Vulnerabilites related to httrack - httrack
CVE-2008-3429 (GCVE-0-2008-3429)
Vulnerability from cvelistv5
Published
2008-07-31 22:00
Modified
2024-08-07 09:37
Severity ?
CWE
  • n/a
Summary
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:37:26.948Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "httrack-urls-bo(44167)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.httrack.com/history.txt"
          },
          {
            "name": "ADV-2008-2221",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2221/references"
          },
          {
            "name": "DSA-1626",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1626"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
          },
          {
            "name": "31323",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31323/"
          },
          {
            "name": "30425",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30425"
          },
          {
            "name": "FEDORA-2008-7896",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
          },
          {
            "name": "FEDORA-2008-7862",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
          },
          {
            "name": "31866",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31866"
          },
          {
            "name": "31380",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31380"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-07-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "httrack-urls-bo(44167)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.httrack.com/history.txt"
        },
        {
          "name": "ADV-2008-2221",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2221/references"
        },
        {
          "name": "DSA-1626",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1626"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
        },
        {
          "name": "31323",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31323/"
        },
        {
          "name": "30425",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30425"
        },
        {
          "name": "FEDORA-2008-7896",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
        },
        {
          "name": "FEDORA-2008-7862",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
        },
        {
          "name": "31866",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31866"
        },
        {
          "name": "31380",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31380"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3429",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "httrack-urls-bo(44167)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
            },
            {
              "name": "http://www.httrack.com/history.txt",
              "refsource": "CONFIRM",
              "url": "http://www.httrack.com/history.txt"
            },
            {
              "name": "ADV-2008-2221",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2221/references"
            },
            {
              "name": "DSA-1626",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1626"
            },
            {
              "name": "http://www.venustech.com.cn/NewsInfo/124/2032.Html",
              "refsource": "MISC",
              "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
            },
            {
              "name": "31323",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31323/"
            },
            {
              "name": "30425",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30425"
            },
            {
              "name": "FEDORA-2008-7896",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
            },
            {
              "name": "FEDORA-2008-7862",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
            },
            {
              "name": "31866",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31866"
            },
            {
              "name": "31380",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31380"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3429",
    "datePublished": "2008-07-31T22:00:00",
    "dateReserved": "2008-07-31T00:00:00",
    "dateUpdated": "2024-08-07T09:37:26.948Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-5252 (GCVE-0-2010-5252)
Vulnerability from cvelistv5
Published
2012-09-07 10:00
Modified
2024-09-17 01:45
Severity ?
CWE
  • n/a
Summary
Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:17:10.153Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/"
          },
          {
            "name": "41224",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/41224"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-09-07T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/"
        },
        {
          "name": "41224",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/41224"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-5252",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file.  NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/",
              "refsource": "MISC",
              "url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/"
            },
            {
              "name": "41224",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/41224"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-5252",
    "datePublished": "2012-09-07T10:00:00Z",
    "dateReserved": "2012-09-07T00:00:00Z",
    "dateUpdated": "2024-09-17T01:45:39.811Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2008-07-31 22:41
Modified
2025-04-09 00:30
Severity ?
Summary
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.
