FKIE_CVE-2006-5101

Vulnerability from fkie_nvd - Published: 2006-10-03 04:03 - Updated: 2025-04-09 00:30
Severity ?
Summary
PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter. NOTE: it has been reported that 4.1 versions might also be affected.
References
cve@mitre.orghttp://secunia.com/advisories/22133Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22134Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22135Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22147Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22149Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22151Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22153Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22154Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22157Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22168Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22169Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22170Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/1658
cve@mitre.orghttp://www.osvdb.org/29299
cve@mitre.orghttp://www.osvdb.org/29300
cve@mitre.orghttp://www.osvdb.org/29301
cve@mitre.orghttp://www.osvdb.org/29302
cve@mitre.orghttp://www.osvdb.org/29303
cve@mitre.orghttp://www.osvdb.org/29304
cve@mitre.orghttp://www.osvdb.org/29305
cve@mitre.orghttp://www.osvdb.org/29306
cve@mitre.orghttp://www.osvdb.org/29307
cve@mitre.orghttp://www.osvdb.org/29308
cve@mitre.orghttp://www.osvdb.org/29309
cve@mitre.orghttp://www.osvdb.org/29310
cve@mitre.orghttp://www.osvdb.org/29311
cve@mitre.orghttp://www.securityfocus.com/archive/1/447184/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447185/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447186/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447187/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447188/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447190/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447192/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447193/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447194/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447201/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447207/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447209/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447213/100/0/threaded
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3803
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3804Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3805
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3806
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3807Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3808Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3809Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3810
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3811
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3812
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3813Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3814
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3815Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/29220
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22133Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22134Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22135Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22147Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22149Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22151Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22153Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22154Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22157Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22168Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22169Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22170Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/1658
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29299
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29300
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29301
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29302
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29303
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29304
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29305
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29306
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29307
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29308
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29309
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29310
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29311
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447184/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447185/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447186/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447187/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447188/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447190/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447192/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447193/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447194/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447201/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447207/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447209/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447213/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3803
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3804Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3805
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3806
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3807Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3808Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3809Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3810
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3811
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3812
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3813Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3814
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3815Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/29220
Impacted products
Vendor Product Version
comdev comdev_csv_importer 3.1
comdev comdev_csv_importer 4.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comdev:comdev_csv_importer:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EFE7E5-D332-4436-BE54-B50D4FE94055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comdev:comdev_csv_importer:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF1B3C80-7ED6-4676-A33D-B658BC1085F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter.  NOTE: it has been reported that 4.1 versions might also be affected."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad PHP de inclusi\u00f3n remota de archivo en include.php en Comdev CSV Importer 3.1 y posiblemente 4.1, utilizado en (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, y (12) Comdev eCommerce 3.1, permite a un atacante remoto ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de un URL en el par\u00e1metro path[\"docroot\"]."
    }
  ],
  "id": "CVE-2006-5101",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-10-03T04:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22133"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22134"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22135"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22147"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22149"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22151"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22153"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22154"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22157"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22168"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22169"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22170"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/1658"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29299"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29300"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29301"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29302"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29303"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29304"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29305"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29306"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29307"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29308"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29309"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29310"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29311"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447184/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447185/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447186/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447187/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447188/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447190/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447192/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447193/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447194/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447201/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447207/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447209/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447213/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3803"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3804"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3805"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3806"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3807"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3808"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3809"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3810"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3811"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3812"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3813"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3814"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3815"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29220"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22133"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22134"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22147"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22149"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22154"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22157"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22168"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22169"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/1658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29299"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29300"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29301"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29302"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29303"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29304"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29305"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29307"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29308"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29309"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29311"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447184/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447185/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447186/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447187/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447188/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447190/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447192/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447193/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447194/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447201/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447207/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447209/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447213/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3803"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3804"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3805"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3806"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3807"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3808"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3809"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3810"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3812"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3813"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3814"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3815"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29220"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…