{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T03:24:34.029","vulnerabilities":[{"cve":{"id":"CVE-2012-1112","sourceIdentifier":"secalert@redhat.com","published":"2012-09-06T18:55:01.143","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in Open-Realty CMS 2.5.8 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the select_users_template parameter to index.php."},{"lang":"es","value":"Vulnerabilidad de directorio transversal en Open-Realty CMS v2.5.8 y anteriores permite a atacantes remotos incluir y ejecutar archivos locales a través de un .. (punto punto) en el parámetro select_users_template a index.php."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:open-realty:open-realty:*:*:*:*:*:*:*:*","versionEndIncluding":"2.5.8","matchCriteriaId":"E3866E7C-EECB-40F5-B0AD-7FBEFB75CF82"},{"vulnerable":true,"criteria":"cpe:2.3:a:open-realty:open-realty:2.3.1:*:*:*:*:*:*:*","matchCriteriaId":"9A1950D0-5CAA-4FB8-A356-CADD79BA21C0"},{"vulnerable":true,"criteria":"cpe:2.3:a:open-realty:open-realty:2.3.4:*:*:*:*:*:*:*","matchCriteriaId":"63F16EB7-3DB5-4B61-9C2D-41699C6D5350"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2012-03/0012.html","source":"secalert@redhat.com","tags":["Exploit"]},{"url":"http://www.openwall.com/lists/oss-security/2012/03/05/14","source":"secalert@redhat.com","tags":["Exploit"]},{"url":"http://www.openwall.com/lists/oss-security/2012/03/05/23","source":"secalert@redhat.com","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/52296","source":"secalert@redhat.com","tags":["Exploit"]},{"url":"http://yehg.net/lab/pr0js/advisories/%5Bopen-realty_2.5.8_2.x%5D_lfi","source":"secalert@redhat.com","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/73736","source":"secalert@redhat.com"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2012-03/0012.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.openwall.com/lists/oss-security/2012/03/05/14","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.openwall.com/lists/oss-security/2012/03/05/23","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/52296","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://yehg.net/lab/pr0js/advisories/%5Bopen-realty_2.5.8_2.x%5D_lfi","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/73736","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}