Vulnerabilites related to skype - skype
CVE-2024-21411 (GCVE-0-2024-21411)
Vulnerability from cvelistv5
Published
2024-03-12 16:57
Modified
2025-05-03 00:47
CWE
  • CWE-453 - Insecure Default Variable Initialization
Summary
Skype for Consumer Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Skype for Consumer Version: 1.0.0   < 8.113
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T22:20:40.907Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "Skype for Consumer Remote Code Execution Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21411"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-21411",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-12T18:27:58.698722Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-12T17:37:21.078Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "Unknown"
          ],
          "product": "Skype for Consumer",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "8.113",
              "status": "affected",
              "version": "1.0.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:microsoft:skype_for_consumer:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "8.113",
                  "versionStartIncluding": "1.0.0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "datePublic": "2024-03-12T07:00:00.000Z",
      "descriptions": [
        {
          "lang": "en-US",
          "value": "Skype for Consumer Remote Code Execution Vulnerability"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en-US",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-453",
              "description": "CWE-453: Insecure Default Variable Initialization",
              "lang": "en-US",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-03T00:47:14.775Z",
        "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
        "shortName": "microsoft"
      },
      "references": [
        {
          "name": "Skype for Consumer Remote Code Execution Vulnerability",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21411"
        }
      ],
      "title": "Skype for Consumer Remote Code Execution Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
    "assignerShortName": "microsoft",
    "cveId": "CVE-2024-21411",
    "datePublished": "2024-03-12T16:57:42.580Z",
    "dateReserved": "2023-12-08T22:45:21.300Z",
    "dateUpdated": "2025-05-03T00:47:14.775Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-1778 (GCVE-0-2004-1778)
Vulnerability from cvelistv5
Published
2005-05-03 04:00
Modified
2024-08-08 01:00
Severity ?
CWE
  • n/a
Summary
Skype 0.92.0.12 and 1.0.0.1 for Linux, and possibly other versions, creates the /usr/share/skype/lang directory with world-writable permissions, which allows local users to modify language files and possibly conduct social engineering or other attacks.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:00:37.329Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20050216 Re: Permission problem in Skype BETA for linux",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110868557905786\u0026w=2"
          },
          {
            "name": "20041222 Permission problem in Skype BETA for linux",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110374568916303\u0026w=2"
          },
          {
            "name": "12081",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12081"
          },
          {
            "name": "skype-lang-insecure-permissions(18644)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18644"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-12-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Skype 0.92.0.12 and 1.0.0.1 for Linux, and possibly other versions, creates the /usr/share/skype/lang directory with world-writable permissions, which allows local users to modify language files and possibly conduct social engineering or other attacks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20050216 Re: Permission problem in Skype BETA for linux",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110868557905786\u0026w=2"
        },
        {
          "name": "20041222 Permission problem in Skype BETA for linux",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110374568916303\u0026w=2"
        },
        {
          "name": "12081",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12081"
        },
        {
          "name": "skype-lang-insecure-permissions(18644)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18644"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1778",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Skype 0.92.0.12 and 1.0.0.1 for Linux, and possibly other versions, creates the /usr/share/skype/lang directory with world-writable permissions, which allows local users to modify language files and possibly conduct social engineering or other attacks."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20050216 Re: Permission problem in Skype BETA for linux",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=110868557905786\u0026w=2"
            },
            {
              "name": "20041222 Permission problem in Skype BETA for linux",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=110374568916303\u0026w=2"
            },
            {
              "name": "12081",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12081"
            },
            {
              "name": "skype-lang-insecure-permissions(18644)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18644"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1778",
    "datePublished": "2005-05-03T04:00:00",
    "dateReserved": "2005-05-03T00:00:00",
    "dateUpdated": "2024-08-08T01:00:37.329Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-3136 (GCVE-0-2010-3136)
Vulnerability from cvelistv5
Published
2010-08-26 18:00
Modified
2024-08-07 02:55
Severity ?
CWE
  • n/a
Summary
Untrusted search path vulnerability in Skype 4.2.0.169 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wab32.dll that is located in the same folder as a .skype file.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:55:46.784Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "skype-dll-code-execution(64577)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64577"
          },
          {
            "name": "14766",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/14766"
          },
          {
            "name": "oval:org.mitre.oval:def:11833",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11833"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-08-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Untrusted search path vulnerability in Skype 4.2.0.169 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wab32.dll that is located in the same folder as a .skype file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "skype-dll-code-execution(64577)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64577"
        },
        {
          "name": "14766",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/14766"
        },
        {
          "name": "oval:org.mitre.oval:def:11833",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11833"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3136",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Untrusted search path vulnerability in Skype 4.2.0.169 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wab32.dll that is located in the same folder as a .skype file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "skype-dll-code-execution(64577)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64577"
            },
            {
              "name": "14766",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/14766"
            },
            {
              "name": "oval:org.mitre.oval:def:11833",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11833"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3136",
    "datePublished": "2010-08-26T18:00:00",
    "dateReserved": "2010-08-26T00:00:00",
    "dateUpdated": "2024-08-07T02:55:46.784Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-2312 (GCVE-0-2006-2312)
Vulnerability from cvelistv5
Published
2006-05-19 21:00
Modified
2024-08-07 17:43
Severity ?
CWE
  • n/a
Summary
Argument injection vulnerability in the URI handler in Skype 2.0.*.104 and 2.5.*.0 through 2.5.*.78 for Windows allows remote authorized attackers to download arbitrary files via a URL that contains certain command-line switches.