References
cve@mitre.orghttp://secunia.com/advisories/31323/
cve@mitre.orghttp://secunia.com/advisories/31380
cve@mitre.orghttp://secunia.com/advisories/31866
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1626
cve@mitre.orghttp://www.httrack.com/history.txt
cve@mitre.orghttp://www.securityfocus.com/bid/30425
cve@mitre.orghttp://www.venustech.com.cn/NewsInfo/124/2032.Html
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2221/references
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/44167
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31323/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31380
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31866
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1626
af854a3a-2127-422b-91ae-364da2661108http://www.httrack.com/history.txt
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30425
af854a3a-2127-422b-91ae-364da2661108http://www.venustech.com.cn/NewsInfo/124/2032.Html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2221/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44167
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html
Impacted products
Vendor Product Version
httrack httrack 0.23
httrack httrack 0.24
httrack httrack 0.25
httrack httrack 0.99
httrack httrack 0.996
httrack httrack 0.997
httrack httrack 0.998
httrack httrack 1.00
httrack httrack 1.01
httrack httrack 1.02
httrack httrack 1.03
httrack httrack 1.04
httrack httrack 1.10
httrack httrack 1.10
httrack httrack 1.10
httrack httrack 1.10
httrack httrack 1.10
httrack httrack 1.11
httrack httrack 1.15
httrack httrack 1.15
httrack httrack 1.16
httrack httrack 1.16
httrack httrack 1.20
httrack httrack 1.21
httrack httrack 1.22
httrack httrack 1.23
httrack httrack 1.24
httrack httrack 1.30
httrack httrack 2.00
httrack httrack 2.01
httrack httrack 2.2
httrack httrack 2.02
httrack httrack 3.00
httrack httrack 3.01
httrack httrack 3.02
httrack httrack 3.03
httrack httrack 3.04
httrack httrack 3.05
httrack httrack 3.06
httrack httrack 3.07
httrack httrack 3.08
httrack httrack 3.09
httrack httrack 3.10
httrack httrack 3.15
httrack httrack 3.16
httrack httrack 3.20
httrack httrack 3.21
httrack httrack 3.22
httrack httrack 3.23
httrack httrack 3.30
httrack httrack 3.31
httrack httrack 3.32
httrack httrack 3.33
httrack httrack 3.40
httrack httrack 3.40
httrack httrack 3.41
httrack httrack 3.41
httrack httrack 3.41
httrack httrack 3.42
httrack httrack 3.42
httrack httrack 3.42
httrack winhttrack *
httrack winhttrack 0.23
httrack winhttrack 0.24
httrack winhttrack 0.25
httrack winhttrack 0.99
httrack winhttrack 0.996
httrack winhttrack 0.997
httrack winhttrack 0.998
httrack winhttrack 1.00
httrack winhttrack 1.01
httrack winhttrack 1.02
httrack winhttrack 1.03
httrack winhttrack 1.04
httrack winhttrack 1.10
httrack winhttrack 1.10
httrack winhttrack 1.10
httrack winhttrack 1.10
httrack winhttrack 1.10
httrack winhttrack 1.11
httrack winhttrack 1.15
httrack winhttrack 1.16
httrack winhttrack 1.16
httrack winhttrack 1.20
httrack winhttrack 1.21
httrack winhttrack 1.22
httrack winhttrack 1.23
httrack winhttrack 1.24
httrack winhttrack 1.30
httrack winhttrack 2.00
httrack winhttrack 2.01
httrack winhttrack 2.02
httrack winhttrack 2.2
httrack winhttrack 3.00
httrack winhttrack 3.01
httrack winhttrack 3.02
httrack winhttrack 3.03
httrack winhttrack 3.04
httrack winhttrack 3.05
httrack winhttrack 3.06
httrack winhttrack 3.07
httrack winhttrack 3.08
httrack winhttrack 3.09
httrack winhttrack 3.10
httrack winhttrack 3.15
httrack winhttrack 3.15
httrack winhttrack 3.16
httrack winhttrack 3.20
httrack winhttrack 3.21
httrack winhttrack 3.22
httrack winhttrack 3.23
httrack winhttrack 3.30
httrack winhttrack 3.31
httrack winhttrack 3.32
httrack winhttrack 3.33
httrack winhttrack 3.40
httrack winhttrack 3.40
httrack winhttrack 3.41
httrack winhttrack 3.41
httrack winhttrack 3.41
httrack winhttrack 3.42



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:httrack:httrack:0.23:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "30A61DED-D601-4FCD-82A8-9AA0F6660D06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:0.24:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "CA9DC545-4B39-4135-8F42-3A2A4C25D5F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:0.25:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "5B492CFE-25C8-466D-848C-F0E606677882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:0.99:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "E3666C84-2626-453B-80AA-3712CEDFC40F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:0.996:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "31CAA471-A9D5-44A2-96A4-03E54B1307D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:0.997:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "C18F4201-8FDD-45E3-891C-BEABC91B5132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:0.998:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "8EAC0EC7-9FFE-4F57-B9EC-E8744C8C1876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "55CE92DE-889F-4219-A20B-1658FD1A20D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7FDCAC6-5142-4730-B823-E2F2AC002C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "69198DB6-723E-45F0-BDD8-D6106EA432EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD90479B-84F3-45A7-AA68-FA0B6A5D14C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "97354343-B565-4CC1-B2EF-883F7AE2A81F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B4BAAF0-714D-4FD6-9FEE-F68391E07CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.10:b:*:*:*:*:*:*",
