Search criteria
6 vulnerabilities found for httrack by httrack
FKIE_CVE-2010-5252
Vulnerability from fkie_nvd - Published: 2012-09-07 10:32 - Updated: 2025-04-11 00:51
Severity ?
Summary
Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:httrack:httrack:3.43-9:*:*:*:*:*:*:*",
"matchCriteriaId": "6801122C-119A-4AE0-B6FE-4221AC601299",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "Vulnerabilidad de ruta de b\u00fasqueda no confiable en HTTrack v3.43-9, permite a usuarios locales ganar privilegios a trav\u00e9s de un archivo de caballo de troya httrack-plugin.dll en el directorio de trabajo actual, como se demostr\u00f3 con un directorio que contiene un archivo .whtt. NOTA: algunos de estos detalles han sido obtenidos de fuentes de terceros."
}
],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html \u0027CWE-426 Untrusted Search Path\u0027",
"id": "CVE-2010-5252",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2012-09-07T10:32:22.493",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/41224"
},
{
"source": "cve@mitre.org",
"url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/41224"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-3429
Vulnerability from fkie_nvd - Published: 2008-07-31 22:41 - Updated: 2025-04-09 00:30
Severity ?
Summary
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:httrack:httrack:0.23:beta-2:*:*:*:*:*:*",
"matchCriteriaId": "30A61DED-D601-4FCD-82A8-9AA0F6660D06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:0.24:beta-2:*:*:*:*:*:*",
"matchCriteriaId": "CA9DC545-4B39-4135-8F42-3A2A4C25D5F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:0.25:beta-2:*:*:*:*:*:*",
"matchCriteriaId": "5B492CFE-25C8-466D-848C-F0E606677882",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:0.99:beta-2:*:*:*:*:*:*",
"matchCriteriaId": "E3666C84-2626-453B-80AA-3712CEDFC40F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:0.996:beta-2:*:*:*:*:*:*",
"matchCriteriaId": "31CAA471-A9D5-44A2-96A4-03E54B1307D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:0.997:beta-2:*:*:*:*:*:*",
"matchCriteriaId": "C18F4201-8FDD-45E3-891C-BEABC91B5132",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:0.998:beta-2:*:*:*:*:*:*",
"matchCriteriaId": "8EAC0EC7-9FFE-4F57-B9EC-E8744C8C1876",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "55CE92DE-889F-4219-A20B-1658FD1A20D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "C7FDCAC6-5142-4730-B823-E2F2AC002C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.02:*:*:*:*:*:*:*",
"matchCriteriaId": "69198DB6-723E-45F0-BDD8-D6106EA432EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.03:*:*:*:*:*:*:*",
"matchCriteriaId": "AD90479B-84F3-45A7-AA68-FA0B6A5D14C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.04:*:*:*:*:*:*:*",
"matchCriteriaId": "97354343-B565-4CC1-B2EF-883F7AE2A81F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2B4BAAF0-714D-4FD6-9FEE-F68391E07CD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.10:b:*:*:*:*:*:*",
"matchCriteriaId": "90C3786A-6F46-40A9-B51C-4D2D153B8760",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.10:c:*:*:*:*:*:*",
"matchCriteriaId": "93863B08-5B94-4952-A1FA-0E7CA7544C2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.10:d:*:*:*:*:*:*",
"matchCriteriaId": "5BC576E1-A95F-4B2B-ADE7-F52CB25F647E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.10:e:*:*:*:*:*:*",
"matchCriteriaId": "3F0289D6-58C3-40C6-87AB-FEBF45AF327B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E53081E7-F8D1-458A-AD2C-2E1AA79B7B7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5FADF089-961C-469C-A333-353B1CD308FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.15:b:*:*:*:*:*:*",
"matchCriteriaId": "EBEE9FDE-FC46-43A8-8253-954B61B88A47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "CF625B94-9204-4CDF-93BA-AC785087DA80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.16:b:*:*:*:*:*:*",
"matchCriteriaId": "161231F6-F21F-4D2F-AE63-B321EC8E0578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "EB14522C-7783-4A9A-8A0E-B8D5D39049CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "08487F25-62EE-4873-A641-E3C6012C3FEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "CB814FD0-A59F-4D95-B595-18A034747385",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "04F142B1-2646-4725-B926-44F2734C06A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "2EE56720-C089-45EA-8173-2BC3B9BCEE51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "3A59CE6D-77AC-4111-A106-09F68F14EE31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:2.00:*:*:*:*:*:*:*",
