{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T13:12:54.033","vulnerabilities":[{"cve":{"id":"CVE-2007-0609","sourceIdentifier":"cve@mitre.org","published":"2007-05-09T17:19:00.000","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in Advanced Guestbook 2.4.2 allows remote attackers to bypass .htaccess settings, and execute arbitrary PHP local files or read arbitrary local templates, via a .. (dot dot) in a lang cookie, followed by a filename without its .php extension, as demonstrated via a request to index.php."},{"lang":"es","value":"Vulnerabilidad de salto de directorio en Advanced Guestbook 2.4.2 permite a atacantes remotos evitar la configuración .htaccess, y ejecutar archivos locales PHP de su elección o leer templates locales de su elección, a través de la secuencia .. (punto punto) en una cookie lang, seguida de un nombre de fichero sin su extensión .php, como se demostró a través de una respuesta a index.php."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:advanced_guestbook:advanced_guestbook:2.4.2:*:*:*:*:*:*:*","matchCriteriaId":"6F527A81-0115-4540-A4C3-E94E582B9434"}]}]}],"references":[{"url":"http://secunia.com/advisories/25153","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://securityreason.com/securityalert/2662","source":"cve@mitre.org"},{"url":"http://www.netvigilance.com/advisory0012","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.netvigilance.com/advisory0013","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/467937/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/467941/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/23876","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.vupen.com/english/advisories/2007/1726","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34152","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/25153","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://securityreason.com/securityalert/2662","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.netvigilance.com/advisory0012","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.netvigilance.com/advisory0013","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/467937/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/467941/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/23876","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.vupen.com/english/advisories/2007/1726","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34152","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}