{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T20:33:19.410","vulnerabilities":[{"cve":{"id":"CVE-2009-2386","sourceIdentifier":"cve@mitre.org","published":"2009-07-10T15:30:00.217","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Insecure method vulnerability in Awingsoft Awakening Winds3D Viewer plugin 3.5.0.0, 3.0.0.5, and possibly other versions allows remote attackers to force the download and execution of arbitrary files via the GetURL method."},{"lang":"es","value":"Vulnerabilidad de método inseguro en el complemento Awingsoft Awakening Winds3D Viewer v3.5.0.0, v3.0.0.5 y posiblemente otras versiones permite a atacantes remotos forzar la descarga y ejecución de archivos arbitrarios a través del método GetURL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:awingsoft:awakening_winds3d_viewer_plugin:3.0.0.5:*:*:*:*:*:*:*","matchCriteriaId":"8E9ADF12-4B92-44B6-BD4A-F7766257549E"},{"vulnerable":true,"criteria":"cpe:2.3:a:awingsoft:awakening_winds3d_viewer_plugin:3.5.0.0:*:*:*:*:*:*:*","matchCriteriaId":"6825AF8E-3F4E-4724-8B7D-E7FBCF72B53E"}]}]}],"references":[{"url":"http://secunia.com/advisories/35764","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.coresecurity.com/content/winds3d-viewer-advisory","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/35595","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.vupen.com/english/advisories/2009/1834","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/35764","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.coresecurity.com/content/winds3d-viewer-advisory","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/35595","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.vupen.com/english/advisories/2009/1834","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}