{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T02:24:03.847","vulnerabilities":[{"cve":{"id":"CVE-2009-0753","sourceIdentifier":"cve@mitre.org","published":"2009-03-03T16:30:05.203","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Absolute path traversal vulnerability in MLDonkey 2.8.4 through 2.9.7 allows remote attackers to read arbitrary files via a leading \"//\" (double slash) in the filename."},{"lang":"es","value":"Vulnerabilidad de salto de directorio absoluto en MLDonkey v2.8.4 hasta v2.9.7 permite a atacantes remotos leer ficheros a su elección a través de una secuencia \"//\" (doble barra) en el nombre de fichero."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mldonkey:mldonkey:2.8.4:*:*:*:*:*:*:*","matchCriteriaId":"6BD462A8-9413-4F1E-93FB-7112ADCAE047"},{"vulnerable":true,"criteria":"cpe:2.3:a:mldonkey:mldonkey:2.8.7:*:*:*:*:*:*:*","matchCriteriaId":"A6E8952D-70A2-4C19-A9E0-7E2A8BE22E52"},{"vulnerable":true,"criteria":"cpe:2.3:a:mldonkey:mldonkey:2.9:*:*:*:*:*:*:*","matchCriteriaId":"E14481A6-DEF4-4472-97DB-D3B355B936DA"},{"vulnerable":true,"criteria":"cpe:2.3:a:mldonkey:mldonkey:2.9.0-r3:*:*:*:*:*:*:*","matchCriteriaId":"52AD7927-2933-4FEC-B1A7-681BD2A41691"},{"vulnerable":true,"criteria":"cpe:2.3:a:mldonkey:mldonkey:2.9.7:*:*:*:*:*:*:*","matchCriteriaId":"281D0380-5585-49C7-B3BB-3957C6D2B914"}]}]}],"references":[{"url":"http://savannah.nongnu.org/bugs/?25667","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/34008","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/34306","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/34345","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/34436","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/2009/dsa-1739","source":"cve@mitre.org"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200903-36.xml","source":"cve@mitre.org"},{"url":"http://www.openwall.com/lists/oss-security/2009/02/23/1","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/33865","source":"cve@mitre.org"},{"url":"https://www.exploit-db.com/exploits/8097","source":"cve@mitre.org"},{"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00542.html","source":"cve@mitre.org"},{"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00617.html","source":"cve@mitre.org"},{"url":"http://savannah.nongnu.org/bugs/?25667","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/34008","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/34306","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/34345","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/34436","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2009/dsa-1739","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200903-36.xml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2009/02/23/1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/33865","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.exploit-db.com/exploits/8097","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00542.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00617.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}