{"containers":{"cna":{"affected":[{"product":"Installer","vendor":"InnoSetup","versions":[{"status":"affected","version":"n/a"}]}],"credits":[{"lang":"en","value":"Stefan Kanthak"}],"descriptions":[{"lang":"en","value":"A vulnerability was found in InnoSetup Installer. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to uncontrolled search path. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-427","description":"CWE-427 Uncontrolled Search Path","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-06-16T06:15:18.000Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"tags":["x_refsource_MISC"],"url":"http://seclists.org/fulldisclosure/2017/Mar/8"},{"tags":["x_refsource_MISC"],"url":"https://vuldb.com/?id.97837"}],"title":"InnoSetup Installer uncontrolled search path","x_generator":"vuldb.com","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@vuldb.com","ID":"CVE-2017-20051","REQUESTER":"cna@vuldb.com","STATE":"PUBLIC","TITLE":"InnoSetup Installer uncontrolled search path"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Installer","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"InnoSetup"}]}},"credit":"Stefan Kanthak","data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in InnoSetup Installer. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to uncontrolled search path. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."}]},"generator":"vuldb.com","impact":{"cvss":{"baseScore":"6.3","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-427 Uncontrolled Search Path"}]}]},"references":{"reference_data":[{"name":"http://seclists.org/fulldisclosure/2017/Mar/8","refsource":"MISC","url":"http://seclists.org/fulldisclosure/2017/Mar/8"},{"name":"https://vuldb.com/?id.97837","refsource":"MISC","url":"https://vuldb.com/?id.97837"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T21:45:25.374Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2017/Mar/8"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://vuldb.com/?id.97837"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T17:11:18.734072Z","id":"CVE-2017-20051","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T14:25:02.579Z"}}]},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2017-20051","datePublished":"2022-06-16T06:15:18.000Z","dateReserved":"2022-06-08T00:00:00.000Z","dateUpdated":"2025-04-15T14:25:02.579Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}