{"api_version":"1","generated_at":"2026-04-23T02:58:21+00:00","cve":"CVE-2006-5750","urls":{"html":"https://cve.report/CVE-2006-5750","api":"https://cve.report/api/cve/CVE-2006-5750.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-5750","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-5750"},"summary":{"title":"CVE-2006-5750","description":"Directory traversal vulnerability in the DeploymentFileRepository class in JBoss Application Server (jbossas) 3.2.4 through 4.0.5 allows remote authenticated users to read or modify arbitrary files, and possibly execute arbitrary code, via unspecified vectors related to the console manager.","state":"PUBLISHED","assigner":"redhat","published_at":"2006-11-27 20:07:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.vupen.com/english/advisories/2007/0554","name":"http://www.vupen.com/english/advisories/2007/0554","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2006-0743.html","name":"http://www.redhat.com/support/errata/RHSA-2006-0743.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://secure-support.novell.com/KanisaPlatform/Publishing/719/3024921_f.SAL_Public.html","name":"https://secure-support.novell.com/KanisaPlatform/Publishing/719/3024921_f.SAL_Public.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"400"},{"url":"http://www.securityfocus.com/archive/1/452830/100/0/threaded","name":"http://www.securityfocus.com/archive/1/452830/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/4724","name":"http://www.vupen.com/english/advisories/2006/4724","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"inode/x-empty","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/21219","name":"http://www.securityfocus.com/bid/21219","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"JBoss Java Class DeploymentFileRepository Directory Traversal Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2006/4726","name":"http://www.vupen.com/english/advisories/2006/4726","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"inode/x-empty","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/452862/100/100/threaded","name":"http://www.securityfocus.com/archive/1/452862/100/100/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/linux/security/advisories/2007_02_sr.html","name":"http://www.novell.com/linux/security/advisories/2007_02_sr.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://secunia.com/advisories/23095","name":"http://secunia.com/advisories/23095","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"JBoss DeploymentFileRepository Directory Traversal Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/1155/references","name":"http://www.vupen.com/english/advisories/2008/1155/references","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/24104","name":"http://secunia.com/advisories/24104","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Novell Identity Manager JBoss Directory Traversal Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/30767","name":"http://www.osvdb.org/30767","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01390402","name":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01390402","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"HPSBST02318 SSRT080018 rev.1 - HP Storage Essentials Software, Remote Unauthorized Access to Data - c01390402 - \r\n\t\tCentro de Soporte HP para Empresas","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/23984","name":"http://secunia.com/advisories/23984","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SUSE Update for Multiple Packages - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/29726","name":"http://secunia.com/advisories/29726","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"HP Storage Essentials Software Directory Traversal Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1017289","name":"http://securitytracker.com/id?1017289","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - JBoss Application Server Error in DeploymentFileRepository Class Lets Remote Users Read and Write Files","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://jira.jboss.com/jira/browse/JBAS-3861","name":"http://jira.jboss.com/jira/browse/JBAS-3861","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[#JBAS-3861] DeploymentFileRepository can be used to write/remove arbitrary files in the filesystem - JBoss.org JIRA","mime":"text/html","httpstatus":"400","archivestatus":"200"},{"url":"http://jira.jboss.com/jira/browse/ASPATCH-126","name":"http://jira.jboss.com/jira/browse/ASPATCH-126","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[#ASPATCH-126] JBAS-3861: DeploymentFileRepository can be used to write/remove arbitrary files in the filesystem - jboss.org JIRA","mime":"text/html","httpstatus":"400","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-5750","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-5750","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"5750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jboss","cpe5":"jboss_application_server","cpe6":"3.2.5_final","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jboss","cpe5":"jboss_application_server","cpe6":"3.2.6_final","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jboss","cpe5":"jboss_application_server","cpe6":"3.2.7_final","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jboss","cpe5":"jboss_application_server","cpe6":"3.2.8.sp1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jboss","cpe5":"jboss_application_server","cpe6":"3.2.8_final","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jboss","cpe5":"jboss_application_server","cpe6":"4.0.0_final","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jboss","cpe5":"jboss_application_server","cpe6":"4.0.1_final","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jboss","cpe5":"jboss_application_server","cpe6":"4.0.1_sp1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jboss","cpe5":"jboss_application_server","cpe6":"4.0.2_final","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jboss","cpe5":"jboss_application_server","cpe6":"4.0.3_final","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jboss","cpe5":"jboss_application_server","cpe6":"4.0.4.ga","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jboss","cpe5":"jboss_application_server","cpe6":"4.0.5.ga","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T20:04:54.589Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"23984","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23984"},{"name":"ADV-2008-1155","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/1155/references"},{"name":"SSRT080018","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01390402"},{"name":"RHSA-2006:0743","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2006-0743.html"},{"name":"30767","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/30767"},{"name":"21219","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/21219"},{"name":"ADV-2006-4724","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/4724"},{"name":"23095","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23095"},{"name":"HPSBST02318","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01390402"},{"name":"29726","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/29726"},{"name":"20061128 