{"api_version":"1","generated_at":"2026-04-23T09:37:46+00:00","cve":"CVE-2007-6483","urls":{"html":"https://cve.report/CVE-2007-6483","api":"https://cve.report/api/cve/CVE-2007-6483.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2007-6483","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2007-6483"},"summary":{"title":"CVE-2007-6483","description":"Directory traversal vulnerability in SafeNet Sentinel Protection Server 7.0.0 through 7.4.0 and possibly earlier versions, and Sentinel Keys Server 1.0.3 and possibly earlier versions, allows remote attackers to read arbitrary files via a .. (dot dot) in the query string.","state":"PUBLISHED","assigner":"mitre","published_at":"2007-12-20 20:46:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-22","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"5","severity":"","vector":"AV:N/AC:L/Au:N/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}}],"references":[{"url":"http://securityreason.com/securityalert/3471","name":"http://securityreason.com/securityalert/3471","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityReason - Sentinel Protection Server Directory Traversal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/26583","name":"http://www.securityfocus.com/bid/26583","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"],"title":"Sentinel Protection Server/Keys Server Directory Traversal Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/38636","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/38636","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/484224/100/200/threaded","name":"http://www.securityfocus.com/archive/1/484224/100/200/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/4011","name":"http://www.vupen.com/english/advisories/2007/4011","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27811","name":"http://secunia.com/advisories/27811","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"SafeNet Sentinel Protection Server/Key Server Directory Traversal Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id?1018992","name":"http://www.securitytracker.com/id?1018992","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"SecurityTracker.com Archives - SafeNet Sentinel Products Let Remote Users Traverse the Directory","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://safenet-inc.com/support/files/SPI740SecurityPatch.zip","name":"http://safenet-inc.com/support/files/SPI740SecurityPatch.zip","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secure Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-15-272-01","name":"https://ics-cert.us-cert.gov/advisories/ICSA-15-272-01","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Honeywell Experion PKS Directory Traversal Vulnerability | ICS-CERT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/484201/100/200/threaded","name":"http://www.securityfocus.com/archive/1/484201/100/200/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2007-6483","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-6483","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2007","cve_id":"6483","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"safenet","cpe5":"sentinel_keys_server","cpe6":"1.0.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"6483","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"safenet","cpe5":"sentinel_protection_server","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"6483","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"safenet","cpe5":"sentinel_protection_server","cpe6":"7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"6483","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"safenet","cpe5":"sentinel_protection_server","cpe6":"7.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"6483","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"safenet","cpe5":"sentinel_protection_server","cpe6":"7.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"6483","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"safenet","cpe5":"sentinel_protection_server","cpe6":"7.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T16:11:06.015Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://ics-cert.us-cert.gov/advisories/ICSA-15-272-01"},{"name":"sentinel-protection-directory-traversal(38636)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/38636"},{"name":"20071126 Directory Traversal in SafeNet Sentinel Protection Server and Keys Server","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/484224/100/200/threaded"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://safenet-inc.com/support/files/SPI740SecurityPatch.zip"},{"name":"3471","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/3471"},{"name":"26583","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/26583"},{"name":"27811","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27811"},{"name":"ADV-2007-4011","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/4011"},{"name":"20071126 2007-06 Sentinel Protection Server Directory Traversal","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/484201/100/200/threaded"},{"name":"1018992","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1018992"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2007-11-26T00:00:00.000Z","descriptions":[{"lang":"en","value":"Directory traversal vulnerability in SafeNet Sentinel Protection Server 7.0.0 through 7.4.0 and possibly earlier versions, and Sentinel Keys Server 1.0.3 and possibly earlier versions, allows remote attackers to read arbitrary files via a .. (dot dot) in the query string."