19-FADFE6D94997" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A30F2246-03AB-4A99-B2CB-2B116F70F7B4" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "508A871B-64F7-411E-9911-95E51D070D6B" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "556A339D-308F-4B16-8080-2756CC4225FC" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54F277DA-2B18-4CFF-8C0B-03D8B226982D" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88B1BC55-4481-4B17-8137-C65D5F4BD651" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D573A940-3848-4653-B92A-3D0CA07962E6" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AE4CC98-79E6-4F92-86D8-31902D071556" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5222097B-5239-4545-BBC8-9EEDA96372F9" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "574A108B-091A-4061-88A0-3A4AC75737DE" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "344775B7-18C6-4689-A513-C9A9E2F0B7DD" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C348E59F-085B-481D-A18F-CD9F20AE31F4" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32BBAACD-9D5B-4160-9266-D2C31C19990F" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EF467CB-26D0-49C8-B0D5-20089E907FA5" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01F0EDCD-B278-4B01-9048-5C316AB156AA" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E72C34E7-9E2E-4EB8-B942-9314444A4F9D" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.7.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55656D0E-1017-4C5A-BDC4-1182A744035E" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.7.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B83A4E9F-9188-438B-BA04-293460EAAA7D" }, { "criteria": "cpe:2.3:a:radactive:i-load:1.7.7.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F9EFA57-7AB4-4662-94CC-902C71546D12" }, { "criteria": "cpe:2.3:a:radactive:i-load:2008.1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C02639B-16A5-499A-959C-7BA9DC1696D2" }, { "criteria": "cpe:2.3:a:radactive:i-load:2008.1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9F506BE-4540-4419-866C-70D67F9B5A9B" }, { "criteria": "cpe:2.3:a:radactive:i-load:2008.1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "727B9CEA-AE45-4839-83A5-36D845823D84" }, { "criteria": "cpe:2.3:a:radactive:i-load:2008.1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90FBD2D6-A917-4BBF-A215-4B61056EF5CF" }, { "criteria": "cpe:2.3:a:radactive:i-load:2008.1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D97E6B5-22B8-47F4-9C4B-61EB3E82FAD1" }, { "criteria": "cpe:2.3:a:radactive:i-load:2008.1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FCA880C-7A43-42F0-B918-708A52301E58" }, { "criteria": "cpe:2.3:a:radactive:i-load:2008.1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A88B8238-3B59-4005-9368-707F0AD6DD2F" }, { "criteria": "cpe:2.3:a:radactive:i-load:2008.2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B881471-9471-4C0C-8075-C13039237850" }, { "criteria": "cpe:2.3:a:radactive:i-load:2008.2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65A4543A-1774-4DD2-B7CA-59B373D9A285" }, { "criteria": "cpe:2.3:a:radactive:i-load:2008.2.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "302B973C-E014-4A4E-8F5D-558A18DF806E" }, { "criteria": "cpe:2.3:a:radactive:i-load:2008.2.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "380F947D-2B8A-4768-B1F4-B04F6CC1E855" }, { "criteria": "cpe:2.3:a:radactive:i-load:2008.2.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E93F09B9-FD14-4ABE-A650-1CAE4727FE90" }, { "criteria": "cpe:2.3:a:radactive:i-load:2008.2.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "221D2428-6648-4B8D-8C38-68ED6480748A" } ], "operator": "OR" } ] } ]