References
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0549.html mailing-list, x_refsource_FULLDISC
http://www.securityfocus.com/bid/18038 vdb-entry, x_refsource_BID
http://www.kb.cert.org/vuls/id/466428 third-party-advisory, x_refsource_CERT-VN
http://www.vupen.com/english/advisories/2006/1871 vdb-entry, x_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilities/26557 vdb-entry, x_refsource_XF
http://www.securityfocus.com/archive/1/434707/30/4860/threaded mailing-list, x_refsource_BUGTRAQ
http://www.osvdb.org/25658 vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/20154 third-party-advisory, x_refsource_SECUNIA
http://www.skype.com/security/skype-sb-2006-001.html x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:43:29.102Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20060521 Skype - URI Handler Command Switch Parsing",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0549.html"
          },
          {
            "name": "18038",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18038"
          },
          {
            "name": "VU#466428",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/466428"
          },
          {
            "name": "ADV-2006-1871",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1871"
          },
          {
            "name": "skype-uri-handler-file-access(26557)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26557"
          },
          {
            "name": "20060521 Skype - URI Handler Command Switch Parsing",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434707/30/4860/threaded"
          },
          {
            "name": "25658",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/25658"
          },
          {
            "name": "20154",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20154"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.skype.com/security/skype-sb-2006-001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Argument injection vulnerability in the URI handler in Skype 2.0.*.104 and 2.5.*.0 through 2.5.*.78 for Windows allows remote authorized attackers to download arbitrary files via a URL that contains certain command-line switches."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20060521 Skype - URI Handler Command Switch Parsing",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0549.html"
        },
        {
          "name": "18038",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18038"
        },
        {
          "name": "VU#466428",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/466428"
        },
        {
          "name": "ADV-2006-1871",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1871"
        },
        {
          "name": "skype-uri-handler-file-access(26557)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26557"
        },
        {
          "name": "20060521 Skype - URI Handler Command Switch Parsing",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434707/30/4860/threaded"
        },
        {
          "name": "25658",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/25658"
        },
        {
          "name": "20154",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20154"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.skype.com/security/skype-sb-2006-001.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2312",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Argument injection vulnerability in the URI handler in Skype 2.0.*.104 and 2.5.*.0 through 2.5.*.78 for Windows allows remote authorized attackers to download arbitrary files via a URL that contains certain command-line switches."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20060521 Skype - URI Handler Command Switch Parsing",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0549.html"
            },
            {
              "name": "18038",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18038"
            },
            {
              "name": "VU#466428",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/466428"
            },
            {
              "name": "ADV-2006-1871",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1871"
            },
            {
              "name": "skype-uri-handler-file-access(26557)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26557"
            },
            {
              "name": "20060521 Skype - URI Handler Command Switch Parsing",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434707/30/4860/threaded"
            },
            {
              "name": "25658",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/25658"
            },
            {
              "name": "20154",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20154"
            },
            {
              "name": "http://www.skype.com/security/skype-sb-2006-001.html",
              "refsource": "CONFIRM",
              "url": "http://www.skype.com/security/skype-sb-2006-001.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2312",
    "datePublished": "2006-05-19T21:00:00",
    "dateReserved": "2006-05-11T00:00:00",
    "dateUpdated": "2024-08-07T17:43:29.102Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4741 (GCVE-0-2009-4741)
Vulnerability from cvelistv5
Published
2010-03-26 20:00
Modified
2024-09-17 00:21
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability in the Extras Manager before 2.0.0.67 in Skype before 4.1.0.179 on Windows has unknown impact and attack vectors.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:17:25.704Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "37012",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37012"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://developer.skype.com/WindowsSkype/ReleaseNotes#head-21c1b2583e7cc405f994ca162d574fb15a6e986b"
          },
          {
            "name": "36459",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/36459"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the Extras Manager before 2.0.0.67 in Skype before 4.1.0.179 on Windows has unknown impact and attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-03-26T20:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "37012",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37012"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://developer.skype.com/WindowsSkype/ReleaseNotes#head-21c1b2583e7cc405f994ca162d574fb15a6e986b"
        },
        {
          "name": "36459",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/36459"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4741",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the Extras Manager before 2.0.0.67 in Skype before 4.1.0.179 on Windows has unknown impact and attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "37012",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37012"
            },
            {
              "name": "https://developer.skype.com/WindowsSkype/ReleaseNotes#head-21c1b2583e7cc405f994ca162d574fb15a6e986b",
              "refsource": "CONFIRM",
              "url": "https://developer.skype.com/WindowsSkype/ReleaseNotes#head-21c1b2583e7cc405f994ca162d574fb15a6e986b"
            },
            {
              "name": "36459",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/36459"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4741",
    "datePublished": "2010-03-26T20:00:00Z",
    "dateReserved": "2010-03-26T00:00:00Z",
    "dateUpdated": "2024-09-17T00:21:01.212Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2074 (GCVE-0-2011-2074)
Vulnerability from cvelistv5
Published
2011-05-10 18:00
Modified
2024-09-17 00:37
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability in the client in Skype 5.x before 5.1.0.922 on Mac OS X allows remote authenticated users to execute arbitrary code or cause a denial of service (application crash) via a crafted message.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:46:00.929Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking"
          },
          {
            "name": "44522",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44522"
          },
          {
            "name": "47747",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47747"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/"
          },
          {
            "name": "ADV-2011-1192",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/1192"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://isc.sans.edu/diary.html?storyid=10837"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the client in Skype 5.x before 5.1.0.922 on Mac OS X allows remote authenticated users to execute arbitrary code or cause a denial of service (application crash) via a crafted message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-05-10T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking"
        },
        {
          "name": "44522",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44522"
        },
        {
          "name": "47747",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47747"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/"
        },
        {
          "name": "ADV-2011-1192",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/1192"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://isc.sans.edu/diary.html?storyid=10837"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-2074",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the client in Skype 5.x before 5.1.0.922 on Mac OS X allows remote authenticated users to execute arbitrary code or cause a denial of service (application crash) via a crafted message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html",
              "refsource": "CONFIRM",
              "url": "http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html"
            },
            {
              "name": "http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking",
              "refsource": "MISC",
              "url": "http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking"
            },
            {
              "name": "44522",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44522"
            },
            {
              "name": "47747",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/47747"
            },
            {
              "name": "http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/",
              "refsource": "MISC",
              "url": "http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/"
            },
            {
              "name": "ADV-2011-1192",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/1192"
            },
            {
              "name": "http://isc.sans.edu/diary.html?storyid=10837",
              "refsource": "MISC",
              "url": "http://isc.sans.edu/diary.html?storyid=10837"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-2074",
    "datePublished": "2011-05-10T18:00:00Z",
    "dateReserved": "2011-05-10T00:00:00Z",
    "dateUpdated": "2024-09-17T00:37:12.887Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2011-05-10 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the client in Skype 5.x before 5.1.0.922 on Mac OS X allows remote authenticated users to execute arbitrary code or cause a denial of service (application crash) via a crafted message.
Impacted products
Vendor Product Version
skype skype 5.0.0.105
skype skype 5.0.0.105
skype skype 5.0.0.123
skype skype 5.0.0.152
skype skype 5.0.0.156
skype skype 5.1.0.104
skype skype 5.1.0.112
apple mac_os_x *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:skype:skype:5.0.0.105:*:*:*:*:*:*:*",
              "matchCriteriaId": "F17A54D5-36B9-43AB-AAAB-50060AB06841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:5.0.0.105:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0D24C8F2-480C-4263-A3AD-B0DD6D2E1479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:5.0.0.123:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B1755686-6370-4924-B3EC-2C55E15F64F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:5.0.0.152:*:*:*:*:*:*:*",
              "matchCriteriaId": "9776A81C-2D3A-40F1-BD03-BDD1FF084BE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:5.0.0.156:*:*:*:*:*:*:*",
              "matchCriteriaId": "5561BF25-CAD5-49CC-9944-9D8B18A4DFB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:5.1.0.104:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE8AF25D-636D-4E3E-9560-7FA3887B5D8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:5.1.0.112:*:*:*:*:*:*:*",
              "matchCriteriaId": "25ADBD4E-7F02-4B41-BAD9-57F487ABC6FF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the client in Skype 5.x before 5.1.0.922 on Mac OS X allows remote authenticated users to execute arbitrary code or cause a denial of service (application crash) via a crafted message."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el cliente de Skype v5.x antes de v5.1.0.922 en Mac OS X permite a usuarios autenticados remotamente ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (solicitud de bloqueo) a trav\u00e9s de un mensaje manipulado."
    }
  ],
  "evaluatorComment": "Per: http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html\r\n\r\n\u0027Please note, Skype\u0027s other clients, e.g. Windows and Linux, are not susceptible to this vulnerability.\u0027",
  "id": "CVE-2011-2074",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.5,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-05-10T18:55:02.590",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://isc.sans.edu/diary.html?storyid=10837"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44522"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/47747"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/1192"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://isc.sans.edu/diary.html?storyid=10837"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44522"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/47747"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/1192"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-03-26 20:30
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the Extras Manager before 2.0.0.67 in Skype before 4.1.0.179 on Windows has unknown impact and attack vectors.