Re: SYMSA-2006-011: JBoss Java Class DeploymentFileRepository Directory Traversal","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/452862/100/100/threaded"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://jira.jboss.com/jira/browse/ASPATCH-126"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://secure-support.novell.com/KanisaPlatform/Publishing/719/3024921_f.SAL_Public.html"},{"name":"1017289","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1017289"},{"name":"SUSE-SR:2007:002","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2007_02_sr.html"},{"name":"ADV-2007-0554","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/0554"},{"name":"ADV-2006-4726","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/4726"},{"name":"24104","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/24104"},{"name":"20061127 SYMSA-2006-011: JBoss Java Class DeploymentFileRepository Directory Traversal","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/452830/100/0/threaded"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://jira.jboss.com/jira/browse/JBAS-3861"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-11-27T00:00:00.000Z","descriptions":[{"lang":"en","value":"Directory traversal vulnerability in the DeploymentFileRepository class in JBoss Application Server (jbossas) 3.2.4 through 4.0.5 allows remote authenticated users to read or modify arbitrary files, and possibly execute arbitrary code, via unspecified vectors related to the console manager."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-17T20:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"23984","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23984"},{"name":"ADV-2008-1155","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/1155/references"},{"name":"SSRT080018","tags":["vendor-advisory","x_refsource_HP"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01390402"},{"name":"RHSA-2006:0743","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2006-0743.html"},{"name":"30767","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/30767"},{"name":"21219","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/21219"},{"name":"ADV-2006-4724","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/4724"},{"name":"23095","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23095"},{"name":"HPSBST02318","tags":["vendor-advisory","x_refsource_HP"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01390402"},{"name":"29726","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/29726"},{"name":"20061128 Re: SYMSA-2006-011: JBoss Java Class DeploymentFileRepository Directory Traversal","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/452862/100/100/threaded"},{"tags":["x_refsource_CONFIRM"],"url":"http://jira.jboss.com/jira/browse/ASPATCH-126"},{"tags":["x_refsource_CONFIRM"],"url":"https://secure-support.novell.com/KanisaPlatform/Publishing/719/3024921_f.SAL_Public.html"},{"name":"1017289","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1017289"},{"name":"SUSE-SR:2007:002","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2007_02_sr.html"},{"name":"ADV-2007-0554","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/0554"},{"name":"ADV-2006-4726","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/4726"},{"name":"24104","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/24104"},{"name":"20061127 SYMSA-2006-011: JBoss Java Class DeploymentFileRepository Directory Traversal","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/452830/100/0/threaded"},{"tags":["x_refsource_CONFIRM"],"url":"http://jira.jboss.com/jira/browse/JBAS-3861"}]}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2006-5750","datePublished":"2006-11-27T20:00:00.000Z","dateReserved":"2006-11-06T00:00:00.000Z","dateUpdated":"2024-08-07T20:04:54.589Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-11-27 20:07:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jboss:jboss_application_server:3.2.5_final:*:*:*:*:*:*:*","matchCriteriaId":"9BA0BFE2-246F-4F9D-9698-23B7A453C627"},{"vulnerable":true,"criteria":"cpe:2.3:a:jboss:jboss_application_server:3.2.6_final:*:*:*:*:*:*:*","matchCriteriaId":"5415149C-6EF9-4B94-ABDA-3F52B9A871E6"},{"vulnerable":true,"criteria":"cpe:2.3:a:jboss:jboss_application_server:3.2.7_final:*:*:*:*:*:*:*","matchCriteriaId":"0A5BA730-1650-4CD6-8033-AE7B90F2242F"},{"vulnerable":true,"criteria":"cpe:2.3:a:jboss:jboss_application_server:3.2.8.sp1:*:*:*:*:*:*:*","matchCriteriaId":"A496B6B5-C331-4354-9538-51704BC172A8"},{"vulnerable":true,"criteria":"cpe:2.3:a:jboss:jboss_application_server:3.2.8_final:*:*:*:*:*:*:*","matchCriteriaId":"42EC3FC8-D370-4EA3-8FC5-CB8671A669B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:jboss:jboss_application_server:4.0.0_final:*:*:*:*:*:*:*","matchCriteriaId":"C467186E-74BB-4CC6-A4AA-144DA3A2B0C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:jboss:jboss_application_server:4.0.1_final:*:*:*:*:*:*:*","matchCriteriaId":"9D678E52-DEE5-4A77-9504-5E62F9A6E61A"},{"vulnerable":true,"criteria":"cpe:2.3:a:jboss:jboss_application_server:4.0.1_sp1:*:*:*:*:*:*:*","matchCriteriaId":"5EC7B567-CACB-4F07-BE1D-E7420060C4E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:jboss:jboss_application_server:4.0.2_final:*:*:*:*:*:*:*","matchCriteriaId":"8C763991-3D3C-40A9-ADA1-1BCD70491224"},{"vulnerable":true,"criteria":"cpe:2.3:a:jboss:jboss_application_server:4.0.3_final:*:*:*:*:*:*:*","matchCriteriaId":"3D381E62-7EBD-4F40-92B4-C967C82BBEBD"},{"vulnerable":true,"criteria":"cpe:2.3:a:jboss:jboss_application_server:4.0.4.ga:*:*:*:*:*:*:*","matchCriteriaId":"B0F232BE-9181-4B28-B9ED-C947BCB754DE"},{"vulnerable":true,"criteria":"cpe:2.3:a:jboss:jboss_application_server:4.0.5.ga:*:*:*:*:*:*:*","matchCriteriaId":"2559DFD5-A230-467E-A720-7AE7FA9309CD"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"5750","Ordinal":"1","Title":"CVE-2006-5750","CVE":"CVE-2006-5750","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"5750","Ordinal":"1","NoteData":"Directory traversal vulnerability in the DeploymentFileRepository class in JBoss Application Server (jbossas) 3.2.4 through 4.0.5 allows remote authenticated users to read or modify arbitrary files, and possibly execute arbitrary code, via unspecified vectors related to the console manager.","Type":"Description","Title":"CVE-2006-5750"},{"CveYear":"2006","CveId":"5750","Ordinal":"2","NoteData":"2006-11-27","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"5750","Ordinal":"3","NoteData":"2018-10-17","Type":"Other","Title":"Modified"}]}}}