{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T01:00:36.561","vulnerabilities":[{"cve":{"id":"CVE-2004-2184","sourceIdentifier":"cve@mitre.org","published":"2004-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in Digicraft Yak! server 2.0 through 2.1.2 allows remote attackers to read or write arbitrary files via \"../\" or \"..\\\" sequences in commands such as (1) dir or (2) put."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:digicraft_software:yak:2.0:*:*:*:*:*:*:*","matchCriteriaId":"7AC498B9-A215-451F-9C66-EA5F9277FDA5"},{"vulnerable":true,"criteria":"cpe:2.3:a:digicraft_software:yak:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"9DA073D3-FBF6-492A-A97E-95D221805BD1"},{"vulnerable":true,"criteria":"cpe:2.3:a:digicraft_software:yak:2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"04C9AFC0-B732-4E33-A88C-793032AF7BE4"},{"vulnerable":true,"criteria":"cpe:2.3:a:digicraft_software:yak:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"CB8A1181-1E57-4CF3-B42A-EF051EF497A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:digicraft_software:yak:2.1.1:*:*:*:*:*:*:*","matchCriteriaId":"FBDB8E27-1B5D-48AA-817A-F731A43740BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:digicraft_software:yak:2.1.2:*:*:*:*:*:*:*","matchCriteriaId":"B318450C-2B4F-4B41-8E37-DE203AFB5152"}]}]}],"references":[{"url":"http://aluigi.altervista.org/adv/yak-adv.txt","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://marc.info/?l=full-disclosure&m=109788315103778&w=2","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/12849","source":"cve@mitre.org"},{"url":"http://securitytracker.com/id?1011708","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/10763","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/378533","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/11433","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17740","source":"cve@mitre.org"},{"url":"http://aluigi.altervista.org/adv/yak-adv.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://marc.info/?l=full-disclosure&m=109788315103778&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/12849","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securitytracker.com/id?1011708","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/10763","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/378533","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/11433","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17740","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}