              "matchCriteriaId": "90C3786A-6F46-40A9-B51C-4D2D153B8760",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.10:c:*:*:*:*:*:*",
              "matchCriteriaId": "93863B08-5B94-4952-A1FA-0E7CA7544C2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.10:d:*:*:*:*:*:*",
              "matchCriteriaId": "5BC576E1-A95F-4B2B-ADE7-F52CB25F647E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.10:e:*:*:*:*:*:*",
              "matchCriteriaId": "3F0289D6-58C3-40C6-87AB-FEBF45AF327B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E53081E7-F8D1-458A-AD2C-2E1AA79B7B7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FADF089-961C-469C-A333-353B1CD308FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.15:b:*:*:*:*:*:*",
              "matchCriteriaId": "EBEE9FDE-FC46-43A8-8253-954B61B88A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF625B94-9204-4CDF-93BA-AC785087DA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.16:b:*:*:*:*:*:*",
              "matchCriteriaId": "161231F6-F21F-4D2F-AE63-B321EC8E0578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB14522C-7783-4A9A-8A0E-B8D5D39049CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "08487F25-62EE-4873-A641-E3C6012C3FEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB814FD0-A59F-4D95-B595-18A034747385",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "04F142B1-2646-4725-B926-44F2734C06A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EE56720-C089-45EA-8173-2BC3B9BCEE51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A59CE6D-77AC-4111-A106-09F68F14EE31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:2.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "22047DC8-7DA0-4DB9-B806-60901262F49E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:2.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "18447927-A5B0-44A3-B346-C24F8A456945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E218C652-ABB0-4445-8FF7-28CC59DD311D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:2.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E4CD38B-9F65-4A79-A44A-9B5C002125AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E741EEE4-0ED4-4AF1-A7C3-D978B32194D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4B90D7C-E458-4C24-A0E7-494DA3837948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "68B488E1-EF0D-4A0E-9E26-12742EFE54E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "5760D8D4-9879-462A-ADBD-8D3DEEDF87E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "44BDC99D-71E2-474F-BE92-CC2560B10BCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "61DB5944-DADF-47BF-9064-DAFCB2DE6F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F25BDEC-93ED-47D6-829D-7E6CB9EF563C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "4763A337-1E82-45CF-AF95-4B189EF47354",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FAF9C77-2D09-49AE-8301-5A96064EEFAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "38B428DE-8023-449B-8619-41044F82A5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A79F6982-3519-495E-A7A0-B3096F3D8C30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF5CB5E-8768-412C-9B41-A870F2BDEDCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.16:2:*:*:*:*:*:*",
              "matchCriteriaId": "5E11ADCD-CA49-4AA9-BF64-ACA01FF85936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.20:2:*:*:*:*:*:*",
              "matchCriteriaId": "BEDB7060-F385-49B7-B547-F4670F5971F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.21:8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1176AC-D41F-4A94-84C4-3F5FD1D9772B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.22:3:*:*:*:*:*:*",
              "matchCriteriaId": "2C5B81B7-0F69-4577-8DFD-623C783B93B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBE90318-8B47-4AB6-9EF0-59A03AEC3EA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE97BF0A-4B4D-494C-A997-36E7449E1FE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ACD1DA3-AA16-4127-AC1B-157BE695B8B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D175651-5CD6-4477-8496-55C4E963BF27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8ACAA7A-7D8A-44F4-987F-E71C284B84F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7BFB002-F9A0-46A7-BDC2-E1BFB54B5342",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.40:2:*:*:*:*:*:*",
