CVE-2008-3429 (GCVE-0-2008-3429)
Vulnerability from cvelistv5
Published
2008-07-31 22:00
Modified
2024-08-07 09:37
Severity ?
CWE
  • n/a
Summary
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.
References
cve@mitre.org http://secunia.com/advisories/31323/
cve@mitre.org http://secunia.com/advisories/31380
cve@mitre.org http://secunia.com/advisories/31866
cve@mitre.org http://www.debian.org/security/2008/dsa-1626
cve@mitre.org http://www.httrack.com/history.txt
cve@mitre.org http://www.securityfocus.com/bid/30425
cve@mitre.org http://www.venustech.com.cn/NewsInfo/124/2032.Html
cve@mitre.org http://www.vupen.com/english/advisories/2008/2221/references
cve@mitre.org https://exchange.xforce.ibmcloud.com/vulnerabilities/44167
cve@mitre.org https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html
cve@mitre.org https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/31323/
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/31380
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/31866
af854a3a-2127-422b-91ae-364da2661108 http://www.debian.org/security/2008/dsa-1626
af854a3a-2127-422b-91ae-364da2661108 http://www.httrack.com/history.txt
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/30425
af854a3a-2127-422b-91ae-364da2661108 http://www.venustech.com.cn/NewsInfo/124/2032.Html
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2008/2221/references
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/44167
af854a3a-2127-422b-91ae-364da2661108 https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html
af854a3a-2127-422b-91ae-364da2661108 https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:37:26.948Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "httrack-urls-bo(44167)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.httrack.com/history.txt"
          },
          {
            "name": "ADV-2008-2221",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2221/references"
          },
          {
            "name": "DSA-1626",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1626"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
          },
          {
            "name": "31323",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31323/"
          },
          {
            "name": "30425",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30425"
          },
          {
            "name": "FEDORA-2008-7896",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
          },
          {
            "name": "FEDORA-2008-7862",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
          },
          {
            "name": "31866",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31866"
          },
          {
            "name": "31380",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31380"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-07-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "httrack-urls-bo(44167)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.httrack.com/history.txt"
        },
        {
          "name": "ADV-2008-2221",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2221/references"
        },
        {
          "name": "DSA-1626",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1626"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
        },
        {
          "name": "31323",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31323/"
        },
        {
          "name": "30425",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30425"
        },
        {
          "name": "FEDORA-2008-7896",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
        },
        {
          "name": "FEDORA-2008-7862",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
        },
        {
          "name": "31866",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31866"
        },
        {
          "name": "31380",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31380"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3429",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "httrack-urls-bo(44167)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
            },
            {
              "name": "http://www.httrack.com/history.txt",
              "refsource": "CONFIRM",
              "url": "http://www.httrack.com/history.txt"
            },
            {
              "name": "ADV-2008-2221",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2221/references"
            },
            {
              "name": "DSA-1626",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1626"
            },
            {
              "name": "http://www.venustech.com.cn/NewsInfo/124/2032.Html",
              "refsource": "MISC",
              "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
            },
            {
              "name": "31323",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31323/"
            },
            {
              "name": "30425",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30425"
            },
            {
              "name": "FEDORA-2008-7896",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
            },
            {
              "name": "FEDORA-2008-7862",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
            },
            {
              "name": "31866",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31866"
            },
            {
              "name": "31380",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31380"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3429",
    "datePublished": "2008-07-31T22:00:00",
    "dateReserved": "2008-07-31T00:00:00",
    "dateUpdated": "2024-08-07T09:37:26.948Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2008-3429\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-07-31T22:41:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de Buffer en el procesado de URI de HTTrack y WinHTTrack versiones anteriores a la 3.42-3, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrariamente mediante una URL larga.