"matchCriteriaId": "22047DC8-7DA0-4DB9-B806-60901262F49E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "18447927-A5B0-44A3-B346-C24F8A456945",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E218C652-ABB0-4445-8FF7-28CC59DD311D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:2.02:*:*:*:*:*:*:*",
"matchCriteriaId": "2E4CD38B-9F65-4A79-A44A-9B5C002125AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.00:*:*:*:*:*:*:*",
"matchCriteriaId": "E741EEE4-0ED4-4AF1-A7C3-D978B32194D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "E4B90D7C-E458-4C24-A0E7-494DA3837948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "68B488E1-EF0D-4A0E-9E26-12742EFE54E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.03:*:*:*:*:*:*:*",
"matchCriteriaId": "5760D8D4-9879-462A-ADBD-8D3DEEDF87E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "44BDC99D-71E2-474F-BE92-CC2560B10BCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.05:*:*:*:*:*:*:*",
"matchCriteriaId": "61DB5944-DADF-47BF-9064-DAFCB2DE6F5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.06:*:*:*:*:*:*:*",
"matchCriteriaId": "3F25BDEC-93ED-47D6-829D-7E6CB9EF563C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.07:*:*:*:*:*:*:*",
"matchCriteriaId": "4763A337-1E82-45CF-AF95-4B189EF47354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.08:*:*:*:*:*:*:*",
"matchCriteriaId": "6FAF9C77-2D09-49AE-8301-5A96064EEFAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.09:*:*:*:*:*:*:*",
"matchCriteriaId": "38B428DE-8023-449B-8619-41044F82A5ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A79F6982-3519-495E-A7A0-B3096F3D8C30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF5CB5E-8768-412C-9B41-A870F2BDEDCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.16:2:*:*:*:*:*:*",
"matchCriteriaId": "5E11ADCD-CA49-4AA9-BF64-ACA01FF85936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.20:2:*:*:*:*:*:*",
"matchCriteriaId": "BEDB7060-F385-49B7-B547-F4670F5971F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.21:8:*:*:*:*:*:*",
"matchCriteriaId": "DE1176AC-D41F-4A94-84C4-3F5FD1D9772B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.22:3:*:*:*:*:*:*",
"matchCriteriaId": "2C5B81B7-0F69-4577-8DFD-623C783B93B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.23:*:*:*:*:*:*:*",
"matchCriteriaId": "EBE90318-8B47-4AB6-9EF0-59A03AEC3EA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.30:*:*:*:*:*:*:*",
"matchCriteriaId": "AE97BF0A-4B4D-494C-A997-36E7449E1FE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.31:*:*:*:*:*:*:*",
"matchCriteriaId": "2ACD1DA3-AA16-4127-AC1B-157BE695B8B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.32:*:*:*:*:*:*:*",
"matchCriteriaId": "9D175651-5CD6-4477-8496-55C4E963BF27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.33:*:*:*:*:*:*:*",
"matchCriteriaId": "D8ACAA7A-7D8A-44F4-987F-E71C284B84F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.40:*:*:*:*:*:*:*",
"matchCriteriaId": "A7BFB002-F9A0-46A7-BDC2-E1BFB54B5342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.40:2:*:*:*:*:*:*",
"matchCriteriaId": "B09BE206-FEDA-46ED-9027-0E3D6DEF33F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.41:*:*:*:*:*:*:*",
"matchCriteriaId": "CEEAA51F-5405-457E-912D-04A750C61C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.41:2:*:*:*:*:*:*",
"matchCriteriaId": "96470815-113A-4874-B3C2-B1BD42E5D61F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.41:3:*:*:*:*:*:*",
"matchCriteriaId": "016617B2-E181-4732-9F6D-107679371624",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.42:*:*:*:*:*:*:*",
"matchCriteriaId": "0865F74D-87A9-429A-BEF7-02E145DB4698",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.42:2:*:*:*:*:*:*",
"matchCriteriaId": "3D350B62-3894-4708-AB36-A53C95B529E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:httrack:3.42:3:*:*:*:*:*:*",
"matchCriteriaId": "E44DE8C5-FD50-410C-B3BA-3C4A4CA05173",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:*:2:*:*:*:*:*:*",
"matchCriteriaId": "D198D5DD-FCA6-4146-A128-6B08B60668F6",
"versionEndIncluding": "3.42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:0.23:beta-2:*:*:*:*:*:*",
"matchCriteriaId": "4F24FD93-7F69-4AD2-A3C0-4A58E2427204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:0.24:beta-2:*:*:*:*:*:*",
"matchCriteriaId": "C66E9B9A-7752-4ACB-8E70-15C5A5CF9FD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:0.25:beta-2:*:*:*:*:*:*",
