Vulnerabilites related to httrack - httrack
CVE-2008-3429 (GCVE-0-2008-3429)
Vulnerability from cvelistv5
Published
2008-07-31 22:00
Modified
2024-08-07 09:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:37:26.948Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "httrack-urls-bo(44167)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.httrack.com/history.txt" }, { "name": "ADV-2008-2221", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2221/references" }, { "name": "DSA-1626", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1626" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html" }, { "name": "31323", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31323/" }, { "name": "30425", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30425" }, { "name": "FEDORA-2008-7896", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html" }, { "name": "FEDORA-2008-7862", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html" }, { "name": "31866", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31866" }, { "name": "31380", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31380" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "httrack-urls-bo(44167)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.httrack.com/history.txt" }, { "name": "ADV-2008-2221", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2221/references" }, { "name": "DSA-1626", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1626" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html" }, { "name": "31323", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31323/" }, { "name": "30425", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30425" }, { "name": "FEDORA-2008-7896", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html" }, { "name": "FEDORA-2008-7862", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html" }, { "name": "31866", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31866" }, { "name": "31380", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31380" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3429", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "httrack-urls-bo(44167)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167" }, { "name": "http://www.httrack.com/history.txt", "refsource": "CONFIRM", "url": "http://www.httrack.com/history.txt" }, { "name": "ADV-2008-2221", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2221/references" }, { "name": "DSA-1626", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1626" }, { "name": "http://www.venustech.com.cn/NewsInfo/124/2032.Html", "refsource": "MISC", "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html" }, { "name": "31323", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31323/" }, { "name": "30425", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30425" }, { "name": "FEDORA-2008-7896", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html" }, { "name": "FEDORA-2008-7862", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html" }, { "name": "31866", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31866" }, { "name": "31380", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31380" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3429", "datePublished": "2008-07-31T22:00:00", "dateReserved": "2008-07-31T00:00:00", "dateUpdated": "2024-08-07T09:37:26.948Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-5252 (GCVE-0-2010-5252)
Vulnerability from cvelistv5
Published
2012-09-07 10:00
Modified
2024-09-17 01:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:17:10.153Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/" }, { "name": "41224", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41224" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-07T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/" }, { "name": "41224", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41224" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-5252", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/", "refsource": "MISC", "url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/" }, { "name": "41224", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/41224" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-5252", "datePublished": "2012-09-07T10:00:00Z", "dateReserved": "2012-09-07T00:00:00Z", "dateUpdated": "2024-09-17T01:45:39.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2008-07-31 22:41