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:0.23:beta-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"30A61DED-D601-4FCD-82A8-9AA0F6660D06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:0.24:beta-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA9DC545-4B39-4135-8F42-3A2A4C25D5F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:0.25:beta-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B492CFE-25C8-466D-848C-F0E606677882\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:0.99:beta-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3666C84-2626-453B-80AA-3712CEDFC40F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:0.996:beta-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"31CAA471-A9D5-44A2-96A4-03E54B1307D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:0.997:beta-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C18F4201-8FDD-45E3-891C-BEABC91B5132\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:0.998:beta-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EAC0EC7-9FFE-4F57-B9EC-E8744C8C1876\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55CE92DE-889F-4219-A20B-1658FD1A20D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7FDCAC6-5142-4730-B823-E2F2AC002C57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69198DB6-723E-45F0-BDD8-D6106EA432EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD90479B-84F3-45A7-AA68-FA0B6A5D14C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97354343-B565-4CC1-B2EF-883F7AE2A81F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B4BAAF0-714D-4FD6-9FEE-F68391E07CD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.10:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"90C3786A-6F46-40A9-B51C-4D2D153B8760\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.10:c:*:*:*:*:*:*\",\"matchCriteriaId\":\"93863B08-5B94-4952-A1FA-0E7CA7544C2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.10:d:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BC576E1-A95F-4B2B-ADE7-F52CB25F647E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.10:e:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F0289D6-58C3-40C6-87AB-FEBF45AF327B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E53081E7-F8D1-458A-AD2C-2E1AA79B7B7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FADF089-961C-469C-A333-353B1CD308FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.15:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBEE9FDE-FC46-43A8-8253-954B61B88A47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF625B94-9204-4CDF-93BA-AC785087DA80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.16:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"161231F6-F21F-4D2F-AE63-B321EC8E0578\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB14522C-7783-4A9A-8A0E-B8D5D39049CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08487F25-62EE-4873-A641-E3C6012C3FEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB814FD0-A59F-4D95-B595-18A034747385\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04F142B1-2646-4725-B926-44F2734C06A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EE56720-C089-45EA-8173-2BC3B9BCEE51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:1.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A59CE6D-77AC-4111-A106-09F68F14EE31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:2.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22047DC8-7DA0-4DB9-B806-60901262F49E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:2.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18447927-A5B0-44A3-B346-C24F8A456945\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E218C652-ABB0-4445-8FF7-28CC59DD311D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:2.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E4CD38B-9F65-4A79-A44A-9B5C002125AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E741EEE4-0ED4-4AF1-A7C3-D978B32194D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4B90D7C-E458-4C24-A0E7-494DA3837948\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68B488E1-EF0D-4A0E-9E26-12742EFE54E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5760D8D4-9879-462A-ADBD-8D3DEEDF87E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44BDC99D-71E2-474F-BE92-CC2560B10BCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61DB5944-DADF-47BF-9064-DAFCB2DE6F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F25BDEC-93ED-47D6-829D-7E6CB9EF563C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4763A337-1E82-45CF-AF95-4B189EF47354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FAF9C77-2D09-49AE-8301-5A96064EEFAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38B428DE-8023-449B-8619-41044F82A5ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A79F6982-3519-495E-A7A0-B3096F3D8C30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF5CB5E-8768-412C-9B41-A870F2BDEDCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.16:2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E11ADCD-CA49-4AA9-BF64-ACA01FF85936\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.20:2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEDB7060-F385-49B7-B547-F4670F5971F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.21:8:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE1176AC-D41F-4A94-84C4-3F5FD1D9772B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.22:3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C5B81B7-0F69-4577-8DFD-623C783B93B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE90318-8B47-4AB6-9EF0-59A03AEC3EA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE97BF0A-4B4D-494C-A997-36E7449E1FE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ACD1DA3-AA16-4127-AC1B-157BE695B8B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D175651-5CD6-4477-8496-55C4E963BF27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8ACAA7A-7D8A-44F4-987F-E71C284B84F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7BFB002-F9A0-46A7-BDC2-E1BFB54B5342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.40:2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B09BE206-FEDA-46ED-9027-0E3D6DEF33F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEEAA51F-5405-457E-912D-04A750C61C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.41:2:*:*:*:*:*:*\",\"matchCriteriaId\":\"96470815-113A-4874-B3C2-B1BD42E5D61F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.41:3:*:*:*:*:*:*\",\"matchCriteriaId\":\"016617B2-E181-4732-9F6D-107679371624\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0865F74D-87A9-429A-BEF7-02E145DB4698\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.42:2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D350B62-3894-4708-AB36-A53C95B529E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:httrack:3.42:3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E44DE8C5-FD50-410C-B3BA-3C4A4CA05173\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:*:2:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.42\",\"matchCriteriaId\":\"D198D5DD-FCA6-4146-A128-6B08B60668F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:0.23:beta-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F24FD93-7F69-4AD2-A3C0-4A58E2427204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:0.24:beta-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C66E9B9A-7752-4ACB-8E70-15C5A5CF9FD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:0.25:beta-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C50FA58-D0E8-4EF4-993B-BFFFBCD31A95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:0.99:beta-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AA15A17-3D5B-431F-85F7-719D16C51C6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:0.996:beta-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"23668163-813E-4A0A-8F5A-AFF8B72E641F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:0.997:beta-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