Search criteria

6 vulnerabilities found for grabit by shemes

FKIE_CVE-2010-10001

Vulnerability from fkie_nvd - Published: 2022-03-28 21:15 - Updated: 2024-11-21 01:13
Summary
A vulnerability, which was classified as problematic, was found in Shemes GrabIt up to 1.7.2 Beta 4. This affects the component NZB Date Parser. The manipulation of the argument date with the input 1000000000000000 as part of a NZB File leads to a denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Impacted products
Vendor Product Version
shemes grabit *
shemes grabit 1.7.2
shemes grabit 1.7.2
shemes grabit 1.7.2
shemes grabit 1.7.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:shemes:grabit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0E18FD-FC92-4C4F-95DD-EAF6AD60AD24",
              "versionEndExcluding": "1.7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.7.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B60949D3-D24E-44D2-B727-6B8DBC454B99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.7.2:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "74D3B18C-2150-4ED1-8DB5-3F5EE156FE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.7.2:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "299581BC-D948-4337-AD8E-90B5499BBC25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.7.2:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8F215A84-1E1E-49F8-AC75-9324F4BA9964",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability, which was classified as problematic, was found in Shemes GrabIt up to 1.7.2 Beta 4. This affects the component NZB Date Parser. The manipulation of the argument date with the input 1000000000000000 as part of a NZB File leads to a denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado una vulnerabilidad, clasificada como problem\u00e1tica, en Shemes GrabIt versiones hasta 1.7.2 Beta 4. Esto afecta al componente NZB Date Parser. La manipulaci\u00f3n del argumento date con la entrada 1000000000000000 como parte de un archivo NZB conlleva a una denegaci\u00f3n de servicio. Es posible iniciar el ataque de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede ser usada"
    }
  ],
  "id": "CVE-2010-10001",
  "lastModified": "2024-11-21T01:13:23.047",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "cna@vuldb.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-28T21:15:08.177",
  "references": [
    {
      "source": "cna@vuldb.com",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/bugtraq/2010/Jul/60"
    },
    {
      "source": "cna@vuldb.com",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "https://vuldb.com/?id.4143"
    },
    {
      "source": "cna@vuldb.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/bugtraq/2010/Jul/60"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "https://vuldb.com/?id.4143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
    }
  ],
  "sourceIdentifier": "cna@vuldb.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-404"
        }
      ],
      "source": "cna@vuldb.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-404"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-1586

Vulnerability from fkie_nvd - Published: 2009-05-07 23:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file.
References
cve@mitre.orghttp://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html
cve@mitre.orghttp://osvdb.org/54205
cve@mitre.orghttp://secunia.com/advisories/34893Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/503184/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/34807
cve@mitre.orghttp://www.securitytracker.com/id?1022161
cve@mitre.orghttp://www.shemes.com/index.php?p=whatsnewPatch, Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1243Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/50310
cve@mitre.orghttps://www.exploit-db.com/exploits/8612
af854a3a-2127-422b-91ae-364da2661108http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/54205
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34893Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/503184/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34807
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1022161
af854a3a-2127-422b-91ae-364da2661108http://www.shemes.com/index.php?p=whatsnewPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1243Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/50310
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/8612
Impacted products
Vendor Product Version
shemes grabit *
shemes grabit 1.5.0
shemes grabit 1.5.1
shemes grabit 1.5.2
shemes grabit 1.5.3
shemes grabit 1.6.1
shemes grabit 1.6.2
shemes grabit 1.7.1
shemes grabit 1.7.2
shemes grabit 1.7.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:shemes:grabit:*:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "63D3C24A-9303-4A37-B283-0B255B039C6B",
              "versionEndIncluding": "1.7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.5.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "AF4FAFF4-AAAB-4487-99DC-93BB84214FEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.5.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "EFCE0B20-A57A-43CB-85E0-11FAECB4AEED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.5.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "C97E45F1-18EA-4259-867E-9C5339F2F43C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.5.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "D56088FE-7CE2-4061-8ADB-A77F3EC7DF4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.6.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8ACA2866-0BB6-4D47-95B7-0AFF898D7D50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.6.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "280FAAD8-687C-43B4-9912-766AF3C3D074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.7.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "5D34BC0B-2402-4562-B1AA-CBC72C6EF5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.7.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B60949D3-D24E-44D2-B727-6B8DBC454B99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:shemes:grabit:1.7.2:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "74D3B18C-2150-4ED1-8DB5-3F5EE156FE95",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en la caracter\u00edstica del importador NZB en GrabIt 1.7.2 Beta 3 y anteriores, que permite a los atacantes remotos ejecutar arbitrariamente c\u00f3digo a trav\u00e9s de referencias DTD manipulada en un elemento DOCTYPE en un archivo NZB."
    }
  ],
  "id": "CVE-2009-1586",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-05-07T23:30:00.390",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/54205"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34893"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/503184/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34807"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1022161"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.shemes.com/index.php?p=whatsnew"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1243"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50310"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/8612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/54205"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34893"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/503184/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34807"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1022161"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.shemes.com/index.php?p=whatsnew"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1243"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/8612"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2010-10001 (GCVE-0-2010-10001)

