5.8 Medium
AI Score
Confidence
Low
8.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:C/I:C/A:C
0.011 Low
EPSS
Percentile
83.9%
Directory traversal vulnerability in ContentServer.py in the Wiki Server in Apple Mac OS X 10.5.2 (aka Leopard) allows remote authenticated users to write arbitrary files via “…” sequences in file attachments.
CPE | Name | Operator | Version |
---|---|---|---|
apple:mac_os_x_server | apple mac os x server | eq | 10.5.2 |
apple:mac_os_x | apple mac os x | eq | 10.5.2 |
docs.info.apple.com/article.html?artnum=307562
lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
secunia.com/advisories/29420
www.coresecurity.com/index.php5?module=ContentMod&action=item&id=2189
www.securityfocus.com/archive/1/489786/100/0/threaded
www.securityfocus.com/bid/28278
www.securitytracker.com/id?1019660
www.vupen.com/english/advisories/2008/0924/references
exchange.xforce.ibmcloud.com/vulnerabilities/41278