Impacted products
Vendor Product Version
skype skype *
skype skype 0.90.0.5
skype skype 0.90.0.10
skype skype 0.91.0.2
skype skype 0.92.0.4
skype skype 0.93.0.18
skype skype 0.93.1.1
skype skype 0.94.0.19
skype skype 0.94.0.28
skype skype 0.95.0.11
skype skype 0.95.0.25
skype skype 0.95.0.36
skype skype 0.95.0.40
skype skype 0.96.0.1
skype skype 0.96.0.3
skype skype 0.97.0.1
skype skype 0.97.0.3
skype skype 0.97.0.6
skype skype 0.97.0.40
skype skype 0.98.0.04
skype skype 0.98.0.6
skype skype 0.98.0.28
skype skype 0.98.0.42
skype skype 0.98.0.68
skype skype 1.0.0.9
skype skype 1.0.0.10
skype skype 1.0.0.18
skype skype 1.0.0.29
skype skype 1.0.0.94
skype skype 1.0.0.97
skype skype 1.0.0.100
skype skype 1.0.0.106
skype skype 1.1.0.6
skype skype 1.1.0.73
skype skype 1.1.0.79
skype skype 1.2.0.37
skype skype 1.2.0.41
skype skype 1.2.0.48
skype skype 1.3.0.45
skype skype 1.3.0.48
skype skype 1.3.0.51
skype skype 1.3.0.54
skype skype 1.3.0.55
skype skype 1.3.0.57
skype skype 1.3.0.60
skype skype 1.3.0.66
skype skype 1.4.0.71
skype skype 1.4.0.78
skype skype 1.4.0.84
skype skype 2.0.0.69
skype skype 2.0.0.73
skype skype 2.0.0.79
skype skype 2.0.0.81
skype skype 2.0.0.90
skype skype 2.0.0.97
skype skype 2.0.0.103
skype skype 2.0.0.105
skype skype 2.0.0.107
skype skype 2.5.0.72
skype skype 2.5.0.82
skype skype 2.5.0.91
skype skype 2.5.0.113
skype skype 2.5.0.122
skype skype 2.5.0.126
skype skype 2.5.0.130
skype skype 2.5.0.137
skype skype 2.5.0.141
skype skype 2.5.0.151
skype skype 2.5.0.154
skype skype 2.6.0.67
skype skype 2.6.0.74
skype skype 2.6.0.81
skype skype 2.6.0.97
skype skype 2.6.0.103
skype skype 2.6.0.105
skype skype 3.0.0.106
skype skype 3.0.0.123
skype skype 3.0.0.137
skype skype 3.0.0.154
skype skype 3.0.0.190
skype skype 3.0.0.198
skype skype 3.0.0.205
skype skype 3.0.0.209
skype skype 3.0.0.214
skype skype 3.0.0.216
skype skype 3.0.0.217
skype skype 3.0.0.218
skype skype 3.1.0.112
skype skype 3.1.0.134
skype skype 3.1.0.144
skype skype 3.1.0.147
skype skype 3.1.0.150
skype skype 3.1.0.152
skype skype 3.2.0.53
skype skype 3.2.0.63
skype skype 3.2.0.82
skype skype 3.2.0.115
skype skype 3.2.0.145
skype skype 3.2.0.148
skype skype 3.2.0.152
skype skype 3.2.0.158
skype skype 3.2.0.163
skype skype 3.2.0.175
skype skype 3.5.0.107
skype skype 3.5.0.158
skype skype 3.5.0.178
skype skype 3.5.0.202
skype skype 3.5.0.214
skype skype 3.5.0.229
skype skype 3.5.0.234
skype skype 3.5.0.239
skype skype 3.6.0.127
skype skype 3.6.0.159
skype skype 3.6.0.216
skype skype 3.6.0.244
skype skype 3.6.0.248
skype skype 3.8.0.96
skype skype 3.8.0.115
skype skype 3.8.0.139
skype skype 3.8.0.144
skype skype 3.8.0.154
skype skype 3.8.0.180
skype skype 3.8.0.188
skype skype 4.0
skype skype 4.0.0.145
skype skype 4.0.0.150
skype skype 4.0.0.155
skype skype 4.0.0.161
skype skype 4.0.0.166
skype skype 4.0.0.168
skype skype 4.0.0.169
skype skype 4.0.0.176
skype skype 4.0.0.181
skype skype 4.0.0.206
skype skype 4.0.0.215
skype skype 4.0.0.216
skype skype 4.0.0.224
skype skype 4.0.0.226
skype skype 4.0.0.227
skype skype 4.1.0.130
skype skype 4.1.0.130
skype skype 4.1.0.136
skype skype 4.1.0.141
microsoft windows *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:skype:skype:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3041A33-C8F4-48E3-8B33-752E1F613881",
              "versionEndIncluding": "4.1.0.166",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.90.0.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4347B1A3-06EB-4B6C-ADFD-87967F7CD9A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.90.0.10:beta:*:*:*:*:*:*",
              "matchCriteriaId": "9872E235-52DC-402E-A135-AFC7845474FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.91.0.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B39A42AF-2C67-4858-8511-42ECEAD00B84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.92.0.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "BD3B70FC-6A5C-4F36-9F64-A27879BBA75C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.93.0.18:beta:*:*:*:*:*:*",
              "matchCriteriaId": "77B4C334-4863-40A6-A4C5-F5E2250E6BCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.93.1.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "27D1A581-BB48-4E48-A6F9-442C2031F49B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.94.0.19:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4D0BD696-6C7B-4455-BC5D-7092766EF821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.94.0.28:beta:*:*:*:*:*:*",
              "matchCriteriaId": "17EE6ED4-7C68-4E51-BB01-1D83BAE7D4AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.95.0.11:beta:*:*:*:*:*:*",
              "matchCriteriaId": "77E346FA-47D3-4220-8AC8-C248E68104E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.95.0.25:beta:*:*:*:*:*:*",
              "matchCriteriaId": "39482A01-6B66-4D32-A35E-8868B97F80A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.95.0.36:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B7E3A0CC-A6AB-418E-8C77-2E7B2AEBD1BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.95.0.40:beta:*:*:*:*:*:*",
              "matchCriteriaId": "7C1E53EA-85CA-44D3-9714-6236A5FBCA33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.96.0.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "558A004A-1562-428F-870B-C9219315418A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.96.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "5FA2440F-E72B-4093-ABED-F55FAFA0DCEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.97.0.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "9FF45E16-4E79-4FA7-BDF6-28D3B83AE705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.97.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "C9094503-0100-4544-80DA-A87685BABD8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.97.0.6:beta:*:*:*:*:*:*",
              "matchCriteriaId": "2C101656-3DD2-46B2-8069-F8931EF2429B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.97.0.40:beta:*:*:*:*:*:*",
              "matchCriteriaId": "2B63F2F2-628B-4E6F-81C2-CBAE0A95D775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.98.0.04:beta:*:*:*:*:*:*",
              "matchCriteriaId": "44EB1F86-6D75-448A-BD95-084E2FB867EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.98.0.6:beta:*:*:*:*:*:*",
              "matchCriteriaId": "85E9F595-EF59-4D72-840A-67DBCC06BE21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.98.0.28:beta:*:*:*:*:*:*",
              "matchCriteriaId": "02A989D1-8957-4E4E-B418-E96165008F7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.98.0.42:beta:*:*:*:*:*:*",
              "matchCriteriaId": "16796596-C3EB-4D51-8AD6-B71EFD501C49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.98.0.68:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0BC8B49D-F727-4929-945C-E99C0336BCF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B6B904-DF16-49AA-B481-A29C4678A732",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4D2F33D-0000-4C65-BFB6-D61B6C474A95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "68588557-B1B8-46D7-9AF7-70F9B30D6166",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E73FD84-4C29-44DA-9E3F-8279787B2D78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "C64674AE-8C59-4878-BD45-279C3DAABBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "97FEDF7C-3DE1-46E6-B9C0-A585E4C6B0AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.100:*:*:*:*:*:*:*",
              "matchCriteriaId": "17833EDB-F84E-4A01-A1C7-09B3C22FC267",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.106:*:*:*:*:*:*:*",
              "matchCriteriaId": "E01D6175-0976-4032-9D27-01F51205C6C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6F678DC-42BD-47F5-AD6D-3CB666CAFD0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.1.0.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "791D4B01-A6B9-401A-8DCD-CB628A73777D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.1.0.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6ADA513-8C04-4C59-A092-216A135FCF61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.2.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2B9862D-5582-44D1-853C-6C3A90B9F913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.2.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FBC565C-EB87-4B1B-B8CE-0A4D0CA2129E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.2.0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6E80B11-3202-4EA9-AD09-28E45A9095DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "A88FFB24-E27E-419B-9AD5-2F0F7E87D480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "417E40F7-21E4-45A1-89AB-76E678AA8779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B86DD6A-2B02-4ECC-A715-C6122EA702D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB05BB0B-EC51-4078-BEB9-387C63CBA657",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "190E2D35-CB24-450A-B0F7-E13C02D3D68F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "04CC9C86-4C59-4E83-92D0-47CB379B3885",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E7C75C-31FD-41CB-953D-296E359CAB50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D0FF8F-6B44-4739-9D63-FC390546A680",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.4.0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "8986EC65-EF3C-479B-AD8F-22C4AA09CBE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.4.0.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D9535F9-C39D-48B6-852D-D4FA487E543D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.4.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "88931FE1-276F-450A-929C-A39F9877D840",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "126A07A6-79DF-4E46-A102-B1B05F859642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D4A9C3-A418-42A1-AD3F-259B3249D222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A169E6-8A9E-4179-8BB0-B2D11C9E9D59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBFBA895-802E-4D9C-A15E-6BF97D63B2FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C713220-2A47-4A3B-9466-A57D29318F83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "C35A3470-5AAC-4E70-81C0-37BEE3A6E2D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.103:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1A62B7B-50E6-4FD5-B14E-5EE7F6FA8353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.105:*:*:*:*:*:*:*",