"946CF2C4-AC27-4D6E-84CA-119BBDC586F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:0.998:beta-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B210EC5-5CE5-4C29-996C-0EB1145A359F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28CB654C-5A0A-4AD2-A7E4-E5FBD41AD111\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA4F9850-1F0F-44E9-913A-97EB742E8510\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA284FCF-8AC4-4218-8115-FB41366F81DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6420DCD-72DE-4597-B961-DB06972F6A59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F3C4AE-3824-4130-A84C-8358A7D621DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDB91A73-0E5A-4592-81F3-62A8A578DC57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.10:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3DE24C3-34D2-409A-BD35-5D1A1C8C285E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.10:c:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EFCAE76-7B19-4DF6-8700-24A2F36FBC30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.10:d:*:*:*:*:*:*\",\"matchCriteriaId\":\"821397D4-2184-45B6-A5E0-0518081E1B80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.10:e:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD774253-68B9-450B-9C5F-802034C84A8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7282DC66-01CD-49F6-9FAD-70C8EA443687\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D6AA4B8-BE17-4DDD-8F7A-55543EE5306C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5CFFF64-2974-4510-8B44-6C8C4752E31F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.16:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F3FA036-18A8-40DC-B8E4-7EC2977032FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE067177-2009-445E-A730-54575F8BA6D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"478DFB57-B1C8-4282-8526-5127DEE18EE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7E08DB9-A53D-41E5-A3BB-442BB68B6ADF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC5E2B53-73BC-4648-8F63-79631F1F1790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEE21A00-F336-46E1-9521-B3BF57EBD291\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:1.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD92B8F5-F37F-4FF4-8BD6-7921976CF014\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:2.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87BB4DCA-7F63-4AFF-9EFE-765CC88EAB70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:2.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74C2DFB0-8BD4-40F0-892A-BB03B2B79836\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:2.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62AC39F4-3466-4B3B-80C1-C01A72F144A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA18C300-3602-4734-93BB-D8A32D01F34B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60A398DC-CDCF-4727-8983-07E343B9D1FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3F0900-1592-45EE-BC34-68945653EAD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EA680DA-A9DD-4B01-A036-CCD2C2752D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D91198C2-64AD-420D-B527-CD98209FC1D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A7DE353-7A3F-4BEF-AD85-4710BEC1B322\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"150EDF01-496C-4BEB-97FF-FE8FD424A399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F44A791C-B9C3-4298-9C7B-1AEEE28688AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2CB13FD-9E4B-4816-B246-0E26B62378E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E3F8937-6978-4DCD-ADAD-F95B235944CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"431E48C8-A9A1-4B3F-B1D0-D658CB44C1F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44BE5DB7-077A-4B91-9184-A81032B08692\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EC15A35-E68D-46DF-BAC7-3AB39CDE0D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.15:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"312C47AB-4AD2-4600-B0BD-7C34524F1522\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.16:2:*:*:*:*:*:*\",\"matchCriteriaId\":\"616DB4E3-C1FB-4DFC-9F98-4510A468EC21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.20:2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA77BC82-49AF-4797-AF8A-BABD0671F31D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.21:8:*:*:*:*:*:*\",\"matchCriteriaId\":\"60D8BD06-43BF-496B-9A0F-5FF66BA0D3F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.22:3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B876EC8A-9A8D-42AB-B4F3-E9ECF3375831\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE2E7FB6-4A9E-431E-9504-6C8EC86A6B62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"219939CD-3530-4CC5-8C2E-69162E692FC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47B23265-E4C3-415C-A083-61891EE3860E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4A821F7-256E-4749-9294-A2627D40DB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4196933D-B459-4AC9-A5A1-E6E8CC410572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53472D88-F355-48A3-BE7E-596EFC0F3727\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.40:2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7A1751D-5C49-4996-8D5F-496774A8EA85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BAF3263-D5F8-40F9-9A9C-2721225BC14B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.41:2:*:*:*:*:*:*\",\"matchCriteriaId\":\"722AB21A-96C6-4FD7-9297-F62B933D4203\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.41:3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA434245-AC94-4A81-BF70-E359CB57265A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:httrack:winhttrack:3.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91E5F413-6040-4BF7-88AB-E08C7FCFCCFC\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/31323/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/31380\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/31866\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1626\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.httrack.com/history.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/30425\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.venustech.com.cn/NewsInfo/124/2032.Html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2221/references\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44167\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/31323/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31380\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31866\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1626\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.httrack.com/history.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/30425\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.venustech.com.cn/NewsInfo/124/2032.Html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2221/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44167\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…