CVE-2010-2465

The S2 Security NetBox 2.5, 3.3, and 4.0, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download node logs, photographs of persons, and backup files via unspecified HTTP requests.
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:s2sys:netbox:2.5:*:*:*:*:*:*:*
cpe:2.3:h:s2sys:netbox:3.3:*:*:*:*:*:*:*
cpe:2.3:h:s2sys:netbox:4.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:h:linearcorp:emerge_50:*:*:*:*:*:*:*:*
cpe:2.3:h:linearcorp:emerge_5000:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:h:sonitrol:eaccess:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2010-06-25 21:30

Updated : 2024-02-28 11:41


NVD link : CVE-2010-2465

Mitre link : CVE-2010-2465

CVE.ORG link : CVE-2010-2465


JSON object : View

Products Affected

sonitrol

  • eaccess

linearcorp

  • emerge_5000
  • emerge_50

s2sys

  • netbox
CWE
CWE-264

Permissions, Privileges, and Access Controls