              "matchCriteriaId": "9323C4E9-2FF9-4D92-B70B-CF7A5C385FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.107:*:*:*:*:*:*:*",
              "matchCriteriaId": "E07F388E-770E-4450-B28D-DD2FA799A1F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AA3B772-DF05-4AF6-9C1A-4CA5B0FF3E82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C09AFC0-4829-459C-9A02-6D6166840F2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FB3D033-697A-4B87-930A-58F74DCA4481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.113:*:*:*:*:*:*:*",
              "matchCriteriaId": "D549B7F6-1A95-494A-9B75-70FFB41A38E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.122:*:*:*:*:*:*:*",
              "matchCriteriaId": "6433ACA2-0CEB-4EE3-84D2-94EAF015DC8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.126:*:*:*:*:*:*:*",
              "matchCriteriaId": "511D24FC-B5DE-42BD-A3A1-140B677CB5F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.130:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A4EA665-99DE-4F60-A8DF-19E9FDAC45F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.137:*:*:*:*:*:*:*",
              "matchCriteriaId": "79EA2C60-7AE5-4FED-A800-AF09B25B5CD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.141:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD281AEE-1DB2-4313-8F87-A5A07CC977EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.151:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ECC2D86-F555-4886-98F7-1C3FF27E1827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.154:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA42766-129E-47EE-AE68-827248E39488",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.6.0.67:beta:*:*:*:*:*:*",
              "matchCriteriaId": "F03FDE58-53B3-4060-B285-ABC9E223EE44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.6.0.74:beta:*:*:*:*:*:*",
              "matchCriteriaId": "80B0F546-5D5A-44A2-8758-86D6355E2F69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.6.0.81:beta:*:*:*:*:*:*",
              "matchCriteriaId": "7F416029-905B-450B-BE0B-2BA86F1BFD0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.6.0.97:beta:*:*:*:*:*:*",
              "matchCriteriaId": "5C2E1960-3746-478D-ABC9-B95071A8B1EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.6.0.103:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B5C981CC-42D8-4BF2-99D1-0A500175E512",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.6.0.105:beta:*:*:*:*:*:*",
              "matchCriteriaId": "E7D12ECC-424F-4E49-8937-CF35FF9CE5CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.106:beta:*:*:*:*:*:*",
              "matchCriteriaId": "FA7C122A-E968-4A59-BD50-E9F8F98005BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.123:beta:*:*:*:*:*:*",
              "matchCriteriaId": "F735E486-0B0D-4F97-8E8F-9CDFFE3B4DE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.137:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8A33F38D-0636-4F70-9E88-F9706C0BFD7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.154:beta:*:*:*:*:*:*",
              "matchCriteriaId": "E7CA33B3-50EF-479B-8201-72CCCC78B259",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.190:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE4535E7-C455-49A7-99D9-2103C69D1A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.198:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A042F07-E1C0-46C5-904D-725DED823B15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.205:*:*:*:*:*:*:*",
              "matchCriteriaId": "45270047-5735-4EC3-BCE1-1EB987AB9AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.209:*:*:*:*:*:*:*",
              "matchCriteriaId": "64AA9FD4-B7BB-4AF2-9372-B1206291C424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.214:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A6BCEAE-89BF-494A-B8ED-8464F2922924",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FC8D0AF-E420-47F8-BACE-20BA862C89A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.217:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE388BAB-2CFA-4931-82AE-244A25CCAC92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.218:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC57AFCF-1DFE-4207-94C2-F8D50FFCDB0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.1.0.112:beta:*:*:*:*:*:*",
              "matchCriteriaId": "430996CF-EEAF-4844-A8D6-0ED40B5EBC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.1.0.134:beta:*:*:*:*:*:*",
              "matchCriteriaId": "42A5D0BA-3A78-4DBC-B92B-643CAD4917F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.1.0.144:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBBCF519-2C0C-4128-BF30-A4EA27083F36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.1.0.147:*:*:*:*:*:*:*",
              "matchCriteriaId": "909B644A-C6AC-4A9E-8603-7709E243A9A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.1.0.150:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F36126F-1BE3-4BE3-AFC6-E968F852025F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.1.0.152:*:*:*:*:*:*:*",
              "matchCriteriaId": "F62E1DDA-8D3A-48A7-9C5A-11346AC6D353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.53:beta:*:*:*:*:*:*",
              "matchCriteriaId": "29E9C27A-B036-4858-9230-39DC68F51364",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.63:beta:*:*:*:*:*:*",
              "matchCriteriaId": "774831F5-76C6-4E7A-9A9B-81246EE5E5CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.82:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DD315ADB-3FE8-41B5-9769-5B5C60915A6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.115:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CD9C7D5D-4851-467C-B65B-4F991EDF1E6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.145:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BED1EE-702C-4B2C-96F5-10DD74E3A2B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.148:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D8306B3-073C-4E60-8EC8-6E480287F162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.152:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DAB23AA-62F2-4ABA-BB45-8A0A0FA20092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.158:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECCCBBB5-9CFB-4DA0-A29E-2E76B1CF6F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.163:*:*:*:*:*:*:*",
              "matchCriteriaId": "63F6DC03-719D-4475-80D9-D8A5C56040ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.175:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2222B5B-298D-4A60-BB28-FFA9CC6F4B19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.107:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6BFBA483-C37B-4F11-8B40-6D47FC26D707",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.158:beta:*:*:*:*:*:*",
              "matchCriteriaId": "1118ABD4-B464-4B74-BB66-19D74E998EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.178:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE886272-5B93-477D-B60E-F8E7C34BA475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.202:*:*:*:*:*:*:*",
              "matchCriteriaId": "47173E47-6916-4814-AECB-F50F060C0F53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.214:*:*:*:*:*:*:*",
              "matchCriteriaId": "04E6928A-D6A4-480C-A45D-2ADF7C51C5B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.229:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEC8C9A8-3290-4E3F-A69A-BB522AD1608A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.234:*:*:*:*:*:*:*",
              "matchCriteriaId": "663F3CF2-348E-4635-877F-75135C1158C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.239:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D9C8CB-4BF1-41EB-9B10-DD52D722AE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.6.0.127:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4475186E-992B-4D02-8D47-76518DE1163D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.6.0.159:beta:*:*:*:*:*:*",
              "matchCriteriaId": "EE4160A1-F8F5-4376-8AAA-905895FFAC7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.6.0.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA893BCF-F609-4962-A30C-2E64D3528063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.6.0.244:*:*:*:*:*:*:*",
              "matchCriteriaId": "78EBFF6B-7622-46B4-8D9A-07EDA1A1555D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.6.0.248:*:*:*:*:*:*:*",
              "matchCriteriaId": "C46BEF3E-1062-4766-A4FF-55A3DB1AC144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.8.0.96:beta:*:*:*:*:*:*",
              "matchCriteriaId": "5D1A63EE-A6C7-46DD-ADDE-97486144683F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.8.0.115:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DCD3163-F200-477B-B77F-76E6086D0B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.8.0.139:*:*:*:*:*:*:*",
              "matchCriteriaId": "991E59B3-4F9E-45A7-9C9A-31F5F19B5017",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.8.0.144:*:*:*:*:*:*:*",
              "matchCriteriaId": "9297E18A-390B-4499-BD1E-4FDF2A833EC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.8.0.154:*:*:*:*:*:*:*",