Modified
2025-04-09 00:30
Severity ?
Summary
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:httrack:httrack:0.23:beta-2:*:*:*:*:*:*", "matchCriteriaId": "30A61DED-D601-4FCD-82A8-9AA0F6660D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:0.24:beta-2:*:*:*:*:*:*", "matchCriteriaId": "CA9DC545-4B39-4135-8F42-3A2A4C25D5F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:0.25:beta-2:*:*:*:*:*:*", "matchCriteriaId": "5B492CFE-25C8-466D-848C-F0E606677882", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:0.99:beta-2:*:*:*:*:*:*", "matchCriteriaId": "E3666C84-2626-453B-80AA-3712CEDFC40F", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:0.996:beta-2:*:*:*:*:*:*", "matchCriteriaId": "31CAA471-A9D5-44A2-96A4-03E54B1307D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:0.997:beta-2:*:*:*:*:*:*", "matchCriteriaId": "C18F4201-8FDD-45E3-891C-BEABC91B5132", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:0.998:beta-2:*:*:*:*:*:*", "matchCriteriaId": "8EAC0EC7-9FFE-4F57-B9EC-E8744C8C1876", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "55CE92DE-889F-4219-A20B-1658FD1A20D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "C7FDCAC6-5142-4730-B823-E2F2AC002C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "69198DB6-723E-45F0-BDD8-D6106EA432EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "AD90479B-84F3-45A7-AA68-FA0B6A5D14C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "97354343-B565-4CC1-B2EF-883F7AE2A81F", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "2B4BAAF0-714D-4FD6-9FEE-F68391E07CD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.10:b:*:*:*:*:*:*", "matchCriteriaId": "90C3786A-6F46-40A9-B51C-4D2D153B8760", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.10:c:*:*:*:*:*:*", "matchCriteriaId": "93863B08-5B94-4952-A1FA-0E7CA7544C2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.10:d:*:*:*:*:*:*", "matchCriteriaId": "5BC576E1-A95F-4B2B-ADE7-F52CB25F647E", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.10:e:*:*:*:*:*:*", "matchCriteriaId": "3F0289D6-58C3-40C6-87AB-FEBF45AF327B", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "E53081E7-F8D1-458A-AD2C-2E1AA79B7B7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5FADF089-961C-469C-A333-353B1CD308FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.15:b:*:*:*:*:*:*", "matchCriteriaId": "EBEE9FDE-FC46-43A8-8253-954B61B88A47", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.16:*:*:*:*:*:*:*", "matchCriteriaId": "CF625B94-9204-4CDF-93BA-AC785087DA80", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.16:b:*:*:*:*:*:*", "matchCriteriaId": "161231F6-F21F-4D2F-AE63-B321EC8E0578", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.20:*:*:*:*:*:*:*", "matchCriteriaId": "EB14522C-7783-4A9A-8A0E-B8D5D39049CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.21:*:*:*:*:*:*:*", "matchCriteriaId": "08487F25-62EE-4873-A641-E3C6012C3FEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.22:*:*:*:*:*:*:*", "matchCriteriaId": "CB814FD0-A59F-4D95-B595-18A034747385", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.23:*:*:*:*:*:*:*", "matchCriteriaId": "04F142B1-2646-4725-B926-44F2734C06A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.24:*:*:*:*:*:*:*", "matchCriteriaId": "2EE56720-C089-45EA-8173-2BC3B9BCEE51", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:1.30:*:*:*:*:*:*:*", "matchCriteriaId": "3A59CE6D-77AC-4111-A106-09F68F14EE31", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:2.00:*:*:*:*:*:*:*", "matchCriteriaId": "22047DC8-7DA0-4DB9-B806-60901262F49E", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "18447927-A5B0-44A3-B346-C24F8A456945", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E218C652-ABB0-4445-8FF7-28CC59DD311D", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:2.02:*:*:*:*:*:*:*", "matchCriteriaId": "2E4CD38B-9F65-4A79-A44A-9B5C002125AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.00:*:*:*:*:*:*:*", "matchCriteriaId": "E741EEE4-0ED4-4AF1-A7C3-D978B32194D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.01:*:*:*:*:*:*:*", "matchCriteriaId": "E4B90D7C-E458-4C24-A0E7-494DA3837948", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.02:*:*:*:*:*:*:*", "matchCriteriaId": "68B488E1-EF0D-4A0E-9E26-12742