Vulnerability from cvelistv5 – Published: 2022-03-28 20:45 – Updated: 2025-04-15 14:45
VLAI?
Summary
A vulnerability, which was classified as problematic, was found in Shemes GrabIt up to 1.7.2 Beta 4. This affects the component NZB Date Parser. The manipulation of the argument date with the input 1000000000000000 as part of a NZB File leads to a denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CWE
Assigner
Impacted products
Vendor Product Version
Shemes GrabIt Affected: 1.7.2 Beta 4
Create a notification for this product.
Credits
Marc Ruef
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:17:10.458Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?id.4143"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/bugtraq/2010/Jul/60"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2010-10001",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-14T16:56:55.540267Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-15T14:45:09.752Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "GrabIt",
          "vendor": "Shemes",
          "versions": [
            {
              "status": "affected",
              "version": "1.7.2 Beta 4"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Marc Ruef"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability, which was classified as problematic, was found in Shemes GrabIt up to 1.7.2 Beta 4. This affects the component NZB Date Parser. The manipulation of the argument date with the input 1000000000000000 as part of a NZB File leads to a denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-404",
              "description": "CWE-404 Denial of Service",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-28T20:45:50.000Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://vuldb.com/?id.4143"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://seclists.org/bugtraq/2010/Jul/60"
        }
      ],
      "title": "Shemes GrabIt NZB Date Parser denial of service",
      "x_generator": "vuldb.com",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cna@vuldb.com",
          "ID": "CVE-2010-10001",
          "REQUESTER": "cna@vuldb.com",
          "STATE": "PUBLIC",
          "TITLE": "Shemes GrabIt NZB Date Parser denial of service"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "GrabIt",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.7.2 Beta 4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Shemes"
              }
            ]
          }
        },
        "credit": "Marc Ruef",
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability, which was classified as problematic, was found in Shemes GrabIt up to 1.7.2 Beta 4. This affects the component NZB Date Parser. The manipulation of the argument date with the input 1000000000000000 as part of a NZB File leads to a denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
            }
          ]
        },
        "generator": "vuldb.com",
        "impact": {
          "cvss": {
            "baseScore": "5.3",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-404 Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://vuldb.com/?id.4143",
              "refsource": "MISC",
              "url": "https://vuldb.com/?id.4143"
            },
            {
              "name": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt",
              "refsource": "MISC",
              "url": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
            },
            {
              "name": "http://seclists.org/bugtraq/2010/Jul/60",
              "refsource": "MISC",
              "url": "http://seclists.org/bugtraq/2010/Jul/60"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2010-10001",
    "datePublished": "2022-03-28T20:45:50.000Z",
    "dateReserved": "2022-01-28T00:00:00.000Z",
    "dateUpdated": "2025-04-15T14:45:09.752Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1586 (GCVE-0-2009-1586)