              "matchCriteriaId": "00997409-6334-443D-A1D1-D3FD968D6184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.8.0.180:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD78C82-1752-4830-BF88-1EF31E655CB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.8.0.188:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB7108CB-6748-410B-8610-177748A1064B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0:beta_3:*:*:*:*:*:*",
              "matchCriteriaId": "92DBF2AA-9563-4A4A-9AF4-E251549CA90A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.145:beta:*:*:*:*:*:*",
              "matchCriteriaId": "45E9C376-0EE4-40B2-85CA-C0A514C024AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.150:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8AF6CA00-EA1A-4D1A-A92C-B66F1C6D1298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.155:beta_1:*:*:*:*:*:*",
              "matchCriteriaId": "DA057530-AFC2-4B48-8A61-089D7A1C8827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.161:beta:*:*:*:*:*:*",
              "matchCriteriaId": "29BEA3DA-9F3F-48C2-8090-2DD8369E4188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.166:beta_2:*:*:*:*:*:*",
              "matchCriteriaId": "E7B7C371-214A-4827-BDF8-B593E6C8D965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.168:beta_2:*:*:*:*:*:*",
              "matchCriteriaId": "47B37889-FD25-44CD-B7D9-DABAEEBB08A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.169:beta_2:*:*:*:*:*:*",
              "matchCriteriaId": "C4B5BC42-DB73-483E-9853-887200FA0B4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.176:beta_3:*:*:*:*:*:*",
              "matchCriteriaId": "F0310618-73CB-4E03-B404-413B48C4814A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.181:beta_3:*:*:*:*:*:*",
              "matchCriteriaId": "CF55ADFE-588A-47BC-9B08-414CF5DF7A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.206:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC55DBC2-1B0F-4BF0-8420-238825A38940",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.215:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7ED6478-E4F3-4EE7-A88E-A51E26981595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "395563B5-D9D6-418F-924A-DB9D7D0C1A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.224:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D3FB018-5F7F-4EA4-B625-94BAFF56692E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.226:*:*:*:*:*:*:*",
              "matchCriteriaId": "12D3CA67-2764-4D83-A2D2-58542DF0DA06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.227:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A6DD96-46A8-40E7-A872-BB1D540A7A58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.1.0.130:*:*:*:*:*:*:*",
              "matchCriteriaId": "5531E97B-8ECD-4DFB-B65D-8F0E49907084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.1.0.130:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6D5AD56B-9D77-448B-B113-96DA92E6BCA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.1.0.136:*:*:*:*:*:*:*",
              "matchCriteriaId": "55542083-CE3A-4447-9F65-38F586926DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.1.0.141:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6340539-8060-47A3-935E-FB6C81C96A66",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the Extras Manager before 2.0.0.67 in Skype before 4.1.0.179 on Windows has unknown impact and attack vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no espec\u00edfica en Extras Manager anteriores a v2.0.0.67 en Skype anteriores a v4.1.0.179 en Windows, tiene impacto y vectores de ataque desconocidos.\r\n"
    }
  ],
  "id": "CVE-2009-4741",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-03-26T20:30:00.377",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37012"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/36459"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://developer.skype.com/WindowsSkype/ReleaseNotes#head-21c1b2583e7cc405f994ca162d574fb15a6e986b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/36459"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://developer.skype.com/WindowsSkype/ReleaseNotes#head-21c1b2583e7cc405f994ca162d574fb15a6e986b"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-03-12 17:15
Modified
2024-12-27 17:07
Summary
Skype for Consumer Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
skype skype *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:skype:skype:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B5491E9-29C9-41A8-B375-168072F52B29",
              "versionEndExcluding": "8.113",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Skype for Consumer Remote Code Execution Vulnerability"
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Skype para consumidores"
    }
  ],
  "id": "CVE-2024-21411",
  "lastModified": "2024-12-27T17:07:01.770",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "secure@microsoft.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-03-12T17:15:50.290",
  "references": [
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21411"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21411"
    }
  ],
  "sourceIdentifier": "secure@microsoft.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-453"
        }
      ],
      "source": "secure@microsoft.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-12-22 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Skype 0.92.0.12 and 1.0.0.1 for Linux, and possibly other versions, creates the /usr/share/skype/lang directory with world-writable permissions, which allows local users to modify language files and possibly conduct social engineering or other attacks.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110374568916303&w=2Issue Tracking, Mailing List, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110868557905786&w=2Issue Tracking, Mailing List, Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/12081Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18644Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110374568916303&w=2Issue Tracking, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110868557905786&w=2Issue Tracking, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/12081Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18644Third Party Advisory, VDB Entry
Impacted products
Vendor Product Version
skype skype 0.92.0.12
skype skype 1.0.0.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:skype:skype:0.92.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F48FDA5-1522-476F-BF29-32D5C41A02D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A28B919-9FC1-4247-94A6-CC4DCB0786B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Skype 0.92.0.12 and 1.0.0.1 for Linux, and possibly other versions, creates the /usr/share/skype/lang directory with world-writable permissions, which allows local users to modify language files and possibly conduct social engineering or other attacks."
    }
  ],
  "id": "CVE-2004-1778",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-22T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=110374568916303\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=110868557905786\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/12081"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18644"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=110374568916303\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=110868557905786\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/12081"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18644"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-05-19 21:02
Modified
2025-04-03 01:03
Severity ?
Summary
Argument injection vulnerability in the URI handler in Skype 2.0.*.104 and 2.5.*.0 through 2.5.*.78 for Windows allows remote authorized attackers to download arbitrary files via a URL that contains certain command-line switches.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/fulldisclosure/2006-05/0549.htmlBroken Link
cve@mitre.orghttp://secunia.com/advisories/20154Broken Link, Vendor Advisory
cve@mitre.orghttp://www.kb.cert.org/vuls/id/466428Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.osvdb.org/25658Broken Link
cve@mitre.orghttp://www.securityfocus.com/archive/1/434707/30/4860/threadedBroken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/18038Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.skype.com/security/skype-sb-2006-001.htmlBroken Link
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1871Broken Link, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26557Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0549.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20154Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/466428Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/25658Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/434707/30/4860/threadedBroken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/18038Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.skype.com/security/skype-sb-2006-001.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1871Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26557Third Party Advisory, VDB Entry
Impacted products
Vendor Product Version
skype skype *
skype skype *
microsoft windows *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:skype:skype:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A0E061A-71C1-433B-AB31-6E2F67F91613",
              "versionEndExcluding": "2.0.0.105",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A2F435-8951-44FC-A081-67B385A36727",
              "versionEndExcluding": "2.5.0.79",
              "versionStartIncluding": "2.5.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Argument injection vulnerability in the URI handler in Skype 2.0.*.104 and 2.5.*.0 through 2.5.*.78 for Windows allows remote authorized attackers to download arbitrary files via a URL that contains certain command-line switches."
