{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T13:45:50.306","vulnerabilities":[{"cve":{"id":"CVE-2007-1720","sourceIdentifier":"cve@mitre.org","published":"2007-03-28T00:19:00.000","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in addressbook.php in the Addressbook 1.2 module for PHP-Nuke allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the module_name parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file."},{"lang":"es","value":"Vulnerabilidad de salto de directorio en addressbook.php del módulo Addressbook 1.2 para PHP-Nuke permite a atacantes remotos incluir y ejecutar ficheros locales de su elección mediante una secuencia .. (punto punto) en el parámetro module_name, como ha sido demostrado inyectando secuencias PHP en el fichero de log de Apache HTTP Server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sb-websoft:addressbook:1.2:*:*:*:*:*:*:*","matchCriteriaId":"841B3DB5-FF11-4B11-B9F4-AAC818A8CAA8"}]}]}],"references":[{"url":"http://osvdb.org/36572","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/24697","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/23156","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2007/1118","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33243","source":"cve@mitre.org"},{"url":"https://www.exploit-db.com/exploits/3582","source":"cve@mitre.org"},{"url":"http://osvdb.org/36572","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/24697","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/23156","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2007/1118","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33243","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.exploit-db.com/exploits/3582","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}