"matchCriteriaId": "5C50FA58-D0E8-4EF4-993B-BFFFBCD31A95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:0.99:beta-2:*:*:*:*:*:*",
"matchCriteriaId": "9AA15A17-3D5B-431F-85F7-719D16C51C6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:0.996:beta-2:*:*:*:*:*:*",
"matchCriteriaId": "23668163-813E-4A0A-8F5A-AFF8B72E641F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:0.997:beta-2:*:*:*:*:*:*",
"matchCriteriaId": "946CF2C4-AC27-4D6E-84CA-119BBDC586F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:0.998:beta-2:*:*:*:*:*:*",
"matchCriteriaId": "4B210EC5-5CE5-4C29-996C-0EB1145A359F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "28CB654C-5A0A-4AD2-A7E4-E5FBD41AD111",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "EA4F9850-1F0F-44E9-913A-97EB742E8510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.02:*:*:*:*:*:*:*",
"matchCriteriaId": "DA284FCF-8AC4-4218-8115-FB41366F81DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.03:*:*:*:*:*:*:*",
"matchCriteriaId": "D6420DCD-72DE-4597-B961-DB06972F6A59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.04:*:*:*:*:*:*:*",
"matchCriteriaId": "20F3C4AE-3824-4130-A84C-8358A7D621DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "CDB91A73-0E5A-4592-81F3-62A8A578DC57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.10:b:*:*:*:*:*:*",
"matchCriteriaId": "D3DE24C3-34D2-409A-BD35-5D1A1C8C285E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.10:c:*:*:*:*:*:*",
"matchCriteriaId": "4EFCAE76-7B19-4DF6-8700-24A2F36FBC30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.10:d:*:*:*:*:*:*",
"matchCriteriaId": "821397D4-2184-45B6-A5E0-0518081E1B80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.10:e:*:*:*:*:*:*",
"matchCriteriaId": "FD774253-68B9-450B-9C5F-802034C84A8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7282DC66-01CD-49F6-9FAD-70C8EA443687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5D6AA4B8-BE17-4DDD-8F7A-55543EE5306C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "F5CFFF64-2974-4510-8B44-6C8C4752E31F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.16:b:*:*:*:*:*:*",
"matchCriteriaId": "6F3FA036-18A8-40DC-B8E4-7EC2977032FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "FE067177-2009-445E-A730-54575F8BA6D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "478DFB57-B1C8-4282-8526-5127DEE18EE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "A7E08DB9-A53D-41E5-A3BB-442BB68B6ADF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "AC5E2B53-73BC-4648-8F63-79631F1F1790",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE21A00-F336-46E1-9521-B3BF57EBD291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92B8F5-F37F-4FF4-8BD6-7921976CF014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:2.00:*:*:*:*:*:*:*",
"matchCriteriaId": "87BB4DCA-7F63-4AFF-9EFE-765CC88EAB70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "74C2DFB0-8BD4-40F0-892A-BB03B2B79836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:2.02:*:*:*:*:*:*:*",
"matchCriteriaId": "62AC39F4-3466-4B3B-80C1-C01A72F144A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CA18C300-3602-4734-93BB-D8A32D01F34B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.00:*:*:*:*:*:*:*",
"matchCriteriaId": "60A398DC-CDCF-4727-8983-07E343B9D1FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "2B3F0900-1592-45EE-BC34-68945653EAD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "3EA680DA-A9DD-4B01-A036-CCD2C2752D6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.03:*:*:*:*:*:*:*",
"matchCriteriaId": "D91198C2-64AD-420D-B527-CD98209FC1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "5A7DE353-7A3F-4BEF-AD85-4710BEC1B322",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.05:*:*:*:*:*:*:*",
"matchCriteriaId": "150EDF01-496C-4BEB-97FF-FE8FD424A399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.06:*:*:*:*:*:*:*",
"matchCriteriaId": "F44A791C-B9C3-4298-9C7B-1AEEE28688AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.07:*:*:*:*:*:*:*",
"matchCriteriaId": "C2CB13FD-9E4B-4816-B246-0E26B62378E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.08:*:*:*:*:*:*:*",
"matchCriteriaId": "0E3F8937-6978-4DCD-ADAD-F95B235944CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.09:*:*:*:*:*:*:*",
"matchCriteriaId": "431E48C8-A9A1-4B3F-B1D0-D658CB44C1F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "44BE5DB7-077A-4B91-9184-A81032B08692",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "4EC15A35-E68D-46DF-BAC7-3AB39CDE0D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.15:b:*:*:*:*:*:*",
