Search criteria
6 vulnerabilities found for hyper_estraier by hyper_estraier
FKIE_CVE-2006-3671
Vulnerability from fkie_nvd - Published: 2006-07-18 15:47 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in the communicate function in estmaster.c for Hyper Estraier before 1.3.3 allows remote attackers to perform unauthorized actions as other users via unknown vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| hyper_estraier | hyper_estraier | * | |
| hyper_estraier | hyper_estraier | 1.0 | |
| hyper_estraier | hyper_estraier | 1.0.1 | |
| hyper_estraier | hyper_estraier | 1.0.2 | |
| hyper_estraier | hyper_estraier | 1.0.3 | |
| hyper_estraier | hyper_estraier | 1.0.4 | |
| hyper_estraier | hyper_estraier | 1.0.5 | |
| hyper_estraier | hyper_estraier | 1.0.6 | |
| hyper_estraier | hyper_estraier | 1.1.0 | |
| hyper_estraier | hyper_estraier | 1.1.1 | |
| hyper_estraier | hyper_estraier | 1.1.2 | |
| hyper_estraier | hyper_estraier | 1.1.3 | |
| hyper_estraier | hyper_estraier | 1.1.4 | |
| hyper_estraier | hyper_estraier | 1.1.5 | |
| hyper_estraier | hyper_estraier | 1.1.6 | |
| hyper_estraier | hyper_estraier | 1.2.1 | |
| hyper_estraier | hyper_estraier | 1.2.3 | |
| hyper_estraier | hyper_estraier | 1.2.4 | |
| hyper_estraier | hyper_estraier | 1.2.5 | |
| hyper_estraier | hyper_estraier | 1.2.6 | |
| hyper_estraier | hyper_estraier | 1.2.7 | |
| hyper_estraier | hyper_estraier | 1.2.8 | |
| hyper_estraier | hyper_estraier | 1.2.9 | |
| hyper_estraier | hyper_estraier | 1.3.0 | |
| hyper_estraier | hyper_estraier | 1.3.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:*:*:*:*:*:*:*:*",
"matchCriteriaId": "386121B9-2796-4295-BD63-81D1A08C6AE5",
"versionEndIncluding": "1.3.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D04B2883-E8BD-4F9B-ADAE-28BE6981BF0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF37DD5-26D1-4A6A-9A5A-A9F4FB71A70C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1BCB2566-865D-4E5A-A251-FD057AC14939",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DE3BD030-1B79-4578-9D65-D3135BF6BE8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F921F80F-A78B-49EE-86BC-170DF79149D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "498EB12A-17CE-477B-83BB-503A28333A90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "657A881A-5B79-45C5-A78F-8CB914E7E1BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C744DCF-51A5-4FA3-A6E0-5B1FEAAC8FD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9631C3B4-11AE-47F0-AA76-1197B4E15842",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "58C79F3B-1A14-41BB-8FDC-410328B29276",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8C5F7D73-4A09-4CD3-9C42-0E8A17F4B4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ED50041B-A310-46ED-850D-F76F1F685783",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "11CEFB1C-689C-411F-BDCE-B9E05A28DC3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7E7F965E-3C2D-42D3-BD9B-4C2864BBBC51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7614C653-7933-42A0-BCDA-F5F6F32DB48C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CF1850C2-98E6-496B-85B4-40BF8707E763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ADD6D6FE-7D6B-4DE9-AC20-0FF212249D7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "53CA9CB9-A4AA-4632-AC9B-BF5036038E4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "807DE72A-B4A6-4458-AF64-22EFF4FC4871",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EC45692D-30E8-4A99-B46C-B0D1B98F991F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "31210E7A-918F-40B9-B1E1-87C0157F8DD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A78821E6-5806-49EF-BB6C-CA11D649C68D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8539D84-C4B0-4146-ADFB-65E09B68A5F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A91E42C0-14CF-40F4-8EFD-108371FF2B8A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in the communicate function in estmaster.c for Hyper Estraier before 1.3.3 allows remote attackers to perform unauthorized actions as other users via unknown vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en la funci\u00f3n communicate de estmaster.c para Hyper Estraier versiones anteriores a 1.3.3 permite a atacantes remotos realizar acciones no autorizadas como otros usuarios mediante vectores desconocidos."
}
],
"evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nHyper Estraier, Hyper Estraier, 1.3.3",
"id": "CVE-2006-3671",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-07-18T15:47:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21049"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=432119"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/2827"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21049"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=432119"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/2827"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-3421
Vulnerability from fkie_nvd - Published: 2005-11-01 21:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
estcmd in Hyper Estraier 1.0.1 on Windows systems allows remote attackers to read unauthorized files via a crafted search request for a filename that contains Unicode characters.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| hyper_estraier | hyper_estraier | 1.0 | |
| hyper_estraier | hyper_estraier | 1.0.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.0:*:windows:*:*:*:*:*",
"matchCriteriaId": "D37855E6-5DD9-489D-82D5-0E2FBDA87D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper_estraier:hyper_estraier:1.0.1:*:windows:*:*:*:*:*",
"matchCriteriaId": "24BED8E1-AE22-49F5-9DB2-053D0D6D8D50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "estcmd in Hyper Estraier 1.0.1 on Windows systems allows remote attackers to read unauthorized files via a crafted search request for a filename that contains Unicode characters."
