CVE-2010-2465
Published Jun 25, 2010
Last updated 14 years ago
Overview
- Description
- The S2 Security NetBox 2.5, 3.3, and 4.0, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download node logs, photographs of persons, and backup files via unspecified HTTP requests.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Evaluator
- Comment
- -
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:s2sys:netbox:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3922C3C5-2C55-4A0E-B75D-E60C97D40AAD" }, { "criteria": "cpe:2.3:h:s2sys:netbox:3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65399B51-DBB1-42E0-978D-D6E1C99A5EC1" }, { "criteria": "cpe:2.3:h:s2sys:netbox:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31F57E74-E9AE-4ED2-B19E-AA0C561B9E4F" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:linearcorp:emerge_50:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D0530B7-711F-4187-829F-A266ADDE8C84" }, { "criteria": "cpe:2.3:h:linearcorp:emerge_5000:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA501469-8783-40D7-A52B-E47319A0F593" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:sonitrol:eaccess:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "864551FE-2A80-4DFE-BF54-2D6A6470F390" } ], "operator": "OR" } ] } ]