Vulnerability from cvelistv5 – Published: 2009-05-07 23:00 – Updated: 2024-08-07 05:20
VLAI?
Summary
Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.shemes.com/index.php?p=whatsnew x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://blog.teusink.net/2009/05/grabit-172-beta-3… x_refsource_MISC
http://www.securityfocus.com/archive/1/503184/100… mailing-listx_refsource_BUGTRAQ
http://www.securitytracker.com/id?1022161 vdb-entryx_refsource_SECTRACK
https://www.exploit-db.com/exploits/8612 exploitx_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/34807 vdb-entryx_refsource_BID
http://secunia.com/advisories/34893 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/54205 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2009/1243 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:20:34.575Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.shemes.com/index.php?p=whatsnew"
          },
          {
            "name": "grabit-nzb-bo(50310)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50310"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html"
          },
          {
            "name": "20090503 Grabit \u003c= 1.7.2 beta 3 NZB file parsing stack overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/503184/100/0/threaded"
          },
          {
            "name": "1022161",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022161"
          },
          {
            "name": "8612",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/8612"
          },
          {
            "name": "34807",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34807"
          },
          {
            "name": "34893",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34893"
          },
          {
            "name": "54205",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/54205"
          },
          {
            "name": "ADV-2009-1243",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1243"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-05-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.shemes.com/index.php?p=whatsnew"
        },
        {
          "name": "grabit-nzb-bo(50310)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50310"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html"
        },
        {
          "name": "20090503 Grabit \u003c= 1.7.2 beta 3 NZB file parsing stack overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/503184/100/0/threaded"
        },
        {
          "name": "1022161",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022161"
        },
        {
          "name": "8612",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/8612"
        },
        {
          "name": "34807",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34807"
        },
        {
          "name": "34893",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34893"
        },
        {
          "name": "54205",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/54205"
        },
        {
          "name": "ADV-2009-1243",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1243"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1586",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.shemes.com/index.php?p=whatsnew",
              "refsource": "CONFIRM",
              "url": "http://www.shemes.com/index.php?p=whatsnew"
            },
            {
              "name": "grabit-nzb-bo(50310)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50310"
            },
            {
              "name": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html",
              "refsource": "MISC",
              "url": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html"
            },
            {
              "name": "20090503 Grabit \u003c= 1.7.2 beta 3 NZB file parsing stack overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/503184/100/0/threaded"
            },
            {
              "name": "1022161",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022161"
            },
            {
              "name": "8612",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/8612"
            },
            {
              "name": "34807",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34807"
            },
            {
              "name": "34893",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34893"
            },
            {
              "name": "54205",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/54205"
            },
            {
              "name": "ADV-2009-1243",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1243"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1586",
    "datePublished": "2009-05-07T23:00:00",
    "dateReserved": "2009-05-07T00:00:00",
    "dateUpdated": "2024-08-07T05:20:34.575Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-10001 (GCVE-0-2010-10001)

Vulnerability from nvd – Published: 2022-03-28 20:45 – Updated: 2025-04-15 14:45
VLAI?
Summary
A vulnerability, which was classified as problematic, was found in Shemes GrabIt up to 1.7.2 Beta 4. This affects the component NZB Date Parser. The manipulation of the argument date with the input 1000000000000000 as part of a NZB File leads to a denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CWE
Assigner
Impacted products
Vendor Product Version
Shemes GrabIt Affected: 1.7.2 Beta 4
Create a notification for this product.
Credits
Marc Ruef
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:17:10.458Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?id.4143"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/bugtraq/2010/Jul/60"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2010-10001",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-14T16:56:55.540267Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-15T14:45:09.752Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "GrabIt",
          "vendor": "Shemes",
          "versions": [
            {
              "status": "affected",
              "version": "1.7.2 Beta 4"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Marc Ruef"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability, which was classified as problematic, was found in Shemes GrabIt up to 1.7.2 Beta 4. This affects the component NZB Date Parser. The manipulation of the argument date with the input 1000000000000000 as part of a NZB File leads to a denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-404",
              "description": "CWE-404 Denial of Service",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-28T20:45:50.000Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://vuldb.com/?id.4143"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://seclists.org/bugtraq/2010/Jul/60"
        }
      ],
      "title": "Shemes GrabIt NZB Date Parser denial of service",
      "x_generator": "vuldb.com",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cna@vuldb.com",
          "ID": "CVE-2010-10001",
          "REQUESTER": "cna@vuldb.com",
          "STATE": "PUBLIC",
          "TITLE": "Shemes GrabIt NZB Date Parser denial of service"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "GrabIt",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.7.2 Beta 4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Shemes"
              }
            ]
          }
        },
        "credit": "Marc Ruef",
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability, which was classified as problematic, was found in Shemes GrabIt up to 1.7.2 Beta 4. This affects the component NZB Date Parser. The manipulation of the argument date with the input 1000000000000000 as part of a NZB File leads to a denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
            }
          ]
        },
        "generator": "vuldb.com",
        "impact": {
          "cvss": {
            "baseScore": "5.3",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-404 Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://vuldb.com/?id.4143",
              "refsource": "MISC",
              "url": "https://vuldb.com/?id.4143"
            },
            {
              "name": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt",
              "refsource": "MISC",
              "url": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
            },
            {
              "name": "http://seclists.org/bugtraq/2010/Jul/60",
              "refsource": "MISC",
              "url": "http://seclists.org/bugtraq/2010/Jul/60"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2010-10001",
    "datePublished": "2022-03-28T20:45:50.000Z",
    "dateReserved": "2022-01-28T00:00:00.000Z",
    "dateUpdated": "2025-04-15T14:45:09.752Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1586 (GCVE-0-2009-1586)

