{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T19:42:02.109","vulnerabilities":[{"cve":{"id":"CVE-2010-4154","sourceIdentifier":"cve@mitre.org","published":"2010-11-03T20:00:04.123","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in Rhino Software, Inc. FTP Voyager 15.2.0.11, and possibly earlier, allows remote FTP servers to write arbitrary files via a \"..\\\" (dot dot backslash) in a filename."},{"lang":"es","value":"Vulnerabilidad de salto de directorio en Rhino Software, Inc. FTP Voyager v15.2.0.11 y posiblemente versiones previas, permite a servidores FTP remotos crear archivos de su elección a través de la secuencia \"..\\\" en el nombre de archivo."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:*:*:*:*:*:*:*:*","versionEndIncluding":"15.2.0.11","matchCriteriaId":"C90002B6-F044-4D5D-9E95-73C4A7CF66C9"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:15.0.0.0:*:*:*:*:*:*:*","matchCriteriaId":"6FB3C40D-51C0-4229-9353-054F9C653CFE"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:15.0.0.1:*:*:*:*:*:*:*","matchCriteriaId":"1E00F8BE-7898-4A93-9819-ED7076CB6B94"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:15.0.0.2:*:*:*:*:*:*:*","matchCriteriaId":"27F9C61E-A359-407A-8088-28969287352C"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:15.0.0.3:*:*:*:*:*:*:*","matchCriteriaId":"47D5252A-CD16-4B68-A70D-DA7AE8CCD46B"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:15.1.0.0:*:*:*:*:*:*:*","matchCriteriaId":"85D3564B-64C5-42C9-A2D7-E1C0E4B7BD8C"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:15.1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"75169087-BDCF-49E7-A8F5-BF98FE476B90"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:15.1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"EA66B2B9-14AF-4B1E-800B-19D0AF8FAD11"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:15.1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"C5912898-47A0-4551-86F2-9A0C6FE876A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:15.1.0.4:*:*:*:*:*:*:*","matchCriteriaId":"9D74B72D-302E-489B-BDFE-9968937277DB"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:15.2.0.0:*:*:*:*:*:*:*","matchCriteriaId":"0A89F643-6355-4D1D-A2E6-DFF1D2E2E87E"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:15.2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"E13E003D-FBDC-4C78-8555-A77A59B9E3F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:15.2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"BB4A33DB-0D0E-43E8-881E-4B4CBA6D465D"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:15.2.0.6:*:*:*:*:*:*:*","matchCriteriaId":"D84A627C-ABFB-4601-9A2A-9661004D1D37"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:15.2.0.8:*:*:*:*:*:*:*","matchCriteriaId":"DEAC97E8-AEC7-48C6-9828-5D998FACC55C"},{"vulnerable":true,"criteria":"cpe:2.3:a:rhinosoft:ftp_voyager:15.2.0.9:*:*:*:*:*:*:*","matchCriteriaId":"CAD63A3C-9F0B-4512-9960-6EE37B0CADAC"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=128654931101920&w=2","source":"cve@mitre.org"},{"url":"http://packetstormsecurity.org/1010-exploits/ftpvoyager-traversal.txt","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/41719","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.htbridge.ch/advisory/directory_traversal_vulnerability_in_ftp_voyager.html","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/68607","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/43869","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/62392","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=128654931101920&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://packetstormsecurity.org/1010-exploits/ftpvoyager-traversal.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/41719","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.htbridge.ch/advisory/directory_traversal_vulnerability_in_ftp_voyager.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/68607","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/43869","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/62392","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}