fkie_cve-2005-2856
Vulnerability from fkie_nvd
Published
2005-09-08 10:03
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=112621008228458&w=2
cve@mitre.orghttp://secunia.com/advisories/16479Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19454Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19458Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19581Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19596
cve@mitre.orghttp://secunia.com/advisories/19612
cve@mitre.orghttp://secunia.com/advisories/19834Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19890Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19931
cve@mitre.orghttp://secunia.com/advisories/19938Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19939
cve@mitre.orghttp://secunia.com/advisories/19967Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19975Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19977Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/20009Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/20270
cve@mitre.orghttp://secunia.com/secunia_research/2005-41/advisory/
cve@mitre.orghttp://secunia.com/secunia_research/2006-24/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-25/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-27/Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-28/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-29/advisory/Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-30/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-32/advisory/
cve@mitre.orghttp://secunia.com/secunia_research/2006-33/advisory/Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-36/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-38/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-46/advisory/
cve@mitre.orghttp://secunia.com/secunia_research/2006-50/advisory/
cve@mitre.orghttp://securityreason.com/securityalert/49
cve@mitre.orghttp://securitytracker.com/id?1014863
cve@mitre.orghttp://securitytracker.com/id?1015852
cve@mitre.orghttp://securitytracker.com/id?1016011
cve@mitre.orghttp://securitytracker.com/id?1016012
cve@mitre.orghttp://securitytracker.com/id?1016065
cve@mitre.orghttp://securitytracker.com/id?1016066
cve@mitre.orghttp://securitytracker.com/id?1016088
cve@mitre.orghttp://securitytracker.com/id?1016114
cve@mitre.orghttp://securitytracker.com/id?1016115
cve@mitre.orghttp://securitytracker.com/id?1016177
cve@mitre.orghttp://securitytracker.com/id?1016257
cve@mitre.orghttp://securitytracker.com/id?1016512
cve@mitre.orghttp://www.osvdb.org/25129
cve@mitre.orghttp://www.securityfocus.com/archive/1/432357/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/432579/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/433258/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/433352/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/433693/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/434011/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/434234/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/434279/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/436639/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/440303/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/14759
cve@mitre.orghttp://www.securityfocus.com/bid/19884
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1565
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1577
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1611
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1681
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1694
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1725
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1775
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1797
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1835
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1836
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2047
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2184
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2824
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3495
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26116
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26142
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26168
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26272
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26302
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26315
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26385
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26447
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26479
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26480
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26736
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26982
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/27763
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/28787
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=112621008228458&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/16479Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19454Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19458Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19581Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19596
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19612
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19834Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19890Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19931
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19938Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19939
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19967Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19975Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19977Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20009Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20270
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2005-41/advisory/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-24/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-25/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-27/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-28/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-29/advisory/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-30/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-32/advisory/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-33/advisory/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-36/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-38/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-46/advisory/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-50/advisory/
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/49
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1014863
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015852
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016011
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016012
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016065
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016066
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016088
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016114
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016115
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016177
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016257
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016512
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/25129
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/432357/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/432579/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/433258/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/433352/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/433693/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/434011/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/434234/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/434279/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/436639/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/440303/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/14759
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19884
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1565
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1577
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1611
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1681
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1694
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1725
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1775
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1797
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1835
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1836
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2047
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2184
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2824
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3495
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26116
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26142
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26168
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26272
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26302
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26315
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26385
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26447
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26479
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26480
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26736
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26982
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/27763
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/28787
Impacted products
Vendor Product Version
winace winace 2.6.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:winace:winace:2.6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D2B1B2-B49D-4F22-B4C6-CE0FAF0FDF35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive."
    }
  ],
  "id": "CVE-2005-2856",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-09-08T10:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16479"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19454"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19458"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19581"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19596"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19612"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19834"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19890"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19931"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19938"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19939"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19967"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19975"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19977"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20009"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20270"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/secunia_research/2005-41/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-24/advisory"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-25/advisory"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-27/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-28/advisory"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-29/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-30/advisory"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/secunia_research/2006-32/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-33/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-36/advisory"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-38/advisory"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/secunia_research/2006-46/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/secunia_research/2006-50/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/49"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1014863"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015852"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016011"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016012"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016065"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016066"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016088"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016114"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016115"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016177"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016257"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016512"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/25129"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/14759"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19884"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1565"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1577"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1611"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1681"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1694"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1725"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1775"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1797"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1835"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1836"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2047"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2184"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2824"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3495"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19454"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19458"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19581"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19596"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19834"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19890"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19931"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19938"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19967"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19975"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19977"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20270"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/secunia_research/2005-41/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-24/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-25/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-27/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-28/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-29/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-30/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/secunia_research/2006-32/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-33/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-36/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-38/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/secunia_research/2006-46/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/secunia_research/2006-50/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/49"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1014863"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015852"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016065"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016066"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016088"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016177"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016512"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/25129"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/14759"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19884"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1565"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1577"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1611"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1681"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1725"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1775"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1797"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1835"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1836"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2824"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3495"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…