JVNDB-2008-000015
Vulnerability from jvndb - Published: 2008-05-21 00:00 - Updated:2008-05-21 11:32Summary
BFup ActiveX Control buffer overflow vulnerability
Details
BFup ActiveX Control contains a buffer overflow vulnerability.
BFup ActiveX Control is developed by an individual that provides file upload and download functionality. BFup ActiveX Control contains a buffer overflow vulnerability.
According to the developer of BFup ActiveX Control, this vulnerability only exists in BFup ActiveX Control developed by the individual developer, not in its commercial version, BFup Pro ActiveX Control, provided by B21Soft, Inc. For more information, refer to the developer's website.
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000015.html",
"dc:date": "2008-05-21T11:32+09:00",
"dcterms:issued": "2008-05-21T00:00+09:00",
"dcterms:modified": "2008-05-21T11:32+09:00",
"description": "BFup ActiveX Control contains a buffer overflow vulnerability.\r\n\r\nBFup ActiveX Control is developed by an individual that provides file upload and download functionality. BFup ActiveX Control contains a buffer overflow vulnerability.\r\n\r\nAccording to the developer of BFup ActiveX Control, this vulnerability only exists in BFup ActiveX Control developed by the individual developer, not in its commercial version, BFup Pro ActiveX Control, provided by B21Soft, Inc. For more information, refer to the developer\u0027s website.",
"link": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000015.html",
"sec:cpe": {
"#text": "cpe:/a:b21soft:bfup",
"@product": "BFup ActiveX Control",
"@vendor": "Tatsuo Baba",
"@version": "2.2"
},
"sec:cvss": {
"@score": "6.8",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2008-000015",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN10606373/index.html",
"@id": "JVN#10606373",
"@source": "JVN"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1282",
"@id": "CVE-2008-1282",
"@source": "CVE"
},
{
"#text": "http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1282",
"@id": "CVE-2008-1282",
"@source": "NVD"
},
{
"#text": "http://secunia.com/advisories/29260",
"@id": "SA29260",
"@source": "SECUNIA"
},
{
"#text": "http://www.securityfocus.com/bid/28131",
"@id": "28131",
"@source": "BID"
},
{
"#text": "http://xforce.iss.net/xforce/xfdb/41050",
"@id": "41050",
"@source": "XF"
},
{
"#text": "http://www.frsirt.com/english/advisories/2008/0797",
"@id": "FrSIRT/ADV-2008-0797",
"@source": "FRSIRT"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-119",
"@title": "Buffer Errors(CWE-119)"
}
],
"title": "BFup ActiveX Control buffer overflow vulnerability"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…