{"api_version":"1","generated_at":"2026-04-26T03:10:07+00:00","cve":"CVE-2013-7462","urls":{"html":"https://cve.report/CVE-2013-7462","api":"https://cve.report/api/cve/CVE-2013-7462.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2013-7462","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2013-7462"},"summary":{"title":"CVE-2013-7462","description":"A directory traversal vulnerability in the web application in McAfee (now Intel Security) SaaS Control Console (SCC) Platform 6.14 before patch 1070, and 6.15 before patch 1076 allows unauthenticated users to view contents of arbitrary system files that did not have file system level read access restrictions via a null-byte injection exploit.","state":"PUBLIC","assigner":"secure@intel.com","published_at":"2017-03-14 22:59:00","updated_at":"2017-03-29 13:30:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10056","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10056","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"McAfee KnowledgeBase - McAfee Security Bulletin – SaaS Control Console update fixes a directory traversal vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2013-7462","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-7462","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2013","cve_id":"7462","vulnerable":"1","versionEndIncluding":"6.15","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mcafee","cpe5":"saas_control_console_platform","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"secure@intel.com","ID":"CVE-2013-7462","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"SaaS Control Console (SCC) Platform","version":{"version_data":[{"version_value":"6.14 before patch 1070, and 6.15 before patch 1076"}]}}]},"vendor_name":"Intel"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A directory traversal vulnerability in the web application in McAfee (now Intel Security) SaaS Control Console (SCC) Platform 6.14 before patch 1070, and 6.15 before patch 1076 allows unauthenticated users to view contents of arbitrary system files that did not have file system level read access restrictions via a null-byte injection exploit."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"A directory traversal vulnerability"}]}]},"references":{"reference_data":[{"name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10056","refsource":"CONFIRM","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10056"}]}},"nvd":{"publishedDate":"2017-03-14 22:59:00","lastModifiedDate":"2017-03-29 13:30:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mcafee:saas_control_console_platform:*:*:*:*:*:*:*:*","versionEndIncluding":"6.15","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2013","CveId":"7462","Ordinal":"102987","Title":"CVE-2013-7462","CVE":"CVE-2013-7462","Year":"2013"},"notes":[{"CveYear":"2013","CveId":"7462","Ordinal":"1","NoteData":"A directory traversal vulnerability in the web application in McAfee (now Intel Security) SaaS Control Console (SCC) Platform 6.14 before patch 1070, and 6.15 before patch 1076 allows unauthenticated users to view contents of arbitrary system files that did not have file system level read access restrictions via a null-byte injection exploit.","Type":"Description","Title":null},{"CveYear":"2013","CveId":"7462","Ordinal":"2","NoteData":"2017-03-14","Type":"Other","Title":"Published"},{"CveYear":"2013","CveId":"7462","Ordinal":"3","NoteData":"2017-03-14","Type":"Other","Title":"Modified"}]}}}