Vulnerability from nvd – Published: 2009-05-07 23:00 – Updated: 2024-08-07 05:20
VLAI?
Summary
Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.shemes.com/index.php?p=whatsnew x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://blog.teusink.net/2009/05/grabit-172-beta-3… x_refsource_MISC
http://www.securityfocus.com/archive/1/503184/100… mailing-listx_refsource_BUGTRAQ
http://www.securitytracker.com/id?1022161 vdb-entryx_refsource_SECTRACK
https://www.exploit-db.com/exploits/8612 exploitx_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/34807 vdb-entryx_refsource_BID
http://secunia.com/advisories/34893 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/54205 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2009/1243 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:20:34.575Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.shemes.com/index.php?p=whatsnew"
          },
          {
            "name": "grabit-nzb-bo(50310)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50310"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html"
          },
          {
            "name": "20090503 Grabit \u003c= 1.7.2 beta 3 NZB file parsing stack overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/503184/100/0/threaded"
          },
          {
            "name": "1022161",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022161"
          },
          {
            "name": "8612",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/8612"
          },
          {
            "name": "34807",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34807"
          },
          {
            "name": "34893",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34893"
          },
          {
            "name": "54205",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/54205"
          },
          {
            "name": "ADV-2009-1243",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1243"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-05-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.shemes.com/index.php?p=whatsnew"
        },
        {
          "name": "grabit-nzb-bo(50310)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50310"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html"
        },
        {
          "name": "20090503 Grabit \u003c= 1.7.2 beta 3 NZB file parsing stack overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/503184/100/0/threaded"
        },
        {
          "name": "1022161",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022161"
        },
        {
          "name": "8612",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/8612"
        },
        {
          "name": "34807",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34807"
        },
        {
          "name": "34893",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34893"
        },
        {
          "name": "54205",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/54205"
        },
        {
          "name": "ADV-2009-1243",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1243"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1586",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.shemes.com/index.php?p=whatsnew",
              "refsource": "CONFIRM",
              "url": "http://www.shemes.com/index.php?p=whatsnew"
            },
            {
              "name": "grabit-nzb-bo(50310)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50310"
            },
            {
              "name": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html",
              "refsource": "MISC",
              "url": "http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html"
            },
            {
              "name": "20090503 Grabit \u003c= 1.7.2 beta 3 NZB file parsing stack overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/503184/100/0/threaded"
            },
            {
              "name": "1022161",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022161"
            },
            {
              "name": "8612",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/8612"
            },
            {
              "name": "34807",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34807"
            },
            {
              "name": "34893",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34893"
            },
            {
              "name": "54205",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/54205"
            },
            {
              "name": "ADV-2009-1243",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1243"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1586",
    "datePublished": "2009-05-07T23:00:00",
    "dateReserved": "2009-05-07T00:00:00",
    "dateUpdated": "2024-08-07T05:20:34.575Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}