{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T01:14:35.968","vulnerabilities":[{"cve":{"id":"CVE-2007-6528","sourceIdentifier":"cve@mitre.org","published":"2007-12-27T22:46:00.000","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in tiki-listmovies.php in TikiWiki before 1.9.9 allows remote attackers to read arbitrary files via a .. (dot dot) and modified filename in the movie parameter."},{"lang":"es","value":"Vulnerabilidad de salto de directorio en tiki-listmovies.php en TikiWiki versiones anteriores a 1.9.9 permite a atacantes remotos leer ficheros de su elección mediante un .. (punto punto) y un nombre de fichero modificado en el parámetro movie."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.9.8","matchCriteriaId":"A1C5F236-CF41-4783-901B-E76F615E0F61"},{"vulnerable":true,"criteria":"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.6.1:*:*:*:*:*:*:*","matchCriteriaId":"04CA9500-8F56-40DC-A6C4-F9964EFCD4F8"},{"vulnerable":true,"criteria":"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:*:*:*:*:*:*:*","matchCriteriaId":"B13501C0-3322-4D0C-8F7F-12535C76CB69"},{"vulnerable":true,"criteria":"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:rc1:*:*:*:*:*:*","matchCriteriaId":"6FB63DA4-E9B5-4BDF-A4E5-54F4EE4E94AA"},{"vulnerable":true,"criteria":"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:rc2:*:*:*:*:*:*","matchCriteriaId":"ADE04A29-E90B-41E1-A8B4-462B54C079B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:rc3:*:*:*:*:*:*","matchCriteriaId":"2540703B-63B8-41F4-A17A-0274A7DE7E63"},{"vulnerable":true,"criteria":"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.1:*:*:*:*:*:*:*","matchCriteriaId":"1489E8DC-11E7-49A3-84FF-909954147D01"},{"vulnerable":true,"criteria":"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.2:*:*:*:*:*:*:*","matchCriteriaId":"035EEFAB-B46C-407F-BF8C-B33756D4EEC3"},{"vulnerable":true,"criteria":"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.3:*:*:*:*:*:*:*","matchCriteriaId":"127349FA-B76D-402A-B688-F2F44024FA11"},{"vulnerable":true,"criteria":"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.4:*:*:*:*:*:*:*","matchCriteriaId":"175D43FD-450F-443E-831B-B8091BE7054F"},{"vulnerable":true,"criteria":"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.5:*:*:*:*:*:*:*","matchCriteriaId":"2F437662-CD55-477B-9FEE-0CC4E6CB908D"},{"vulnerable":true,"criteria":"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.6:*:*:*:*:*:*:*","matchCriteriaId":"EB235741-1FDA-4C90-BD6A-22D18D57D240"},{"vulnerable":true,"criteria":"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.7:*:*:*:*:*:*:*","matchCriteriaId":"62C09D81-AA53-4E82-BEA6-D321D95D2E0F"}]}]}],"references":[{"url":"http://osvdb.org/41178","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/28225","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/28602","source":"cve@mitre.org"},{"url":"http://security.gentoo.org/glsa/glsa-200801-10.xml","source":"cve@mitre.org"},{"url":"http://securityreason.com/securityalert/3484","source":"cve@mitre.org"},{"url":"http://tikiwiki.org/ReleaseProcess199","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/485482/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/27008","source":"cve@mitre.org","tags":["Exploit","Patch"]},{"url":"https://www.exploit-db.com/exploits/4942","source":"cve@mitre.org"},{"url":"http://osvdb.org/41178","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/28225","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/28602","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://security.gentoo.org/glsa/glsa-200801-10.xml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securityreason.com/securityalert/3484","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://tikiwiki.org/ReleaseProcess199","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/485482/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/27008","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]},{"url":"https://www.exploit-db.com/exploits/4942","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}