Vulnerabilites related to shemes - grabit
Vulnerability from fkie_nvd
Published
2022-03-28 21:15
Modified
2024-11-21 01:13
Summary
A vulnerability, which was classified as problematic, was found in Shemes GrabIt up to 1.7.2 Beta 4. This affects the component NZB Date Parser. The manipulation of the argument date with the input 1000000000000000 as part of a NZB File leads to a denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Impacted products
Vendor Product Version
shemes grabit *
shemes grabit 1.7.2
shemes grabit 1.7.2
shemes grabit 1.7.2
shemes grabit 1.7.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:shemes:grabit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0E18FD-FC92-4C4F-95DD-EAF6AD60AD24",
              "versionEndExcluding": "1.7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.7.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B60949D3-D24E-44D2-B727-6B8DBC454B99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.7.2:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "74D3B18C-2150-4ED1-8DB5-3F5EE156FE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.7.2:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "299581BC-D948-4337-AD8E-90B5499BBC25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.7.2:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8F215A84-1E1E-49F8-AC75-9324F4BA9964",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability, which was classified as problematic, was found in Shemes GrabIt up to 1.7.2 Beta 4. This affects the component NZB Date Parser. The manipulation of the argument date with the input 1000000000000000 as part of a NZB File leads to a denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado una vulnerabilidad, clasificada como problem\u00e1tica, en Shemes GrabIt versiones hasta 1.7.2 Beta 4. Esto afecta al componente NZB Date Parser. La manipulaci\u00f3n del argumento date con la entrada 1000000000000000 como parte de un archivo NZB conlleva a una denegaci\u00f3n de servicio. Es posible iniciar el ataque de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede ser usada"
    }
  ],
  "id": "CVE-2010-10001",
  "lastModified": "2024-11-21T01:13:23.047",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "cna@vuldb.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-28T21:15:08.177",
  "references": [
    {
      "source": "cna@vuldb.com",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/bugtraq/2010/Jul/60"
    },
    {
      "source": "cna@vuldb.com",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "https://vuldb.com/?id.4143"
    },
    {
      "source": "cna@vuldb.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/bugtraq/2010/Jul/60"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "https://vuldb.com/?id.4143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
    }
  ],
  "sourceIdentifier": "cna@vuldb.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-404"
        }
      ],
      "source": "cna@vuldb.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-404"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-05-07 23:30
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file.
References
cve@mitre.orghttp://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html
cve@mitre.orghttp://osvdb.org/54205
cve@mitre.orghttp://secunia.com/advisories/34893Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/503184/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/34807
cve@mitre.orghttp://www.securitytracker.com/id?1022161
cve@mitre.orghttp://www.shemes.com/index.php?p=whatsnewPatch, Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1243Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/50310
cve@mitre.orghttps://www.exploit-db.com/exploits/8612
af854a3a-2127-422b-91ae-364da2661108http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/54205
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34893Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/503184/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34807
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1022161
af854a3a-2127-422b-91ae-364da2661108http://www.shemes.com/index.php?p=whatsnewPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1243Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/50310
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/8612
Impacted products
Vendor Product Version
shemes grabit *
shemes grabit 1.5.0
shemes grabit 1.5.1
shemes grabit 1.5.2
shemes grabit 1.5.3
shemes grabit 1.6.1
shemes grabit 1.6.2
shemes grabit 1.7.1
shemes grabit 1.7.2
shemes grabit 1.7.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:shemes:grabit:*:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "63D3C24A-9303-4A37-B283-0B255B039C6B",
              "versionEndIncluding": "1.7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.5.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "AF4FAFF4-AAAB-4487-99DC-93BB84214FEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.5.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "EFCE0B20-A57A-43CB-85E0-11FAECB4AEED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.5.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "C97E45F1-18EA-4259-867E-9C5339F2F43C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.5.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "D56088FE-7CE2-4061-8ADB-A77F3EC7DF4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.6.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8ACA2866-0BB6-4D47-95B7-0AFF898D7D50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.6.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "280FAAD8-687C-43B4-9912-766AF3C3D074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.7.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "5D34BC0B-2402-4562-B1AA-CBC72C6EF5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.7.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B60949D3-D24E-44D2-B727-6B8DBC454B99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.7.2:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "74D3B18C-2150-4ED1-8DB5-3F5EE156FE95",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en la caracter\u00edstica del importador NZB en GrabIt 1.7.2 Beta 3 y anteriores, que permite a los atacantes remotos ejecutar arbitrariamente c\u00f3digo a trav\u00e9s de referencias DTD manipulada en un elemento DOCTYPE en un archivo NZB."