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-15T20:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_MISC"],"url":"https://ics-cert.us-cert.gov/advisories/ICSA-15-272-01"},{"name":"sentinel-protection-directory-traversal(38636)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/38636"},{"name":"20071126 Directory Traversal in SafeNet Sentinel Protection Server and Keys Server","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/484224/100/200/threaded"},{"tags":["x_refsource_CONFIRM"],"url":"http://safenet-inc.com/support/files/SPI740SecurityPatch.zip"},{"name":"3471","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/3471"},{"name":"26583","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/26583"},{"name":"27811","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27811"},{"name":"ADV-2007-4011","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/4011"},{"name":"20071126 2007-06 Sentinel Protection Server Directory Traversal","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/484201/100/200/threaded"},{"name":"1018992","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1018992"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2007-6483","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Directory traversal vulnerability in SafeNet Sentinel Protection Server 7.0.0 through 7.4.0 and possibly earlier versions, and Sentinel Keys Server 1.0.3 and possibly earlier versions, allows remote attackers to read arbitrary files via a .. (dot dot) in the query string."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://ics-cert.us-cert.gov/advisories/ICSA-15-272-01","refsource":"MISC","url":"https://ics-cert.us-cert.gov/advisories/ICSA-15-272-01"},{"name":"sentinel-protection-directory-traversal(38636)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/38636"},{"name":"20071126 Directory Traversal in SafeNet Sentinel Protection Server and Keys Server","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/484224/100/200/threaded"},{"name":"http://safenet-inc.com/support/files/SPI740SecurityPatch.zip","refsource":"CONFIRM","url":"http://safenet-inc.com/support/files/SPI740SecurityPatch.zip"},{"name":"3471","refsource":"SREASON","url":"http://securityreason.com/securityalert/3471"},{"name":"26583","refsource":"BID","url":"http://www.securityfocus.com/bid/26583"},{"name":"27811","refsource":"SECUNIA","url":"http://secunia.com/advisories/27811"},{"name":"ADV-2007-4011","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/4011"},{"name":"20071126 2007-06 Sentinel Protection Server Directory Traversal","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/484201/100/200/threaded"},{"name":"1018992","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1018992"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2007-6483","datePublished":"2007-12-20T20:00:00.000Z","dateReserved":"2007-12-20T00:00:00.000Z","dateUpdated":"2024-08-07T16:11:06.015Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2007-12-20 20:46:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-22","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:safenet:sentinel_keys_server:1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"3D766F1C-934F-407E-AEE5-BA1DD904E693"},{"vulnerable":true,"criteria":"cpe:2.3:a:safenet:sentinel_protection_server:7.0:*:*:*:*:*:*:*","matchCriteriaId":"86733C86-4D91-47F9-AA69-1517EBD9185C"},{"vulnerable":true,"criteria":"cpe:2.3:a:safenet:sentinel_protection_server:7.1:*:*:*:*:*:*:*","matchCriteriaId":"AF9F0AF6-18BC-45F9-8D11-982BA9BB7FFB"},{"vulnerable":true,"criteria":"cpe:2.3:a:safenet:sentinel_protection_server:7.2:*:*:*:*:*:*:*","matchCriteriaId":"BCDE352B-1D4E-4EB9-9669-D62670FE45E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:safenet:sentinel_protection_server:7.3:*:*:*:*:*:*:*","matchCriteriaId":"DCE6B275-B786-4BB2-97AA-B7918C30F301"},{"vulnerable":true,"criteria":"cpe:2.3:a:safenet:sentinel_protection_server:7.4:*:*:*:*:*:*:*","matchCriteriaId":"17DBD0D0-57A9-4381-BE18-01D2E4FD97B6"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2007","CveId":"6483","Ordinal":"1","Title":"CVE-2007-6483","CVE":"CVE-2007-6483","Year":"2007"},"notes":[{"CveYear":"2007","CveId":"6483","Ordinal":"1","NoteData":"Directory traversal vulnerability in SafeNet Sentinel Protection Server 7.0.0 through 7.4.0 and possibly earlier versions, and Sentinel Keys Server 1.0.3 and possibly earlier versions, allows remote attackers to read arbitrary files via a .. (dot dot) in the query string.","Type":"Description","Title":"CVE-2007-6483"},{"CveYear":"2007","CveId":"6483","Ordinal":"2","NoteData":"2007-12-20","Type":"Other","Title":"Published"},{"CveYear":"2007","CveId":"6483","Ordinal":"3","NoteData":"2018-10-15","Type":"Other","Title":"Modified"}]}}}