    }
  ],
  "evaluatorSolution": "Update to the fixed versions.",
  "id": "CVE-2006-2312",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2006-05-19T21:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0549.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20154"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/466428"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.osvdb.org/25658"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/434707/30/4860/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/18038"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.skype.com/security/skype-sb-2006-001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/1871"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26557"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0549.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20154"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/466428"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.osvdb.org/25658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/434707/30/4860/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/18038"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.skype.com/security/skype-sb-2006-001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/1871"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26557"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-88"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-08-26 18:36
Modified
2025-04-11 00:51
Severity ?
Summary
Untrusted search path vulnerability in Skype 4.2.0.169 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wab32.dll that is located in the same folder as a .skype file.
Impacted products
Vendor Product Version
skype skype *
skype skype 0.90.0.5
skype skype 0.90.0.10
skype skype 0.91.0.2
skype skype 0.92.0.4
skype skype 0.93.0.18
skype skype 0.93.1.1
skype skype 0.94.0.19
skype skype 0.94.0.28
skype skype 0.95.0.11
skype skype 0.95.0.25
skype skype 0.95.0.36
skype skype 0.95.0.40
skype skype 0.96.0.1
skype skype 0.96.0.3
skype skype 0.97.0.1
skype skype 0.97.0.3
skype skype 0.97.0.6
skype skype 0.97.0.40
skype skype 0.98.0.04
skype skype 0.98.0.6
skype skype 0.98.0.28
skype skype 0.98.0.42
skype skype 0.98.0.68
skype skype 1.0.0.9
skype skype 1.0.0.10
skype skype 1.0.0.18
skype skype 1.0.0.29
skype skype 1.0.0.94
skype skype 1.0.0.97
skype skype 1.0.0.100
skype skype 1.0.0.106
skype skype 1.1.0.6
skype skype 1.1.0.73
skype skype 1.1.0.79
skype skype 1.2.0.37
skype skype 1.2.0.41
skype skype 1.2.0.48
skype skype 1.3.0.45
skype skype 1.3.0.48
skype skype 1.3.0.51
skype skype 1.3.0.54
skype skype 1.3.0.55
skype skype 1.3.0.57
skype skype 1.3.0.60
skype skype 1.3.0.66
skype skype 1.4.0.71
skype skype 1.4.0.78
skype skype 1.4.0.84
skype skype 2.0.0.69
skype skype 2.0.0.73
skype skype 2.0.0.79
skype skype 2.0.0.81
skype skype 2.0.0.90
skype skype 2.0.0.97
skype skype 2.0.0.103
skype skype 2.0.0.105
skype skype 2.0.0.107
skype skype 2.5.0.72
skype skype 2.5.0.82
skype skype 2.5.0.91
skype skype 2.5.0.113
skype skype 2.5.0.122
skype skype 2.5.0.126
skype skype 2.5.0.130
skype skype 2.5.0.137
skype skype 2.5.0.141
skype skype 2.5.0.151
skype skype 2.5.0.154
skype skype 2.6.0.67
skype skype 2.6.0.74
skype skype 2.6.0.81
skype skype 2.6.0.97
skype skype 2.6.0.103
skype skype 2.6.0.105
skype skype 3.0.0.106
skype skype 3.0.0.123
skype skype 3.0.0.137
skype skype 3.0.0.154
skype skype 3.0.0.190
skype skype 3.0.0.198
skype skype 3.0.0.205
skype skype 3.0.0.209
skype skype 3.0.0.214
skype skype 3.0.0.216
skype skype 3.0.0.217
skype skype 3.0.0.218
skype skype 3.1.0.112
skype skype 3.1.0.134
skype skype 3.1.0.144
skype skype 3.1.0.147
skype skype 3.1.0.150
skype skype 3.1.0.152
skype skype 3.2.0.53
skype skype 3.2.0.63
skype skype 3.2.0.82
skype skype 3.2.0.115
skype skype 3.2.0.145
skype skype 3.2.0.148
skype skype 3.2.0.152
skype skype 3.2.0.158
skype skype 3.2.0.163
skype skype 3.2.0.175
skype skype 3.5.0.107
skype skype 3.5.0.158
skype skype 3.5.0.178
skype skype 3.5.0.202
skype skype 3.5.0.214
skype skype 3.5.0.229
skype skype 3.5.0.234
skype skype 3.5.0.239
skype skype 3.6.0.127
skype skype 3.6.0.159
skype skype 3.6.0.216
skype skype 3.6.0.244
skype skype 3.6.0.248
skype skype 3.8.0.96
skype skype 3.8.0.115
skype skype 3.8.0.139
skype skype 3.8.0.144
skype skype 3.8.0.154
skype skype 3.8.0.180
skype skype 3.8.0.188
skype skype 4.0
skype skype 4.0.0.145
skype skype 4.0.0.150
skype skype 4.0.0.155
skype skype 4.0.0.161
skype skype 4.0.0.166
skype skype 4.0.0.168
skype skype 4.0.0.169
skype skype 4.0.0.176
skype skype 4.0.0.181
skype skype 4.0.0.206
skype skype 4.0.0.215
skype skype 4.0.0.216
skype skype 4.0.0.224
skype skype 4.0.0.226
skype skype 4.0.0.227
skype skype 4.1.0.130
skype skype 4.1.0.130
skype skype 4.1.0.136
skype skype 4.1.0.141
skype skype 4.1.0.166
skype skype 4.1.0.179
skype skype 4.2.0.141
skype skype 4.2.0.152
skype skype 4.2.0.155
skype skype 4.2.0.158
skype skype 4.2.0.163
skype skype 4.2.0.166



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:skype:skype:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BEA240-02D3-45F3-AA3C-CD95DD81A935",
              "versionEndIncluding": "4.2.0.169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.90.0.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4347B1A3-06EB-4B6C-ADFD-87967F7CD9A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.90.0.10:beta:*:*:*:*:*:*",
              "matchCriteriaId": "9872E235-52DC-402E-A135-AFC7845474FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.91.0.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B39A42AF-2C67-4858-8511-42ECEAD00B84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.92.0.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "BD3B70FC-6A5C-4F36-9F64-A27879BBA75C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.93.0.18:beta:*:*:*:*:*:*",
              "matchCriteriaId": "77B4C334-4863-40A6-A4C5-F5E2250E6BCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.93.1.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "27D1A581-BB48-4E48-A6F9-442C2031F49B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.94.0.19:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4D0BD696-6C7B-4455-BC5D-7092766EF821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.94.0.28:beta:*:*:*:*:*:*",
              "matchCriteriaId": "17EE6ED4-7C68-4E51-BB01-1D83BAE7D4AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.95.0.11:beta:*:*:*:*:*:*",
              "matchCriteriaId": "77E346FA-47D3-4220-8AC8-C248E68104E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.95.0.25:beta:*:*:*:*:*:*",
              "matchCriteriaId": "39482A01-6B66-4D32-A35E-8868B97F80A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.95.0.36:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B7E3A0CC-A6AB-418E-8C77-2E7B2AEBD1BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.95.0.40:beta:*:*:*:*:*:*",
              "matchCriteriaId": "7C1E53EA-85CA-44D3-9714-6236A5FBCA33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.96.0.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "558A004A-1562-428F-870B-C9219315418A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.96.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "5FA2440F-E72B-4093-ABED-F55FAFA0DCEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.97.0.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "9FF45E16-4E79-4FA7-BDF6-28D3B83AE705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.97.0.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "C9094503-0100-4544-80DA-A87685BABD8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.97.0.6:beta:*:*:*:*:*:*",
              "matchCriteriaId": "2C101656-3DD2-46B2-8069-F8931EF2429B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.97.0.40:beta:*:*:*:*:*:*",
              "matchCriteriaId": "2B63F2F2-628B-4E6F-81C2-CBAE0A95D775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.98.0.04:beta:*:*:*:*:*:*",
              "matchCriteriaId": "44EB1F86-6D75-448A-BD95-084E2FB867EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.98.0.6:beta:*:*:*:*:*:*",
              "matchCriteriaId": "85E9F595-EF59-4D72-840A-67DBCC06BE21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.98.0.28:beta:*:*:*:*:*:*",
              "matchCriteriaId": "02A989D1-8957-4E4E-B418-E96165008F7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.98.0.42:beta:*:*:*:*:*:*",
              "matchCriteriaId": "16796596-C3EB-4D51-8AD6-B71EFD501C49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:0.98.0.68:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0BC8B49D-F727-4929-945C-E99C0336BCF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B6B904-DF16-49AA-B481-A29C4678A732",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4D2F33D-0000-4C65-BFB6-D61B6C474A95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "68588557-B1B8-46D7-9AF7-70F9B30D6166",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E73FD84-4C29-44DA-9E3F-8279787B2D78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "C64674AE-8C59-4878-BD45-279C3DAABBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "97FEDF7C-3DE1-46E6-B9C0-A585E4C6B0AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.100:*:*:*:*:*:*:*",