"matchCriteriaId": "312C47AB-4AD2-4600-B0BD-7C34524F1522",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.16:2:*:*:*:*:*:*",
"matchCriteriaId": "616DB4E3-C1FB-4DFC-9F98-4510A468EC21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.20:2:*:*:*:*:*:*",
"matchCriteriaId": "EA77BC82-49AF-4797-AF8A-BABD0671F31D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.21:8:*:*:*:*:*:*",
"matchCriteriaId": "60D8BD06-43BF-496B-9A0F-5FF66BA0D3F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.22:3:*:*:*:*:*:*",
"matchCriteriaId": "B876EC8A-9A8D-42AB-B4F3-E9ECF3375831",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.23:*:*:*:*:*:*:*",
"matchCriteriaId": "DE2E7FB6-4A9E-431E-9504-6C8EC86A6B62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.30:*:*:*:*:*:*:*",
"matchCriteriaId": "219939CD-3530-4CC5-8C2E-69162E692FC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.31:*:*:*:*:*:*:*",
"matchCriteriaId": "47B23265-E4C3-415C-A083-61891EE3860E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.32:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A821F7-256E-4749-9294-A2627D40DB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.33:*:*:*:*:*:*:*",
"matchCriteriaId": "4196933D-B459-4AC9-A5A1-E6E8CC410572",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.40:*:*:*:*:*:*:*",
"matchCriteriaId": "53472D88-F355-48A3-BE7E-596EFC0F3727",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.40:2:*:*:*:*:*:*",
"matchCriteriaId": "F7A1751D-5C49-4996-8D5F-496774A8EA85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.41:*:*:*:*:*:*:*",
"matchCriteriaId": "0BAF3263-D5F8-40F9-9A9C-2721225BC14B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.41:2:*:*:*:*:*:*",
"matchCriteriaId": "722AB21A-96C6-4FD7-9297-F62B933D4203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.41:3:*:*:*:*:*:*",
"matchCriteriaId": "CA434245-AC94-4A81-BF70-E359CB57265A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:httrack:winhttrack:3.42:*:*:*:*:*:*:*",
"matchCriteriaId": "91E5F413-6040-4BF7-88AB-E08C7FCFCCFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL."
},
{
"lang": "es",
"value": "Desbordamiento de Buffer en el procesado de URI de HTTrack y WinHTTrack versiones anteriores a la 3.42-3, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrariamente mediante una URL larga."
}
],
"id": "CVE-2008-3429",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2008-07-31T22:41:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/31323/"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/31380"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/31866"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2008/dsa-1626"
},
{
"source": "cve@mitre.org",
"url": "http://www.httrack.com/history.txt"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/30425"
},
{
"source": "cve@mitre.org",
"url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/2221/references"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31323/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31380"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31866"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1626"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.httrack.com/history.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/30425"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/2221/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2010-5252 (GCVE-0-2010-5252)
Vulnerability from cvelistv5 – Published: 2012-09-07 10:00 – Updated: 2024-09-17 01:45
VLAI?
Summary
Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:17:10.153Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/"
},
{
"name": "41224",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/41224"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-09-07T10:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/"
},
{
"name": "41224",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/41224"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-5252",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/",
"refsource": "MISC",
"url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/"
},
{
"name": "41224",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41224"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-5252",
"datePublished": "2012-09-07T10:00:00Z",
"dateReserved": "2012-09-07T00:00:00Z",
"dateUpdated": "2024-09-17T01:45:39.811Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-3429 (GCVE-0-2008-3429)
Vulnerability from cvelistv5 – Published: 2008-07-31 22:00 – Updated: 2024-08-07 09:37
VLAI?
