Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:vmware:view:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B7952E0E-6986-48BF-865C-189033AEB91E", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:view:4.0.0:u2:*:*:*:*:*:*", "matchCriteriaId": "9D0C4BA2-E018-4C74-B259-E0CE3109A864", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:view:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "4DE652F1-BC10-497D-A244-D893A148483D", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:view:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "4346ED63-851E-43E9-933D-7CCAFA43B17B", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:view:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "7373CD57-520C-46D9-9728-28E976AA87FA", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:view:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0B8E256-7371-4702-96AC-3A72A364D88A", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:view:5.0.0:u2:*:*:*:*:*:*", "matchCriteriaId": "B6E0DE85-7C49-4446-9407-1778F438806B", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:view:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F21D6157-BB2F-4D13-871C-654287765ABC", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:view:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "45F2841C-51B4-49EA-B6F6-8C67525233A6", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Multiple directory traversal vulnerabilities in the (1) View Connection Server and (2) View Security Server in VMware View 4.x before 4.6.2 and 5.x before 5.1.2 allow remote attackers to read arbitrary files via unspecified vectors."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de salto de directorio en (1) View Connection Server y (2) View Security Server en VMware View v4.x antes de v4.6.2 y v5.x antes de v5.1.2 permiten a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s de vectores no especificados.\r\n"}], "id": "CVE-2012-5978", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-12-19T11:56:00.030", "references": [{"source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1027875"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0017.html"}, {"source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17049"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027875"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0017.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17049"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}