{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T10:52:14.745","vulnerabilities":[{"cve":{"id":"CVE-2013-5107","sourceIdentifier":"cve@mitre.org","published":"2013-12-14T17:21:45.740","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in RockMongo 1.1.5 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the ROCK_LANG cookie, as demonstrated in a login.index action to index.php."},{"lang":"es","value":"Vulnerabilidad de recorrido de directorios en RockMongo 1.1.5 y anteriores permite a atacantes remotos leer archivos de forma arbitraria a través de .. (punto punto) en la cookie ROCK_LANG, como fue demostrado en la acción login.index de index.php."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:*:*:*:*:*:*:*:*","versionEndIncluding":"1.1.5","matchCriteriaId":"F07E63CA-DC1E-4C04-8894-38285D9FA3C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.0:*:*:*:*:*:*:*","matchCriteriaId":"60343CDA-3F7C-45F7-87BE-598596D687F7"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"098AE33E-6063-408F-B5E1-13A50596B941"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"B50E327E-8247-4148-83EB-D7ABA22F8988"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"D574D727-4C70-49A9-BBF3-A401B8FD11D8"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.0.4:*:*:*:*:*:*:*","matchCriteriaId":"B517EAA8-5AA6-4CBE-AEA8-8E166A3B8399"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.0.5:*:*:*:*:*:*:*","matchCriteriaId":"2BBC287E-D5EF-4262-A51C-5AD3D7449EB6"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.0.6:*:*:*:*:*:*:*","matchCriteriaId":"4B7C3ABC-7BAD-464C-AD4F-B561882ABC4B"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.0.7:*:*:*:*:*:*:*","matchCriteriaId":"D54D8D4D-E3BC-4361-A562-C5E10686F1FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.0.8:*:*:*:*:*:*:*","matchCriteriaId":"97CAD3ED-BC22-4BF4-A8E2-E28E9A9D0C51"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.0.9:*:*:*:*:*:*:*","matchCriteriaId":"70AA3C05-4D64-4024-BD13-078750EA7465"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.0.10:*:*:*:*:*:*:*","matchCriteriaId":"9384F995-44B7-4DF5-BA94-CA868AE8E82F"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.0.11:*:*:*:*:*:*:*","matchCriteriaId":"A655F81A-ED7E-4B8A-8818-D5E20182CAB7"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.0.12:*:*:*:*:*:*:*","matchCriteriaId":"AC82766A-FC33-4147-8F2D-B4882F79F02D"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"D2506C1E-853E-4C65-9066-94208D1C0E3A"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.1.2:*:*:*:*:*:*:*","matchCriteriaId":"115A04F6-57DC-4C94-9935-518700AA5143"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.1.3:*:*:*:*:*:*:*","matchCriteriaId":"E2E74AE8-CEEB-46E3-935D-CDEED7844249"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockmongo:rockmongo:1.1.4:*:*:*:*:*:*:*","matchCriteriaId":"DB3867A1-256A-4EFE-9864-A41B4CEF3F03"}]}]}],"references":[{"url":"https://www.trustwave.com/spiderlabs/advisories/TWSL2013-026.txt","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://www.trustwave.com/spiderlabs/advisories/TWSL2013-026.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}}]}