              "matchCriteriaId": "B09BE206-FEDA-46ED-9027-0E3D6DEF33F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEAA51F-5405-457E-912D-04A750C61C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.41:2:*:*:*:*:*:*",
              "matchCriteriaId": "96470815-113A-4874-B3C2-B1BD42E5D61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.41:3:*:*:*:*:*:*",
              "matchCriteriaId": "016617B2-E181-4732-9F6D-107679371624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "0865F74D-87A9-429A-BEF7-02E145DB4698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.42:2:*:*:*:*:*:*",
              "matchCriteriaId": "3D350B62-3894-4708-AB36-A53C95B529E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.42:3:*:*:*:*:*:*",
              "matchCriteriaId": "E44DE8C5-FD50-410C-B3BA-3C4A4CA05173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:*:2:*:*:*:*:*:*",
              "matchCriteriaId": "D198D5DD-FCA6-4146-A128-6B08B60668F6",
              "versionEndIncluding": "3.42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:0.23:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "4F24FD93-7F69-4AD2-A3C0-4A58E2427204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:0.24:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "C66E9B9A-7752-4ACB-8E70-15C5A5CF9FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:0.25:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "5C50FA58-D0E8-4EF4-993B-BFFFBCD31A95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:0.99:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "9AA15A17-3D5B-431F-85F7-719D16C51C6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:0.996:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "23668163-813E-4A0A-8F5A-AFF8B72E641F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:0.997:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "946CF2C4-AC27-4D6E-84CA-119BBDC586F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:0.998:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "4B210EC5-5CE5-4C29-996C-0EB1145A359F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "28CB654C-5A0A-4AD2-A7E4-E5FBD41AD111",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA4F9850-1F0F-44E9-913A-97EB742E8510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA284FCF-8AC4-4218-8115-FB41366F81DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6420DCD-72DE-4597-B961-DB06972F6A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "20F3C4AE-3824-4130-A84C-8358A7D621DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDB91A73-0E5A-4592-81F3-62A8A578DC57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.10:b:*:*:*:*:*:*",
              "matchCriteriaId": "D3DE24C3-34D2-409A-BD35-5D1A1C8C285E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.10:c:*:*:*:*:*:*",
              "matchCriteriaId": "4EFCAE76-7B19-4DF6-8700-24A2F36FBC30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.10:d:*:*:*:*:*:*",
              "matchCriteriaId": "821397D4-2184-45B6-A5E0-0518081E1B80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.10:e:*:*:*:*:*:*",
              "matchCriteriaId": "FD774253-68B9-450B-9C5F-802034C84A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7282DC66-01CD-49F6-9FAD-70C8EA443687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D6AA4B8-BE17-4DDD-8F7A-55543EE5306C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5CFFF64-2974-4510-8B44-6C8C4752E31F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.16:b:*:*:*:*:*:*",
              "matchCriteriaId": "6F3FA036-18A8-40DC-B8E4-7EC2977032FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE067177-2009-445E-A730-54575F8BA6D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "478DFB57-B1C8-4282-8526-5127DEE18EE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7E08DB9-A53D-41E5-A3BB-442BB68B6ADF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC5E2B53-73BC-4648-8F63-79631F1F1790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE21A00-F336-46E1-9521-B3BF57EBD291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD92B8F5-F37F-4FF4-8BD6-7921976CF014",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:2.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BB4DCA-7F63-4AFF-9EFE-765CC88EAB70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:2.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "74C2DFB0-8BD4-40F0-892A-BB03B2B79836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:2.