}
],
"id": "CVE-2005-3421",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-11-01T21:02:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://jvn.jp/jp/JVN%2318282718/index.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/17379"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1015119"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=366565"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/15236"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/jp/JVN%2318282718/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/17379"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1015119"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=366565"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/15236"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2006-3671 (GCVE-0-2006-3671)
Vulnerability from cvelistv5 – Published: 2006-07-18 01:00 – Updated: 2024-08-07 18:39
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in the communicate function in estmaster.c for Hyper Estraier before 1.3.3 allows remote attackers to perform unauthorized actions as other users via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:39:53.435Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=432119"
},
{
"name": "21049",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21049"
},
{
"name": "ADV-2006-2827",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/2827"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-07-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in the communicate function in estmaster.c for Hyper Estraier before 1.3.3 allows remote attackers to perform unauthorized actions as other users via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-02-26T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=432119"
},
{
"name": "21049",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21049"
},
{
"name": "ADV-2006-2827",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/2827"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-3671",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site request forgery (CSRF) vulnerability in the communicate function in estmaster.c for Hyper Estraier before 1.3.3 allows remote attackers to perform unauthorized actions as other users via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=432119",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=432119"
},
{
"name": "21049",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21049"
},
{
"name": "ADV-2006-2827",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2827"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-3671",
"datePublished": "2006-07-18T01:00:00",
"dateReserved": "2006-07-17T00:00:00",
"dateUpdated": "2024-08-07T18:39:53.435Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-3421 (GCVE-0-2005-3421)
Vulnerability from cvelistv5 – Published: 2005-11-01 21:00 – Updated: 2024-08-07 23:10
VLAI?
Summary
estcmd in Hyper Estraier 1.0.1 on Windows systems allows remote attackers to read unauthorized files via a crafted search request for a filename that contains Unicode characters.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:10:08.829Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "15236",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/15236"
},
{
"name": "17379",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/17379"
},
{
"name": "JVN#18282718",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/jp/JVN%2318282718/index.html"
},
{
"name": "1015119",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015119"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=366565"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-11-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "estcmd in Hyper Estraier 1.0.1 on Windows systems allows remote attackers to read unauthorized files via a crafted search request for a filename that contains Unicode characters."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2008-11-11T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "15236",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/15236"
},
{
"name": "17379",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/17379"
},
{
"name": "JVN#18282718",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/jp/JVN%2318282718/index.html"
},
{
"name": "1015119",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015119"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=366565"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-3421",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "estcmd in Hyper Estraier 1.0.1 on Windows systems allows remote attackers to read unauthorized files via a crafted search request for a filename that contains Unicode characters."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "15236",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15236"
},
{
"name": "17379",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17379"
},
{
"name": "JVN#18282718",
"refsource": "JVN",
"url": "http://jvn.jp/jp/JVN%2318282718/index.html"
},
{
"name": "1015119",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015119"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=366565",
"refsource": "MISC",
"url": "http://sourceforge.net/project/shownotes.php?release_id=366565"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-3421",
"datePublished": "2005-11-01T21:00:00",
"dateReserved": "2005-11-01T00:00:00",
"dateUpdated": "2024-08-07T23:10:08.829Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-3671 (GCVE-0-2006-3671)
Vulnerability from nvd – Published: 2006-07-18 01:00 – Updated: 2024-08-07 18:39
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in the communicate function in estmaster.c for Hyper Estraier before 1.3.3 allows remote attackers to perform unauthorized actions as other users via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:39:53.435Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=432119"
},
{
"name": "21049",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21049"
},
{
"name": "ADV-2006-2827",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/2827"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-07-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in the communicate function in estmaster.c for Hyper Estraier before 1.3.3 allows remote attackers to perform unauthorized actions as other users via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-02-26T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=432119"
},
{
"name": "21049",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21049"
},
{
"name": "ADV-2006-2827",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/2827"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-3671",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site request forgery (CSRF) vulnerability in the communicate function in estmaster.c for Hyper Estraier before 1.3.3 allows remote attackers to perform unauthorized actions as other users via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=432119",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=432119"
},
{
"name": "21049",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21049"
},
{
"name": "ADV-2006-2827",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2827"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-3671",
"datePublished": "2006-07-18T01:00:00",
"dateReserved": "2006-07-17T00:00:00",
"dateUpdated": "2024-08-07T18:39:53.435Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-3421 (GCVE-0-2005-3421)
Vulnerability from nvd – Published: 2005-11-01 21:00 – Updated: 2024-08-07 23:10
VLAI?
Summary
estcmd in Hyper Estraier 1.0.1 on Windows systems allows remote attackers to read unauthorized files via a crafted search request for a filename that contains Unicode characters.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:10:08.829Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "15236",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/15236"
},
{
"name": "17379",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/17379"
},
{
"name": "JVN#18282718",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/jp/JVN%2318282718/index.html"
},
{
"name": "1015119",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015119"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=366565"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-11-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "estcmd in Hyper Estraier 1.0.1 on Windows systems allows remote attackers to read unauthorized files via a crafted search request for a filename that contains Unicode characters."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2008-11-11T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "15236",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/15236"
},
{
"name": "17379",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/17379"
},
{
"name": "JVN#18282718",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/jp/JVN%2318282718/index.html"
},
{
"name": "1015119",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015119"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=366565"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-3421",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "estcmd in Hyper Estraier 1.0.1 on Windows systems allows remote attackers to read unauthorized files via a crafted search request for a filename that contains Unicode characters."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "15236",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15236"
},
{
"name": "17379",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17379"
},
{
"name": "JVN#18282718",
"refsource": "JVN",
"url": "http://jvn.jp/jp/JVN%2318282718/index.html"
},
{
"name": "1015119",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015119"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=366565",
"refsource": "MISC",
"url": "http://sourceforge.net/project/shownotes.php?release_id=366565"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-3421",
"datePublished": "2005-11-01T21:00:00",
"dateReserved": "2005-11-01T00:00:00",
"dateUpdated": "2024-08-07T23:10:08.829Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}