EFE54E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.03:*:*:*:*:*:*:*", "matchCriteriaId": "5760D8D4-9879-462A-ADBD-8D3DEEDF87E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.04:*:*:*:*:*:*:*", "matchCriteriaId": "44BDC99D-71E2-474F-BE92-CC2560B10BCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.05:*:*:*:*:*:*:*", "matchCriteriaId": "61DB5944-DADF-47BF-9064-DAFCB2DE6F5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.06:*:*:*:*:*:*:*", "matchCriteriaId": "3F25BDEC-93ED-47D6-829D-7E6CB9EF563C", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.07:*:*:*:*:*:*:*", "matchCriteriaId": "4763A337-1E82-45CF-AF95-4B189EF47354", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.08:*:*:*:*:*:*:*", "matchCriteriaId": "6FAF9C77-2D09-49AE-8301-5A96064EEFAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.09:*:*:*:*:*:*:*", "matchCriteriaId": "38B428DE-8023-449B-8619-41044F82A5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "A79F6982-3519-495E-A7A0-B3096F3D8C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.15:*:*:*:*:*:*:*", "matchCriteriaId": "EBF5CB5E-8768-412C-9B41-A870F2BDEDCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.16:2:*:*:*:*:*:*", "matchCriteriaId": "5E11ADCD-CA49-4AA9-BF64-ACA01FF85936", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.20:2:*:*:*:*:*:*", "matchCriteriaId": "BEDB7060-F385-49B7-B547-F4670F5971F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.21:8:*:*:*:*:*:*", "matchCriteriaId": "DE1176AC-D41F-4A94-84C4-3F5FD1D9772B", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.22:3:*:*:*:*:*:*", "matchCriteriaId": "2C5B81B7-0F69-4577-8DFD-623C783B93B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.23:*:*:*:*:*:*:*", "matchCriteriaId": "EBE90318-8B47-4AB6-9EF0-59A03AEC3EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.30:*:*:*:*:*:*:*", "matchCriteriaId": "AE97BF0A-4B4D-494C-A997-36E7449E1FE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.31:*:*:*:*:*:*:*", "matchCriteriaId": "2ACD1DA3-AA16-4127-AC1B-157BE695B8B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.32:*:*:*:*:*:*:*", "matchCriteriaId": "9D175651-5CD6-4477-8496-55C4E963BF27", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.33:*:*:*:*:*:*:*", "matchCriteriaId": "D8ACAA7A-7D8A-44F4-987F-E71C284B84F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.40:*:*:*:*:*:*:*", "matchCriteriaId": "A7BFB002-F9A0-46A7-BDC2-E1BFB54B5342", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.40:2:*:*:*:*:*:*", "matchCriteriaId": "B09BE206-FEDA-46ED-9027-0E3D6DEF33F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.41:*:*:*:*:*:*:*", "matchCriteriaId": "CEEAA51F-5405-457E-912D-04A750C61C0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.41:2:*:*:*:*:*:*", "matchCriteriaId": "96470815-113A-4874-B3C2-B1BD42E5D61F", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.41:3:*:*:*:*:*:*", "matchCriteriaId": "016617B2-E181-4732-9F6D-107679371624", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.42:*:*:*:*:*:*:*", "matchCriteriaId": "0865F74D-87A9-429A-BEF7-02E145DB4698", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.42:2:*:*:*:*:*:*", "matchCriteriaId": "3D350B62-3894-4708-AB36-A53C95B529E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:httrack:3.42:3:*:*:*:*:*:*", "matchCriteriaId": "E44DE8C5-FD50-410C-B3BA-3C4A4CA05173", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:*:2:*:*:*:*:*:*", "matchCriteriaId": "D198D5DD-FCA6-4146-A128-6B08B60668F6", "versionEndIncluding": "3.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:0.23:beta-2:*:*:*:*:*:*", "matchCriteriaId": "4F24FD93-7F69-4AD2-A3C0-4A58E2427204", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:0.24:beta-2:*:*:*:*:*:*", "matchCriteriaId": "C66E9B9A-7752-4ACB-8E70-15C5A5CF9FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:0.25:beta-2:*:*:*:*:*:*", "matchCriteriaId": "5C50FA58-D0E8-4EF4-993B-BFFFBCD31A95", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:0.99:beta-2:*:*:*:*:*:*", "matchCriteriaId": "9AA15A17-3D5B-431F-85F7-719D16C51C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:0.996:beta-2:*:*:*:*:*:*", "matchCriteriaId": "23668163-813E-4A0A-8F5A-AFF8B72E641F", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:0.997:beta-2:*:*:*:*:*:*", "matchCriteriaId": "946CF2C4-AC27-4D6E-84CA-119BBDC586F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