Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:radactive:i-load:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F139A75-38DA-423B-BF6A-0F72D289C3FB", "versionEndIncluding": "2008.2.4.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "DE74540D-CEF8-4D69-9B5C-EF65AB75297E", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D9C87F5-72A5-4067-88B3-AF93063D299E", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.6.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "013704F2-FE79-4576-8A9B-5BF8F57B64B2", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.6.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "5482B06C-8E4E-46CD-B828-33BB9A535EEF", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D7C075F-0A1B-4216-B32C-B95CD73442E4", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3E66E491-7785-4371-AE45-DA957D48DC3B", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E1B949F-5984-4726-B0AA-901A7C9B82C8", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "3F93132F-BD03-4731-9EBF-607F0C1E2CD8", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "73C8F452-D278-4B4D-9C35-BF993894DF19", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8A99B631-3142-413E-A00E-2A914A941A73", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DD79EE0A-1603-43C3-BD22-3D3E6E3A542B", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "10AC750D-2FD5-40B2-807E-3A7693FAB4C5", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "8A765BE3-9BE1-46B1-8C9C-A274D8AFBEC5", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "C06A2416-1CD5-4F22-AD19-FADFE6D94997", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "A30F2246-03AB-4A99-B2CB-2B116F70F7B4", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "508A871B-64F7-411E-9911-95E51D070D6B", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "556A339D-308F-4B16-8080-2756CC4225FC", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "54F277DA-2B18-4CFF-8C0B-03D8B226982D", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "88B1BC55-4481-4B17-8137-C65D5F4BD651", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D573A940-3848-4653-B92A-3D0CA07962E6", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AE4CC98-79E6-4F92-86D8-31902D071556", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "5222097B-5239-4545-BBC8-9EEDA96372F9", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "574A108B-091A-4061-88A0-3A4AC75737DE", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "344775B7-18C6-4689-A513-C9A9E2F0B7DD", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "C348E59F-085B-481D-A18F-CD9F20AE31F4", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "32BBAACD-9D5B-4160-9266-D2C31C19990F", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "4EF467CB-26D0-49C8-B0D5-20089E907FA5", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "01F0EDCD-B278-4B01-9048-5C316AB156AA", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "E72C34E7-9E2E-4EB8-B942-9314444A4F9D", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "55656D0E-1017-4C5A-BDC4-1182A744035E", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "B83A4E9F-9188-438B-BA04-293460EAAA7D", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:1.7.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "9F9EFA57-7AB4-4662-94CC-902C71546D12", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5C02639B-16A5-499A-959C-7BA9DC1696D2", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9F506BE-4540-4419-866C-70D67F9B5A9B", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "727B9CEA-AE45-4839-83A5-36D845823D84", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "90FBD2D6-A917-4BBF-A215-4B61056EF5CF", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0D97E6B5-22B8-47F4-9C4B-61EB3E82FAD1", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5FCA880C-7A43-42F0-B918-708A52301E58", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A88B8238-3B59-4005-9368-707F0AD6DD2F", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B881471-9471-4C0C-8075-C13039237850", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "65A4543A-1774-4DD2-B7CA-59B373D9A285", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "302B973C-E014-4A4E-8F5D-558A18DF806E", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "380F947D-2B8A-4768-B1F4-B04F6CC1E855", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E93F09B9-FD14-4ABE-A650-1CAE4727FE90", "vulnerable": true}, {"criteria": "cpe:2.3:a:radactive:i-load:2008.2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "221D2428-6648-4B8D-8C38-68ED6480748A", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in WebCoreModule.ashx in RADactive I-Load before 2008.2.5.0 allows remote attackers to read arbitrary files via unspecified vectors."}, {"lang": "es", "value": "Vulnerabilidad de salto de directorio en WebCoreModule.ashx en RADactive I-Load anterior a v2008.2.5.0 permite a atacantes remotos leer ficheros de su elecci\u00f3n a trav\u00e9s de vectores no especificados."}], "id": "CVE-2009-3451", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2009-09-29T15:30:00.563", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://radnet.radactive.com/forum/Default.aspx?g=posts&t=339"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/23807"}, {"source": "cve@mitre.org", "url": "http://www.osvdb.org/58196"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/506555/100/0/threaded"}, {"source": "cve@mitre.org", "url": "https://www.sec-consult.com/files/20090917-0_RADactive_I-Load_Multiple_Vulnerabilities.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://radnet.radactive.com/forum/Default.aspx?g=posts&t=339"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/23807"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/58196"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/506555/100/0/threaded"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.sec-consult.com/files/20090917-0_RADactive_I-Load_Multiple_Vulnerabilities.txt"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}