Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:rarlab:rar:4.00:*:*:*:*:*:*:*", "matchCriteriaId": "F803749C-46E8-4541-B841-553C75272EF0", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:4.01:*:*:*:*:*:*:*", "matchCriteriaId": "2CE92455-55CA-4E2D-B077-51C4A0D49715", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:4.10:*:*:*:*:*:*:*", "matchCriteriaId": "56D39AD1-4F84-4A53-A224-6707D778EA3C", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:4.11:*:*:*:*:*:*:*", "matchCriteriaId": "74CF2659-C042-4A4C-8B6C-A6A51F3EC399", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:4.20:*:*:*:*:*:*:*", "matchCriteriaId": "74028FB0-CA63-4694-8C2E-3B35176641AE", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:5.00:*:*:*:*:*:*:*", "matchCriteriaId": "E47CE584-83DF-49CF-9153-37699A2FE9EB", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:5.01:*:*:*:*:*:*:*", "matchCriteriaId": "F2EE581E-F571-488D-94CC-0DBE34E97F85", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "46EDB2F8-6481-4592-9A57-C984AEB871D2", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:5.11:*:*:*:*:*:*:*", "matchCriteriaId": "C9A55F08-6F2C-4360-97DD-79AE3F88C0BB", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:5.20:*:*:*:*:*:*:*", "matchCriteriaId": "C3378FFB-74D9-4283-9146-AF5BBF5FA828", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:5.21:*:*:*:*:*:*:*", "matchCriteriaId": "743B8E3C-8106-4D8A-92F8-7D9D0D9E4265", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "EA6BB74B-0892-4331-997D-51681BD9C2C7", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:5.31:*:*:*:*:*:*:*", "matchCriteriaId": "119C70AA-15A0-40B9-AEE9-1E4F82637795", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "5A049C94-DB84-4753-A537-3494167E5A39", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "CCD54DB8-6100-44A0-8C5B-83E77BE6D7C5", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:5.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "6442F46C-818A-4E89-B4C9-67A19C76F3F5", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:5.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "CFACBB12-4B7C-451F-9EE2-9148ADD98B7D", "vulnerable": true}, {"criteria": "cpe:2.3:a:rarlab:rar:5.50:beta3:*:*:*:*:*:*", "matchCriteriaId": "41793E56-F965-4C8A-A13F-D2FF1AFCABC4", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Directory Traversal exists in RAR 4.x and 5.x because an unpack operation follows any symlinks, including symlinks contained in the archive. This allows remote attackers to write to arbitrary files via a crafted archive."}, {"lang": "es", "value": "Vulnerabilidad de salto de directorio en RAR 4.x y 5.x, ya que una operaci\u00f3n de desempaquetado sigue a cualquier symlink, incluyendo los symlinks contenidos en el archivo. Esto permite a atacantes remotos escribir ficheros arbitrarios a trav\u00e9s de un fichero manipulado.ive."}], "id": "CVE-2014-9983", "lastModified": "2024-11-21T02:22:07.303", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0"}, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-06-04T23:29:00.187", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774172"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774172"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}