:0.998:beta-2:*:*:*:*:*:*", "matchCriteriaId": "4B210EC5-5CE5-4C29-996C-0EB1145A359F", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "28CB654C-5A0A-4AD2-A7E4-E5FBD41AD111", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "EA4F9850-1F0F-44E9-913A-97EB742E8510", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "DA284FCF-8AC4-4218-8115-FB41366F81DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "D6420DCD-72DE-4597-B961-DB06972F6A59", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "20F3C4AE-3824-4130-A84C-8358A7D621DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "CDB91A73-0E5A-4592-81F3-62A8A578DC57", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.10:b:*:*:*:*:*:*", "matchCriteriaId": "D3DE24C3-34D2-409A-BD35-5D1A1C8C285E", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.10:c:*:*:*:*:*:*", "matchCriteriaId": "4EFCAE76-7B19-4DF6-8700-24A2F36FBC30", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.10:d:*:*:*:*:*:*", "matchCriteriaId": "821397D4-2184-45B6-A5E0-0518081E1B80", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.10:e:*:*:*:*:*:*", "matchCriteriaId": "FD774253-68B9-450B-9C5F-802034C84A8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "7282DC66-01CD-49F6-9FAD-70C8EA443687", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5D6AA4B8-BE17-4DDD-8F7A-55543EE5306C", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.16:*:*:*:*:*:*:*", "matchCriteriaId": "F5CFFF64-2974-4510-8B44-6C8C4752E31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.16:b:*:*:*:*:*:*", "matchCriteriaId": "6F3FA036-18A8-40DC-B8E4-7EC2977032FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.20:*:*:*:*:*:*:*", "matchCriteriaId": "FE067177-2009-445E-A730-54575F8BA6D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.21:*:*:*:*:*:*:*", "matchCriteriaId": "478DFB57-B1C8-4282-8526-5127DEE18EE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.22:*:*:*:*:*:*:*", "matchCriteriaId": "A7E08DB9-A53D-41E5-A3BB-442BB68B6ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.23:*:*:*:*:*:*:*", "matchCriteriaId": "AC5E2B53-73BC-4648-8F63-79631F1F1790", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.24:*:*:*:*:*:*:*", "matchCriteriaId": "EEE21A00-F336-46E1-9521-B3BF57EBD291", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:1.30:*:*:*:*:*:*:*", "matchCriteriaId": "DD92B8F5-F37F-4FF4-8BD6-7921976CF014", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:2.00:*:*:*:*:*:*:*", "matchCriteriaId": "87BB4DCA-7F63-4AFF-9EFE-765CC88EAB70", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "74C2DFB0-8BD4-40F0-892A-BB03B2B79836", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:2.02:*:*:*:*:*:*:*", "matchCriteriaId": "62AC39F4-3466-4B3B-80C1-C01A72F144A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CA18C300-3602-4734-93BB-D8A32D01F34B", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.00:*:*:*:*:*:*:*", "matchCriteriaId": "60A398DC-CDCF-4727-8983-07E343B9D1FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.01:*:*:*:*:*:*:*", "matchCriteriaId": "2B3F0900-1592-45EE-BC34-68945653EAD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.02:*:*:*:*:*:*:*", "matchCriteriaId": "3EA680DA-A9DD-4B01-A036-CCD2C2752D6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.03:*:*:*:*:*:*:*", "matchCriteriaId": "D91198C2-64AD-420D-B527-CD98209FC1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.04:*:*:*:*:*:*:*", "matchCriteriaId": "5A7DE353-7A3F-4BEF-AD85-4710BEC1B322", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.05:*:*:*:*:*:*:*", "matchCriteriaId": "150EDF01-496C-4BEB-97FF-FE8FD424A399", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.06:*:*:*:*:*:*:*", "matchCriteriaId": "F44A791C-B9C3-4298-9C7B-1AEEE28688AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.07:*:*:*:*:*:*:*", "matchCriteriaId": "C2CB13FD-9E4B-4816-B246-0E26B62378E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.08:*:*:*:*:*:*:*", "matchCriteriaId": "0E3F8937-6978-4DCD-ADAD-F95B235944CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.09:*:*:*:*:*:*:*", "matchCriteriaId": "431E48C8-A9A1-4B3F-B1D0-D658CB44C1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "44BE5DB7-077A-4B91-9184-A81032B08692", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.15:*:*:*:*:*:*:*", "matchCriteriaId": "4EC15A35-E68D-46DF-BAC7-3AB39CDE