              "matchCriteriaId": "17833EDB-F84E-4A01-A1C7-09B3C22FC267",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.0.0.106:*:*:*:*:*:*:*",
              "matchCriteriaId": "E01D6175-0976-4032-9D27-01F51205C6C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6F678DC-42BD-47F5-AD6D-3CB666CAFD0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.1.0.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "791D4B01-A6B9-401A-8DCD-CB628A73777D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.1.0.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6ADA513-8C04-4C59-A092-216A135FCF61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.2.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2B9862D-5582-44D1-853C-6C3A90B9F913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.2.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FBC565C-EB87-4B1B-B8CE-0A4D0CA2129E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.2.0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6E80B11-3202-4EA9-AD09-28E45A9095DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "A88FFB24-E27E-419B-9AD5-2F0F7E87D480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "417E40F7-21E4-45A1-89AB-76E678AA8779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B86DD6A-2B02-4ECC-A715-C6122EA702D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB05BB0B-EC51-4078-BEB9-387C63CBA657",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "190E2D35-CB24-450A-B0F7-E13C02D3D68F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "04CC9C86-4C59-4E83-92D0-47CB379B3885",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E7C75C-31FD-41CB-953D-296E359CAB50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.3.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D0FF8F-6B44-4739-9D63-FC390546A680",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.4.0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "8986EC65-EF3C-479B-AD8F-22C4AA09CBE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.4.0.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D9535F9-C39D-48B6-852D-D4FA487E543D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:1.4.0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "88931FE1-276F-450A-929C-A39F9877D840",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "126A07A6-79DF-4E46-A102-B1B05F859642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D4A9C3-A418-42A1-AD3F-259B3249D222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A169E6-8A9E-4179-8BB0-B2D11C9E9D59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBFBA895-802E-4D9C-A15E-6BF97D63B2FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C713220-2A47-4A3B-9466-A57D29318F83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "C35A3470-5AAC-4E70-81C0-37BEE3A6E2D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.103:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1A62B7B-50E6-4FD5-B14E-5EE7F6FA8353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.105:*:*:*:*:*:*:*",
              "matchCriteriaId": "9323C4E9-2FF9-4D92-B70B-CF7A5C385FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.0.0.107:*:*:*:*:*:*:*",
              "matchCriteriaId": "E07F388E-770E-4450-B28D-DD2FA799A1F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AA3B772-DF05-4AF6-9C1A-4CA5B0FF3E82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C09AFC0-4829-459C-9A02-6D6166840F2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FB3D033-697A-4B87-930A-58F74DCA4481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.113:*:*:*:*:*:*:*",
              "matchCriteriaId": "D549B7F6-1A95-494A-9B75-70FFB41A38E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.122:*:*:*:*:*:*:*",
              "matchCriteriaId": "6433ACA2-0CEB-4EE3-84D2-94EAF015DC8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.126:*:*:*:*:*:*:*",
              "matchCriteriaId": "511D24FC-B5DE-42BD-A3A1-140B677CB5F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.130:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A4EA665-99DE-4F60-A8DF-19E9FDAC45F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.137:*:*:*:*:*:*:*",
              "matchCriteriaId": "79EA2C60-7AE5-4FED-A800-AF09B25B5CD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.141:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD281AEE-1DB2-4313-8F87-A5A07CC977EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.151:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ECC2D86-F555-4886-98F7-1C3FF27E1827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.5.0.154:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA42766-129E-47EE-AE68-827248E39488",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.6.0.67:beta:*:*:*:*:*:*",
              "matchCriteriaId": "F03FDE58-53B3-4060-B285-ABC9E223EE44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.6.0.74:beta:*:*:*:*:*:*",
              "matchCriteriaId": "80B0F546-5D5A-44A2-8758-86D6355E2F69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.6.0.81:beta:*:*:*:*:*:*",
              "matchCriteriaId": "7F416029-905B-450B-BE0B-2BA86F1BFD0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.6.0.97:beta:*:*:*:*:*:*",
              "matchCriteriaId": "5C2E1960-3746-478D-ABC9-B95071A8B1EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.6.0.103:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B5C981CC-42D8-4BF2-99D1-0A500175E512",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:2.6.0.105:beta:*:*:*:*:*:*",
              "matchCriteriaId": "E7D12ECC-424F-4E49-8937-CF35FF9CE5CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.106:beta:*:*:*:*:*:*",
              "matchCriteriaId": "FA7C122A-E968-4A59-BD50-E9F8F98005BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.123:beta:*:*:*:*:*:*",
              "matchCriteriaId": "F735E486-0B0D-4F97-8E8F-9CDFFE3B4DE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.137:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8A33F38D-0636-4F70-9E88-F9706C0BFD7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.154:beta:*:*:*:*:*:*",
              "matchCriteriaId": "E7CA33B3-50EF-479B-8201-72CCCC78B259",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.190:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE4535E7-C455-49A7-99D9-2103C69D1A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.198:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A042F07-E1C0-46C5-904D-725DED823B15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.205:*:*:*:*:*:*:*",
              "matchCriteriaId": "45270047-5735-4EC3-BCE1-1EB987AB9AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.209:*:*:*:*:*:*:*",
              "matchCriteriaId": "64AA9FD4-B7BB-4AF2-9372-B1206291C424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.214:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A6BCEAE-89BF-494A-B8ED-8464F2922924",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FC8D0AF-E420-47F8-BACE-20BA862C89A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.217:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE388BAB-2CFA-4931-82AE-244A25CCAC92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.0.0.218:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC57AFCF-1DFE-4207-94C2-F8D50FFCDB0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.1.0.112:beta:*:*:*:*:*:*",
              "matchCriteriaId": "430996CF-EEAF-4844-A8D6-0ED40B5EBC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.1.0.134:beta:*:*:*:*:*:*",
              "matchCriteriaId": "42A5D0BA-3A78-4DBC-B92B-643CAD4917F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.1.0.144:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBBCF519-2C0C-4128-BF30-A4EA27083F36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.1.0.147:*:*:*:*:*:*:*",
              "matchCriteriaId": "909B644A-C6AC-4A9E-8603-7709E243A9A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.1.0.150:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F36126F-1BE3-4BE3-AFC6-E968F852025F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.1.0.152:*:*:*:*:*:*:*",
              "matchCriteriaId": "F62E1DDA-8D3A-48A7-9C5A-11346AC6D353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.53:beta:*:*:*:*:*:*",
              "matchCriteriaId": "29E9C27A-B036-4858-9230-39DC68F51364",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.63:beta:*:*:*:*:*:*",
