{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T05:05:51.498","vulnerabilities":[{"cve":{"id":"CVE-2008-0782","sourceIdentifier":"cve@mitre.org","published":"2008-02-14T21:00:00.000","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in MoinMoin 1.5.8 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the MOIN_ID user ID in a cookie for a userform action.  NOTE: this issue can be leveraged for PHP code execution via the quicklinks parameter."},{"lang":"es","value":"Una vulnerabilidad de salto de directorio en MoinMoin versión 1.5.8 y anteriores, permite a los atacantes remotos sobrescribir archivos arbitrarios por medio de un .. (punto punto) en el ID de usuario MOIN_ID de una cookie para una acción userform. NOTA: este problema puede ser aprovechado para la ejecución de código PHP por medio del parámetro quicklinks."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:0.1:*:*:*:*:*:*:*","matchCriteriaId":"F2D2866E-A684-4EB7-A127-5FEC934945E4"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:0.2:*:*:*:*:*:*:*","matchCriteriaId":"9D41FDF8-B8BD-43D9-8D53-ADCF15F7E16B"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:0.3:*:*:*:*:*:*:*","matchCriteriaId":"0BDC4AB6-39BF-4444-9CFE-B654A19814C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:0.7:*:*:*:*:*:*:*","matchCriteriaId":"0FD78CAE-9A9D-40AA-AD1F-C124A8315714"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:0.8:*:*:*:*:*:*:*","matchCriteriaId":"8673FFE8-349E-4412-9913-1145DFA1EC46"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:0.9:*:*:*:*:*:*:*","matchCriteriaId":"24271A6D-21D9-4E8D-997F-0EC132518FBC"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:0.10:*:*:*:*:*:*:*","matchCriteriaId":"B3072B82-3D5C-46DF-8869-08FAAC5C70DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:0.11:*:*:*:*:*:*:*","matchCriteriaId":"93508FCF-7852-4CB9-AD91-AB0FCD61BE43"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.0:*:*:*:*:*:*:*","matchCriteriaId":"9B83ACA6-5C3C-46E3-805C-EE1E759B7331"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.1:*:*:*:*:*:*:*","matchCriteriaId":"7F7EF155-C5E0-4473-B635-C551BF3F8EFC"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.2:*:*:*:*:*:*:*","matchCriteriaId":"ABFA7F26-835B-4454-91A2-1DBB80C53492"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"C92D8510-CA34-4E6D-B432-997860C63B89"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.2.2:*:*:*:*:*:*:*","matchCriteriaId":"EB2354B8-9A1A-4E75-92AC-F16CFDF91761"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.5.0:*:*:*:*:*:*:*","matchCriteriaId":"6B44C24B-013E-4769-A200-D59752E0A041"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.5.1:*:*:*:*:*:*:*","matchCriteriaId":"EB8DB90E-BEE5-447E-9F78-A96634343815"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.5.2:*:*:*:*:*:*:*","matchCriteriaId":"84317439-A287-4897-9608-65095860AB95"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.5.3:*:*:*:*:*:*:*","matchCriteriaId":"2FB70477-B0F2-44D6-92A8-0F42F890CF99"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.5.3_rc1:*:*:*:*:*:*:*","matchCriteriaId":"013FBB75-8B01-4249-9C6C-5E27964ED2D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.5.3_rc2:*:*:*:*:*:*:*","matchCriteriaId":"361C37DC-CB43-4E6A-A198-313A9D62CD18"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.5.4:*:*:*:*:*:*:*","matchCriteriaId":"22F3D66C-3D24-41D0-9E4B-BB458DD5517D"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.5.5:*:*:*:*:*:*:*","matchCriteriaId":"0A4C9F85-C5EF-4991-A005-5839951B9843"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.5.5_rc1:*:*:*:*:*:*:*","matchCriteriaId":"690F09A1-6195-404D-BDC3-5F02A4A201C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.5.5a:*:*:*:*:*:*:*","matchCriteriaId":"F9C82F62-DFBB-4499-8C6D-27DA49A00F6F"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.5.6:*:*:*:*:*:*:*","matchCriteriaId":"57003BFE-8FB2-480A-AFA1-63817B608F9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.5.7:*:*:*:*:*:*:*","matchCriteriaId":"B0FD9248-1E4B-46DC-9F78-20787F56D50B"},{"vulnerable":true,"criteria":"cpe:2.3:a:moinmoin:moinmoin:1.5.8:*:*:*:*:*:*:*","matchCriteriaId":"23539FCA-FF83-46E5-A9E2-5051D975DC12"}]}]}],"references":[{"url":"http://hg.moinmo.in/moin/1.5/rev/e69a16b6e630","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/29010","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/29262","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/29444","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/33755","source":"cve@mitre.org"},{"url":"http://www.attrition.org/pipermail/vim/2008-January/001890.html","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/2008/dsa-1514","source":"cve@mitre.org"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/27404","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2008/0569/references","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/39837","source":"cve@mitre.org"},{"url":"https://usn.ubuntu.com/716-1/","source":"cve@mitre.org"},{"url":"https://www.exploit-db.com/exploits/4957","source":"cve@mitre.org"},{"url":"http://hg.moinmo.in/moin/1.5/rev/e69a16b6e630","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/29010","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/29262","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/29444","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/33755","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.attrition.org/pipermail/vim/2008-January/001890.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2008/dsa-1514","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/27404","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2008/0569/references","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/39837","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://usn.ubuntu.com/716-1/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.exploit-db.com/exploits/4957","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}