Summary
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:37:26.948Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "httrack-urls-bo(44167)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.httrack.com/history.txt"
},
{
"name": "ADV-2008-2221",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2221/references"
},
{
"name": "DSA-1626",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1626"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
},
{
"name": "31323",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31323/"
},
{
"name": "30425",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30425"
},
{
"name": "FEDORA-2008-7896",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
},
{
"name": "FEDORA-2008-7862",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
},
{
"name": "31866",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31866"
},
{
"name": "31380",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31380"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-07-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "httrack-urls-bo(44167)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.httrack.com/history.txt"
},
{
"name": "ADV-2008-2221",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2221/references"
},
{
"name": "DSA-1626",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1626"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
},
{
"name": "31323",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31323/"
},
{
"name": "30425",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30425"
},
{
"name": "FEDORA-2008-7896",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
},
{
"name": "FEDORA-2008-7862",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
},
{
"name": "31866",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31866"
},
{
"name": "31380",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31380"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-3429",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "httrack-urls-bo(44167)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
},
{
"name": "http://www.httrack.com/history.txt",
"refsource": "CONFIRM",
"url": "http://www.httrack.com/history.txt"
},
{
"name": "ADV-2008-2221",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2221/references"
},
{
"name": "DSA-1626",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1626"
},
{
"name": "http://www.venustech.com.cn/NewsInfo/124/2032.Html",
"refsource": "MISC",
"url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
},
{
"name": "31323",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31323/"
},
{
"name": "30425",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30425"
},
{
"name": "FEDORA-2008-7896",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
},
{
"name": "FEDORA-2008-7862",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
},
{
"name": "31866",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31866"
},
{
"name": "31380",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31380"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-3429",
"datePublished": "2008-07-31T22:00:00",
"dateReserved": "2008-07-31T00:00:00",
"dateUpdated": "2024-08-07T09:37:26.948Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-5252 (GCVE-0-2010-5252)
Vulnerability from nvd – Published: 2012-09-07 10:00 – Updated: 2024-09-17 01:45
VLAI?
Summary
Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:17:10.153Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/"
},
{
"name": "41224",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/41224"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-09-07T10:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/"
},
{
"name": "41224",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/41224"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-5252",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/",
"refsource": "MISC",
"url": "http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/"
},
{
"name": "41224",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41224"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-5252",
"datePublished": "2012-09-07T10:00:00Z",
"dateReserved": "2012-09-07T00:00:00Z",
"dateUpdated": "2024-09-17T01:45:39.811Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-3429 (GCVE-0-2008-3429)
Vulnerability from nvd – Published: 2008-07-31 22:00 – Updated: 2024-08-07 09:37
VLAI?
Summary
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:37:26.948Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "httrack-urls-bo(44167)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.httrack.com/history.txt"
},
{
"name": "ADV-2008-2221",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2221/references"
},
{
"name": "DSA-1626",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1626"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
},
{
"name": "31323",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31323/"
},
{
"name": "30425",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30425"
},
{
"name": "FEDORA-2008-7896",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
},
{
"name": "FEDORA-2008-7862",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
},
{
"name": "31866",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31866"
},
{
"name": "31380",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31380"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-07-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "httrack-urls-bo(44167)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.httrack.com/history.txt"
},
{
"name": "ADV-2008-2221",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2221/references"
},
{
"name": "DSA-1626",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1626"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
},
{
"name": "31323",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31323/"
},
{
"name": "30425",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30425"
},
{
"name": "FEDORA-2008-7896",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
},
{
"name": "FEDORA-2008-7862",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
},
{
"name": "31866",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31866"
},
{
"name": "31380",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31380"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-3429",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "httrack-urls-bo(44167)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
},
{
"name": "http://www.httrack.com/history.txt",
"refsource": "CONFIRM",
"url": "http://www.httrack.com/history.txt"
},
{
"name": "ADV-2008-2221",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2221/references"
},
{
"name": "DSA-1626",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1626"
},
{
"name": "http://www.venustech.com.cn/NewsInfo/124/2032.Html",
"refsource": "MISC",
"url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
},
{
"name": "31323",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31323/"
},
{
"name": "30425",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30425"
},
{
"name": "FEDORA-2008-7896",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
},
{
"name": "FEDORA-2008-7862",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
},
{
"name": "31866",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31866"
},
{
"name": "31380",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31380"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-3429",
"datePublished": "2008-07-31T22:00:00",
"dateReserved": "2008-07-31T00:00:00",
"dateUpdated": "2024-08-07T09:37:26.948Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}