    }
  ],
  "id": "CVE-2009-1586",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-05-07T23:30:00.390",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/54205"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34893"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/503184/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34807"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1022161"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.shemes.com/index.php?p=whatsnew"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1243"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50310"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/8612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/54205"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34893"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/503184/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34807"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1022161"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.shemes.com/index.php?p=whatsnew"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1243"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/8612"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2009-1586 (GCVE-0-2009-1586)
Vulnerability from cvelistv5
Published
2009-05-07 23:00
Modified
2024-08-07 05:20
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:20:34.575Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.shemes.com/index.php?p=whatsnew"
          },
          {
            "name": "grabit-nzb-bo(50310)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50310"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html"
          },
          {
            "name": "20090503 Grabit \u003c= 1.7.2 beta 3 NZB file parsing stack overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/503184/100/0/threaded"
          },
          {
            "name": "1022161",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022161"
          },
          {
            "name": "8612",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/8612"
          },
          {
            "name": "34807",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34807"
          },
          {
            "name": "34893",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34893"
          },
          {
            "name": "54205",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/54205"
          },
          {
            "name": "ADV-2009-1243",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1243"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-05-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.shemes.com/index.php?p=whatsnew"
        },
        {
          "name": "grabit-nzb-bo(50310)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50310"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html"
        },
        {
          "name": "20090503 Grabit \u003c= 1.7.2 beta 3 NZB file parsing stack overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/503184/100/0/threaded"
        },
        {
          "name": "1022161",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022161"
        },
        {
          "name": "8612",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/8612"
        },
        {
          "name": "34807",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34807"
        },
        {
          "name": "34893",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34893"
        },
        {
          "name": "54205",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/54205"
        },
        {
          "name": "ADV-2009-1243",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1243"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1586",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.shemes.com/index.php?p=whatsnew",
              "refsource": "CONFIRM",
              "url": "http://www.shemes.com/index.php?p=whatsnew"
            },
            {
              "name": "grabit-nzb-bo(50310)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50310"
            },
            {
              "name": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html",
              "refsource": "MISC",
              "url": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html"
            },
            {
              "name": "20090503 Grabit \u003c= 1.7.2 beta 3 NZB file parsing stack overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/503184/100/0/threaded"
            },
            {
              "name": "1022161",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022161"
            },
            {
              "name": "8612",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/8612"
            },
            {
              "name": "34807",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34807"
            },
            {
              "name": "34893",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34893"
            },
            {
              "name": "54205",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/54205"
            },
            {
              "name": "ADV-2009-1243",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1243"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1586",
    "datePublished": "2009-05-07T23:00:00",
    "dateReserved": "2009-05-07T00:00:00",
    "dateUpdated": "2024-08-07T05:20:34.575Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-10001 (GCVE-0-2010-10001)
Vulnerability from cvelistv5
Published
2022-03-28 20:45
Modified
2025-04-15 14:45
CWE
Summary
A vulnerability, which was classified as problematic, was found in Shemes GrabIt up to 1.7.2 Beta 4. This affects the component NZB Date Parser. The manipulation of the argument date with the input 1000000000000000 as part of a NZB File leads to a denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Impacted products
Vendor Product Version
Shemes GrabIt Version: 1.7.2 Beta 4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:17:10.458Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?id.4143"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/bugtraq/2010/Jul/60"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2010-10001",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-14T16:56:55.540267Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-15T14:45:09.752Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "GrabIt",
          "vendor": "Shemes",
          "versions": [
            {
              "status": "affected",
              "version": "1.7.2 Beta 4"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Marc Ruef"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability, which was classified as problematic, was found in Shemes GrabIt up to 1.7.2 Beta 4. This affects the component NZB Date Parser. The manipulation of the argument date with the input 1000000000000000 as part of a NZB File leads to a denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-404",
              "description": "CWE-404 Denial of Service",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-28T20:45:50.000Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://vuldb.com/?id.4143"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://seclists.org/bugtraq/2010/Jul/60"
        }
      ],
      "title": "Shemes GrabIt NZB Date Parser denial of service",
      "x_generator": "vuldb.com",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cna@vuldb.com",
          "ID": "CVE-2010-10001",
          "REQUESTER": "cna@vuldb.com",
          "STATE": "PUBLIC",
          "TITLE": "Shemes GrabIt NZB Date Parser denial of service"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "GrabIt",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.7.2 Beta 4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Shemes"
              }
            ]
          }
        },
        "credit": "Marc Ruef",
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability, which was classified as problematic, was found in Shemes GrabIt up to 1.7.2 Beta 4. This affects the component NZB Date Parser. The manipulation of the argument date with the input 1000000000000000 as part of a NZB File leads to a denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
            }
          ]
        },
        "generator": "vuldb.com",
        "impact": {
          "cvss": {
            "baseScore": "5.3",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-404 Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://vuldb.com/?id.4143",
              "refsource": "MISC",
              "url": "https://vuldb.com/?id.4143"
            },
            {
              "name": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt",
              "refsource": "MISC",
              "url": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
            },
            {
              "name": "http://seclists.org/bugtraq/2010/Jul/60",
              "refsource": "MISC",
              "url": "http://seclists.org/bugtraq/2010/Jul/60"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2010-10001",
    "datePublished": "2022-03-28T20:45:50.000Z",
    "dateReserved": "2022-01-28T00:00:00.000Z",
    "dateUpdated": "2025-04-15T14:45:09.752Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}