{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T10:24:14.431","vulnerabilities":[{"cve":{"id":"CVE-2011-3305","sourceIdentifier":"psirt@cisco.com","published":"2011-10-06T10:55:05.723","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in Cisco Network Admission Control (NAC) Manager 4.8.x allows remote attackers to read arbitrary files via crafted traffic to TCP port 443, aka Bug ID CSCtq10755."},{"lang":"es","value":"Vulnerabilidad de salto de directorio en Cisco Network Admisión Control (NAC) Manager v4.8.x permite a atacantes remotos leer archivos de su elección a través de tráfico manipulado para el puerto TCP 443, también conocido como Bug ID CSCtq10755."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:N/A:N","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:nac_manager:4.8:*:*:*:*:*:*:*","matchCriteriaId":"462272D0-56D4-4B6E-9391-0E0F8E6F9EC7"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:nac_manager:4.8\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"D60ABFAD-5BEB-43E1-A55C-35973180B59D"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:nac_manager:4.8\\(2\\):*:*:*:*:*:*:*","matchCriteriaId":"0884046A-1A4C-41FD-9898-D0906401AD1D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nac_appliance:*:*:*:*:*:*:*:*","matchCriteriaId":"E4FBD568-9A85-48B0-8E34-6AE13E71F6BC"}]}]}],"references":[{"url":"http://osvdb.org/76080","source":"psirt@cisco.com"},{"url":"http://secunia.com/advisories/46309","source":"psirt@cisco.com"},{"url":"http://www.cisco.com/warp/public/707/cisco-sa-20111005-nac.shtml","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/49954","source":"psirt@cisco.com"},{"url":"http://www.securitytracker.com/id?1026142","source":"psirt@cisco.com"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/70335","source":"psirt@cisco.com"},{"url":"http://osvdb.org/76080","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/46309","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cisco.com/warp/public/707/cisco-sa-20111005-nac.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/49954","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1026142","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/70335","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}