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "62AC39F4-3466-4B3B-80C1-C01A72F144A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA18C300-3602-4734-93BB-D8A32D01F34B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A398DC-CDCF-4727-8983-07E343B9D1FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3F0900-1592-45EE-BC34-68945653EAD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EA680DA-A9DD-4B01-A036-CCD2C2752D6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "D91198C2-64AD-420D-B527-CD98209FC1D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A7DE353-7A3F-4BEF-AD85-4710BEC1B322",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "150EDF01-496C-4BEB-97FF-FE8FD424A399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "F44A791C-B9C3-4298-9C7B-1AEEE28688AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CB13FD-9E4B-4816-B246-0E26B62378E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E3F8937-6978-4DCD-ADAD-F95B235944CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "431E48C8-A9A1-4B3F-B1D0-D658CB44C1F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "44BE5DB7-077A-4B91-9184-A81032B08692",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EC15A35-E68D-46DF-BAC7-3AB39CDE0D47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.15:b:*:*:*:*:*:*",
              "matchCriteriaId": "312C47AB-4AD2-4600-B0BD-7C34524F1522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.16:2:*:*:*:*:*:*",
              "matchCriteriaId": "616DB4E3-C1FB-4DFC-9F98-4510A468EC21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.20:2:*:*:*:*:*:*",
              "matchCriteriaId": "EA77BC82-49AF-4797-AF8A-BABD0671F31D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.21:8:*:*:*:*:*:*",
              "matchCriteriaId": "60D8BD06-43BF-496B-9A0F-5FF66BA0D3F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.22:3:*:*:*:*:*:*",
              "matchCriteriaId": "B876EC8A-9A8D-42AB-B4F3-E9ECF3375831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE2E7FB6-4A9E-431E-9504-6C8EC86A6B62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "219939CD-3530-4CC5-8C2E-69162E692FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B23265-E4C3-415C-A083-61891EE3860E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A821F7-256E-4749-9294-A2627D40DB09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "4196933D-B459-4AC9-A5A1-E6E8CC410572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "53472D88-F355-48A3-BE7E-596EFC0F3727",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.40:2:*:*:*:*:*:*",
              "matchCriteriaId": "F7A1751D-5C49-4996-8D5F-496774A8EA85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BAF3263-D5F8-40F9-9A9C-2721225BC14B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.41:2:*:*:*:*:*:*",
              "matchCriteriaId": "722AB21A-96C6-4FD7-9297-F62B933D4203",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.41:3:*:*:*:*:*:*",
              "matchCriteriaId": "CA434245-AC94-4A81-BF70-E359CB57265A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "91E5F413-6040-4BF7-88AB-E08C7FCFCCFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de Buffer en el procesado de URI de HTTrack y WinHTTrack versiones anteriores a la 3.42-3, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrariamente mediante una URL larga."
    }
  ],
  "id": "CVE-2008-3429",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-07-31T22:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31323/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31380"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31866"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1626"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.httrack.com/history.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/30425"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2221/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31323/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31380"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31866"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1626"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.httrack.com/history.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30425"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2221/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-07 10:32
Modified
2025-04-11 00:51
Severity ?
Summary
Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information.
Impacted products
Vendor Product Version
httrack httrack 3.43-9



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.43-9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6801122C-119A-4AE0-B6FE-4221AC601299",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ruta de b\u00fasqueda no confiable en HTTrack v3.43-9, permite a usuarios locales ganar privilegios a trav\u00e9s de un archivo de caballo de troya httrack-plugin.dll en el directorio de trabajo actual, como se demostr\u00f3 con un directorio que contiene un archivo .whtt. NOTA: algunos de estos detalles han sido obtenidos de fuentes de terceros."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html \u0027CWE-426 Untrusted Search Path\u0027",
  "id": "CVE-2010-5252",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-09-07T10:32:22.493",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41224"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41224"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}