Show plain JSON{"id": "CVE-2006-3458", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2006-07-07T23:05:00.000", "references": [{"url": "http://mail.zope.org/pipermail/zope-announce/2006-July/001984.html", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/20988", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/21025", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/21130", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/21459", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.debian.org/security/2006/dsa-1113", "source": "cve@mitre.org"}, {"url": "http://www.novell.com/linux/security/advisories/2006_19_sr.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/18856", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2006/2681", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.zope.org/Products/Zope/Hotfix-2006-07-05/Hotfix-20060705/README.txt", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27636", "source": "cve@mitre.org"}, {"url": "https://usn.ubuntu.com/317-1/", "source": "cve@mitre.org"}, {"url": "http://mail.zope.org/pipermail/zope-announce/2006-July/001984.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/20988", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/21025", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/21130", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/21459", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2006/dsa-1113", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.novell.com/linux/security/advisories/2006_19_sr.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/18856", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2006/2681", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.zope.org/Products/Zope/Hotfix-2006-07-05/Hotfix-20060705/README.txt", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27636", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://usn.ubuntu.com/317-1/", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Zope 2.7.0 to 2.7.8, 2.8.0 to 2.8.7, and 2.9.0 to 2.9.3 (Zope2) does not disable the \"raw\" command when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows local users to read arbitrary files."}, {"lang": "es", "value": "Zope 2.7.0 a 2.7.8, 2.8.0 a 2.8.7, y 2.9.0 a 2.9.3 (Zope2) no desabilita el comando \"raw\" cuando se mantiene a usuarios no v\u00e1lidos con la funcionalidad de texto reestructurado (reStructuredText) desde docutils, lo cual permite a usuarios locales leer archivos de su elecci\u00f3n."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:zope:zope:2.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E296CD1C-2601-4A63-9E9D-38A39C84BF5D"}, {"criteria": "cpe:2.3:a:zope:zope:2.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FF9B22D-6EF3-4364-A016-041457C4DFC0"}, {"criteria": "cpe:2.3:a:zope:zope:2.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88153606-52FE-4C0B-88CD-B76538C19055"}, {"criteria": "cpe:2.3:a:zope:zope:2.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAA38381-4C32-4C55-8116-341028D1888A"}, {"criteria": "cpe:2.3:a:zope:zope:2.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B294E38-65FD-474D-BABC-9447EF33202A"}, {"criteria": "cpe:2.3:a:zope:zope:2.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "685805FD-1A33-480E-A313-255EDF0B5266"}, {"criteria": "cpe:2.3:a:zope:zope:2.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D827148D-4A8A-41DB-91B6-0049706D53D8"}, {"criteria": "cpe:2.3:a:zope:zope:2.7.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0273EF1B-BC64-432F-8966-68547DFAD6BC"}, {"criteria": "cpe:2.3:a:zope:zope:2.7.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A52CDCE-172C-4FAC-9015-ACF362E8E8A0"}, {"criteria": "cpe:2.3:a:zope:zope:2.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "234C776B-C053-484C-ADE4-ED270064943F"}, {"criteria": "cpe:2.3:a:zope:zope:2.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "244107E5-42B0-4695-BBC9-5B90AD0A1336"}, {"criteria": "cpe:2.3:a:zope:zope:2.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93785E75-3F82-471E-B802-6337A6469AF7"}, {"criteria": "cpe:2.3:a:zope:zope:2.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B34066B4-CE72-4271-9CFD-F725F7D17C89"}, {"criteria": "cpe:2.3:a:zope:zope:2.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A40B0D1-1812-4BC7-AC7D-CCE6184A9DB1"}, {"criteria": "cpe:2.3:a:zope:zope:2.8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81028DBB-7A75-4D27-8027-947F15CAA21E"}, {"criteria": "cpe:2.3:a:zope:zope:2.8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62BCE60F-9081-44D3-87FC-396D1A954626"}, {"criteria": "cpe:2.3:a:zope:zope:2.8.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBA09D22-779C-4E63-B216-B931FA11E014"}, {"criteria": "cpe:2.3:a:zope:zope:2.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EC9CB4D-3DE0-425B-9897-03C23379B5F8"}, {"criteria": "cpe:2.3:a:zope:zope:2.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82D9A178-BF69-4C23-BEC8-D175FD58E10D"}, {"criteria": "cpe:2.3:a:zope:zope:2.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0279FD6-9E30-429A-BB70-9B7AF7055160"}, {"criteria": "cpe:2.3:a:zope:zope:2.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78E8ABCF-A7BE-4AB7-BFE9-CF29F7E02860"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}