              "matchCriteriaId": "774831F5-76C6-4E7A-9A9B-81246EE5E5CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.82:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DD315ADB-3FE8-41B5-9769-5B5C60915A6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.115:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CD9C7D5D-4851-467C-B65B-4F991EDF1E6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.145:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BED1EE-702C-4B2C-96F5-10DD74E3A2B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.148:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D8306B3-073C-4E60-8EC8-6E480287F162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.152:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DAB23AA-62F2-4ABA-BB45-8A0A0FA20092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.158:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECCCBBB5-9CFB-4DA0-A29E-2E76B1CF6F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.163:*:*:*:*:*:*:*",
              "matchCriteriaId": "63F6DC03-719D-4475-80D9-D8A5C56040ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.2.0.175:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2222B5B-298D-4A60-BB28-FFA9CC6F4B19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.107:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6BFBA483-C37B-4F11-8B40-6D47FC26D707",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.158:beta:*:*:*:*:*:*",
              "matchCriteriaId": "1118ABD4-B464-4B74-BB66-19D74E998EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.178:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE886272-5B93-477D-B60E-F8E7C34BA475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.202:*:*:*:*:*:*:*",
              "matchCriteriaId": "47173E47-6916-4814-AECB-F50F060C0F53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.214:*:*:*:*:*:*:*",
              "matchCriteriaId": "04E6928A-D6A4-480C-A45D-2ADF7C51C5B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.229:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEC8C9A8-3290-4E3F-A69A-BB522AD1608A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.234:*:*:*:*:*:*:*",
              "matchCriteriaId": "663F3CF2-348E-4635-877F-75135C1158C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.5.0.239:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D9C8CB-4BF1-41EB-9B10-DD52D722AE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.6.0.127:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4475186E-992B-4D02-8D47-76518DE1163D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.6.0.159:beta:*:*:*:*:*:*",
              "matchCriteriaId": "EE4160A1-F8F5-4376-8AAA-905895FFAC7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.6.0.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA893BCF-F609-4962-A30C-2E64D3528063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.6.0.244:*:*:*:*:*:*:*",
              "matchCriteriaId": "78EBFF6B-7622-46B4-8D9A-07EDA1A1555D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.6.0.248:*:*:*:*:*:*:*",
              "matchCriteriaId": "C46BEF3E-1062-4766-A4FF-55A3DB1AC144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.8.0.96:beta:*:*:*:*:*:*",
              "matchCriteriaId": "5D1A63EE-A6C7-46DD-ADDE-97486144683F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.8.0.115:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DCD3163-F200-477B-B77F-76E6086D0B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.8.0.139:*:*:*:*:*:*:*",
              "matchCriteriaId": "991E59B3-4F9E-45A7-9C9A-31F5F19B5017",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.8.0.144:*:*:*:*:*:*:*",
              "matchCriteriaId": "9297E18A-390B-4499-BD1E-4FDF2A833EC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.8.0.154:*:*:*:*:*:*:*",
              "matchCriteriaId": "00997409-6334-443D-A1D1-D3FD968D6184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.8.0.180:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD78C82-1752-4830-BF88-1EF31E655CB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:3.8.0.188:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB7108CB-6748-410B-8610-177748A1064B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0:beta_3:*:*:*:*:*:*",
              "matchCriteriaId": "92DBF2AA-9563-4A4A-9AF4-E251549CA90A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.145:beta:*:*:*:*:*:*",
              "matchCriteriaId": "45E9C376-0EE4-40B2-85CA-C0A514C024AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.150:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8AF6CA00-EA1A-4D1A-A92C-B66F1C6D1298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.155:beta_1:*:*:*:*:*:*",
              "matchCriteriaId": "DA057530-AFC2-4B48-8A61-089D7A1C8827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.161:beta:*:*:*:*:*:*",
              "matchCriteriaId": "29BEA3DA-9F3F-48C2-8090-2DD8369E4188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.166:beta_2:*:*:*:*:*:*",
              "matchCriteriaId": "E7B7C371-214A-4827-BDF8-B593E6C8D965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.168:beta_2:*:*:*:*:*:*",
              "matchCriteriaId": "47B37889-FD25-44CD-B7D9-DABAEEBB08A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.169:beta_2:*:*:*:*:*:*",
              "matchCriteriaId": "C4B5BC42-DB73-483E-9853-887200FA0B4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.176:beta_3:*:*:*:*:*:*",
              "matchCriteriaId": "F0310618-73CB-4E03-B404-413B48C4814A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.181:beta_3:*:*:*:*:*:*",
              "matchCriteriaId": "CF55ADFE-588A-47BC-9B08-414CF5DF7A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.206:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC55DBC2-1B0F-4BF0-8420-238825A38940",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.215:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7ED6478-E4F3-4EE7-A88E-A51E26981595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "395563B5-D9D6-418F-924A-DB9D7D0C1A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.224:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D3FB018-5F7F-4EA4-B625-94BAFF56692E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.226:*:*:*:*:*:*:*",
              "matchCriteriaId": "12D3CA67-2764-4D83-A2D2-58542DF0DA06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.0.0.227:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A6DD96-46A8-40E7-A872-BB1D540A7A58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.1.0.130:*:*:*:*:*:*:*",
              "matchCriteriaId": "5531E97B-8ECD-4DFB-B65D-8F0E49907084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.1.0.130:beta:*:*:*:*:*:*",
              "matchCriteriaId": "6D5AD56B-9D77-448B-B113-96DA92E6BCA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.1.0.136:*:*:*:*:*:*:*",
              "matchCriteriaId": "55542083-CE3A-4447-9F65-38F586926DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.1.0.141:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6340539-8060-47A3-935E-FB6C81C96A66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.1.0.166:*:*:*:*:*:*:*",
              "matchCriteriaId": "E52F2A8B-0794-4879-9542-6591294336AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.1.0.179:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5DFAE41-B004-47BA-9AEA-BE1F6BD804E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.2.0.141:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B71F1DCE-3C7E-4DF8-9F92-7E7E93856365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.2.0.152:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B35C1C3-0B39-42F7-80C8-0109F9232A3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.2.0.155:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CA6897-4AF4-4B3E-A136-D449BAB829CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.2.0.158:*:*:*:*:*:*:*",
              "matchCriteriaId": "71DDCBA8-0758-4EB7-8539-2B9F13B467A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.2.0.163:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D38F87E-C9EB-4B84-B7A3-2AC193A732DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:skype:skype:4.2.0.166:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E68021-426A-4FC3-8C66-A0D1A386C3B3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Untrusted search path vulnerability in Skype 4.2.0.169 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wab32.dll that is located in the same folder as a .skype file."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de b\u00fasqueda en ruta no confiable en Skype v4.2.0.169 y anteriores, permite a usuarios locales y posiblemente atacantes remotos, la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n y llevar a cabo ataques de secuestro de DLL a trav\u00e9s de un troyano wab32.dll que est\u00e1 localizada en la misma carpeta como un archivo .skype."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\nCWE-426 - \u0027Untrusted Search Path Vulnerability\u0027",
  "id": "CVE-2010-3136",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-08-26T18:36:36.107",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/14766"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64577"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/14766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64577"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11833"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}