{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T04:36:29.934","vulnerabilities":[{"cve":{"id":"CVE-2008-4421","sourceIdentifier":"cve@mitre.org","published":"2008-10-07T20:00:17.360","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in MetaGauge 1.0.0.17, and probably other versions before 1.0.3.38, allows remote attackers to read arbitrary files via a \"..\\\" (dot dot backslash) in the URL."},{"lang":"es","value":"Vulnerabilidad de salto de directorio en MetaGauge 1.0.0.17, y probablemente en otras versiones anteriores a 1.0.3.38, que permite a los atacantes remotos leer arbitariamente archivos, a través de \"..\\\"(punto punto barra invertida) en la URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:N/A:N","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hammer-software:metagauge:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.0.20","matchCriteriaId":"5AEFC4EF-4AE4-419A-A361-BCC056223809"},{"vulnerable":true,"criteria":"cpe:2.3:a:hammer-software:metagauge:1.0.0.17:*:*:*:*:*:*:*","matchCriteriaId":"9C08AB5E-8C7F-4F1D-BAC5-E7DB779A8A7D"}]}]}],"references":[{"url":"http://secunia.com/advisories/32094","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://securityreason.com/securityalert/4360","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/497039/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/31596","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.vupen.com/english/advisories/2008/2747","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45697","source":"cve@mitre.org"},{"url":"https://www.exploit-db.com/exploits/6686","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/32094","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://securityreason.com/securityalert/4360","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/497039/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/31596","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.vupen.com/english/advisories/2008/2747","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45697","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.exploit-db.com/exploits/6686","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}