0D47", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.15:b:*:*:*:*:*:*", "matchCriteriaId": "312C47AB-4AD2-4600-B0BD-7C34524F1522", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.16:2:*:*:*:*:*:*", "matchCriteriaId": "616DB4E3-C1FB-4DFC-9F98-4510A468EC21", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.20:2:*:*:*:*:*:*", "matchCriteriaId": "EA77BC82-49AF-4797-AF8A-BABD0671F31D", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.21:8:*:*:*:*:*:*", "matchCriteriaId": "60D8BD06-43BF-496B-9A0F-5FF66BA0D3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.22:3:*:*:*:*:*:*", "matchCriteriaId": "B876EC8A-9A8D-42AB-B4F3-E9ECF3375831", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.23:*:*:*:*:*:*:*", "matchCriteriaId": "DE2E7FB6-4A9E-431E-9504-6C8EC86A6B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.30:*:*:*:*:*:*:*", "matchCriteriaId": "219939CD-3530-4CC5-8C2E-69162E692FC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.31:*:*:*:*:*:*:*", "matchCriteriaId": "47B23265-E4C3-415C-A083-61891EE3860E", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.32:*:*:*:*:*:*:*", "matchCriteriaId": "D4A821F7-256E-4749-9294-A2627D40DB09", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.33:*:*:*:*:*:*:*", "matchCriteriaId": "4196933D-B459-4AC9-A5A1-E6E8CC410572", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.40:*:*:*:*:*:*:*", "matchCriteriaId": "53472D88-F355-48A3-BE7E-596EFC0F3727", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.40:2:*:*:*:*:*:*", "matchCriteriaId": "F7A1751D-5C49-4996-8D5F-496774A8EA85", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.41:*:*:*:*:*:*:*", "matchCriteriaId": "0BAF3263-D5F8-40F9-9A9C-2721225BC14B", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.41:2:*:*:*:*:*:*", "matchCriteriaId": "722AB21A-96C6-4FD7-9297-F62B933D4203", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.41:3:*:*:*:*:*:*", "matchCriteriaId": "CA434245-AC94-4A81-BF70-E359CB57265A", "vulnerable": true }, { "criteria": "cpe:2.3:a:httrack:winhttrack:3.42:*:*:*:*:*:*:*", "matchCriteriaId": "91E5F413-6040-4BF7-88AB-E08C7FCFCCFC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL." }, { "lang": "es", "value": "Desbordamiento de Buffer en el procesado de URI de HTTrack y WinHTTrack versiones anteriores a la 3.42-3, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrariamente mediante una URL larga." } ], "id": "CVE-2008-3429", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-07-31T22:41:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31323/" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31380" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31866" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1626" }, { "source": "cve@mitre.org", "url": "http://www.httrack.com/history.txt" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/30425" }, { "source": "cve@mitre.org", "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2221/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31323/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1626" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.httrack.com/history.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30425" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2221/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-09-07 10:32
Modified
2025-04-11 00:51
Severity ?
Summary
Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:httrack:httrack:3.43-9:*:*:*:*:*:*:*", "matchCriteriaId": "6801122C-119A-4AE0-B6FE-4221AC601299", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Vulnerabilidad de ruta de b\u00fasqueda no confiable en HTTrack v3.43-9, permite a usuarios locales ganar privilegios a trav\u00e9s de un archivo de caballo de troya httrack-plugin.dll en el directorio de trabajo actual, como se demostr\u00f3 con un directorio que contiene un archivo .whtt. NOTA: algunos de estos detalles han sido obtenidos de fuentes de terceros." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html \u0027CWE-426 Untrusted Search Path\u0027", "id": "CVE-2010-5252", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-09-07T10:32:22.493", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41224" }, { "source": "cve@mitre.org", "url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41224" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }