var-200610-0137
Vulnerability from variot
Untrusted search path vulnerability in OpenBase SQL 10.0 and earlier, as used in Apple Xcode 2.2 2.2 and earlier and possibly other products, allows local users to execute arbitrary code via a modified PATH that references a malicious gzip program, which is executed by gnutar with certain TAR_OPTIONS environment variable settings, when gnutar is invoked by OpenBase. Apple Xcode Used in etc. The OpenBase application shipped with Apple Xcode is prone to multiple privilege-escalation issues because the application fails to handle exceptional conditions when executing setuid programs. A local attacker can exploit these issues to gain superuser privileges. A successful exploit would lead to the complete compromise of affected computers. This issue affects Apple Xcode 2.2 and earlier versions. Xcode is the development tool used on Apple machines. By using the TAR_OPTIONS environment variable, gnutar can be forced to call gzip without specifying the path, and the attacker can gain root privileges by controlling the PATH variable.
2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively.
Want to work within IT-Security?
Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit.
For more information: SA22390
SOLUTION: Download the latest J2SE 5.0-compliant OpenBase JDBC drivers from http://www.openbase.com.
Alternatively, remove the "setuid" flags from the OpenBase binaries.
Want to join the Secunia Security Team?
Secunia offers a position as a security specialist, where your daily work involves reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports.
http://secunia.com/secunia_security_specialist/
TITLE: SpamAssassin "spamd" Shell Command Injection Vulnerability
SECUNIA ADVISORY ID: SA20430
VERIFY ADVISORY: http://secunia.com/advisories/20430/
CRITICAL: Moderately critical
IMPACT: System access
WHERE:
From local network
SOFTWARE: SpamAssassin 3.x http://secunia.com/product/4506/
DESCRIPTION: A vulnerability has been reported in SpamAssassin, which can be exploited by malicious people to compromise a vulnerable system.
Some unspecified input is not properly sanitised before being used. This can be exploited to inject arbitrary shell commands.
Successful exploitation requires that spamd is used with the "--vpopmail" and "--paranoid" switches.
The vulnerability has been reported in version 3.0.3. Other versions may also be affected.
SOLUTION: Update to version 3.0.6 or 3.1.3.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200610-0137", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openbase", "scope": "eq", "trust": 1.0, "vendor": "openbase", "version": "9.1.5" }, { "model": "openbase", "scope": "eq", "trust": 1.0, "vendor": "openbase", "version": "7.0.15" }, { "model": "xcode", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "2.2" }, { "model": "openbase", "scope": "lte", "trust": 1.0, "vendor": "openbase", "version": "10.0" }, { "model": "openbase", "scope": "eq", "trust": 1.0, "vendor": "openbase", "version": "8.0.4" }, { "model": "sql", "scope": "lte", "trust": 0.8, "vendor": "openbase", "version": "10.0" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.x" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5" }, { "model": "xcode", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "tools 2.5" }, { "model": "openbase", "scope": "eq", "trust": 0.6, "vendor": "openbase", "version": "10.0" }, { "model": "macosx", "scope": "eq", "trust": 0.3, "vendor": "openbase", "version": "10.0" }, { "model": "macosx", "scope": "eq", "trust": 0.3, "vendor": "openbase", "version": "9.1.5" }, { "model": "macosx", "scope": "eq", "trust": 0.3, "vendor": "openbase", "version": "8.0.4" }, { "model": "macosx", "scope": "eq", "trust": 0.3, "vendor": "openbase", "version": "7.0.15" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.9" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "xcode", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "2.3" } ], "sources": [ { "db": "BID", "id": "20562" }, { "db": "JVNDB", "id": "JVNDB-2006-000979" }, { "db": "NVD", "id": "CVE-2006-5327" }, { "db": "CNNVD", "id": "CNNVD-200610-256" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openbase_international_ltd:openbase:7.0.15:*:mac_os_x:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbase_international_ltd:openbase:*:*:mac_os_x:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbase_international_ltd:openbase:9.1.5:*:mac_os_x:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbase_international_ltd:openbase:8.0.4:*:mac_os_x:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.2", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2006-5327" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kevin Finisterre\u203b dotslash@snosoft.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200610-256" } ], "trust": 0.6 }, "cve": "CVE-2006-5327", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2006-5327", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-21435", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2006-5327", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200610-256", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-21435", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-21435" }, { "db": "JVNDB", "id": "JVNDB-2006-000979" }, { "db": "NVD", "id": "CVE-2006-5327" }, { "db": "CNNVD", "id": "CNNVD-200610-256" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Untrusted search path vulnerability in OpenBase SQL 10.0 and earlier, as used in Apple Xcode 2.2 2.2 and earlier and possibly other products, allows local users to execute arbitrary code via a modified PATH that references a malicious gzip program, which is executed by gnutar with certain TAR_OPTIONS environment variable settings, when gnutar is invoked by OpenBase. Apple Xcode Used in etc. The OpenBase application shipped with Apple Xcode is prone to multiple privilege-escalation issues because the application fails to handle exceptional conditions when executing setuid programs. \nA local attacker can exploit these issues to gain superuser privileges. A successful exploit would lead to the complete compromise of affected computers. \nThis issue affects Apple Xcode 2.2 and earlier versions. Xcode is the development tool used on Apple machines. By using the TAR_OPTIONS environment variable, gnutar can be forced to call gzip without specifying the path, and the attacker can gain root privileges by controlling the PATH variable. \n----------------------------------------------------------------------\n\n2003: 2,700 advisories published\n2004: 3,100 advisories published\n2005: 4,600 advisories published\n2006: 5,300 advisories published\n\nHow do you know which Secunia advisories are important to you?\n\nThe Secunia Vulnerability Intelligence Solutions allows you to filter\nand structure all the information you need, so you can address issues\neffectively. \n\n----------------------------------------------------------------------\n\nWant to work within IT-Security?\n\nSecunia is expanding its team of highly skilled security experts. \nWe will help with relocation and obtaining a work permit. \n\nFor more information:\nSA22390\n\nSOLUTION:\nDownload the latest J2SE 5.0-compliant OpenBase JDBC drivers from\nhttp://www.openbase.com. \n\nAlternatively, remove the \"setuid\" flags from the OpenBase binaries. \n\n----------------------------------------------------------------------\n\nWant to join the Secunia Security Team?\n\nSecunia offers a position as a security specialist, where your daily\nwork involves reverse engineering of software and exploit code,\nauditing of source code, and analysis of vulnerability reports. \n\nhttp://secunia.com/secunia_security_specialist/\n\n----------------------------------------------------------------------\n\nTITLE:\nSpamAssassin \"spamd\" Shell Command Injection Vulnerability\n\nSECUNIA ADVISORY ID:\nSA20430\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/20430/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nSpamAssassin 3.x\nhttp://secunia.com/product/4506/\n\nDESCRIPTION:\nA vulnerability has been reported in SpamAssassin, which can be\nexploited by malicious people to compromise a vulnerable system. \n\nSome unspecified input is not properly sanitised before being used. \nThis can be exploited to inject arbitrary shell commands. \n\nSuccessful exploitation requires that spamd is used with the\n\"--vpopmail\" and \"--paranoid\" switches. \n\nThe vulnerability has been reported in version 3.0.3. Other versions\nmay also be affected. \n\nSOLUTION:\nUpdate to version 3.0.6 or 3.1.3. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-5327" }, { "db": "JVNDB", "id": "JVNDB-2006-000979" }, { "db": "BID", "id": "20562" }, { "db": "VULHUB", "id": "VHN-21435" }, { "db": "PACKETSTORM", "id": "60583" }, { "db": "PACKETSTORM", "id": "50989" }, { "db": "PACKETSTORM", "id": "47075" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-5327", "trust": 2.8 }, { "db": "BID", "id": "20562", "trust": 2.8 }, { "db": "SECUNIA", "id": "27441", "trust": 2.6 }, { "db": "SECUNIA", "id": "22390", "trust": 2.5 }, { "db": "SECTRACK", "id": "1018872", "trust": 2.5 }, { "db": "SECUNIA", "id": "22474", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2007-3665", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2006-4059", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2006-4058", "trust": 1.7 }, { "db": "XF", "id": "29624", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2006-000979", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200610-256", "trust": 0.7 }, { "db": "APPLE", "id": "APPLE-SA-2007-10-30", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-21435", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "60583", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "50989", "trust": 0.1 }, { "db": "SECUNIA", "id": "20430", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "47075", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-21435" }, { "db": "BID", "id": "20562" }, { "db": "JVNDB", "id": "JVNDB-2006-000979" }, { "db": "PACKETSTORM", "id": "60583" }, { "db": "PACKETSTORM", "id": "50989" }, { "db": "PACKETSTORM", "id": "47075" }, { "db": "NVD", "id": "CVE-2006-5327" }, { "db": "CNNVD", "id": "CNNVD-200610-256" } ] }, "id": "VAR-200610-0137", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-21435" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T10:45:53.035000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "About the security content of Xcode Tools 2.5", "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=306847-en" }, { "title": "About the security content of Xcode Tools 2.5", "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=306847-ja" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.openbase.com/index.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-000979" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-5327" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/20562" }, { "trust": 2.5, "url": "http://secunia.com/advisories/22390" }, { "trust": 2.5, "url": "http://secunia.com/advisories/27441" }, { "trust": 1.8, "url": "http://lists.apple.com/archives/security-announce/2007/oct/msg00001.html" }, { "trust": 1.7, "url": "http://www.digitalmunition.com/dma%5b2006-1016a%5d.txt" }, { "trust": 1.7, "url": "http://www.digitalmunition.com/xcode_openbase_pwn.pl" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1018872" }, { "trust": 1.7, "url": "http://secunia.com/advisories/22474" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2006/4058" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2006/4059" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/29624" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/4058" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/4059" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/3665" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29624" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5327" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-5327" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2007/oct/1018872.html" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2007/3665" }, { "trust": 0.3, "url": "http://www.apple.com/macosx/features/xcode/" }, { "trust": 0.3, "url": "http://software.cisco.com/download/navigator.html?mdfid=283613663" }, { "trust": 0.3, "url": "http://www.digitalmunition.com/dma%5b2006-1107a%5d.txt" }, { "trust": 0.3, "url": "http://www.openbase.com/" }, { "trust": 0.3, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.3, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.3, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/22390/" }, { "trust": 0.2, "url": "http://secunia.com/product/10144/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/27441/" }, { "trust": 0.1, "url": "http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv" }, { "trust": 0.1, "url": "http://secunia.com/advisories/20188/" }, { "trust": 0.1, "url": "http://developer.apple.com/tools/download/" }, { "trust": 0.1, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.1, "url": "http://www.openbase.com." }, { "trust": 0.1, "url": "http://secunia.com/advisories/22474/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/20430/" }, { "trust": 0.1, "url": "http://secunia.com/product/4506/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_specialist/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-21435" }, { "db": "BID", "id": "20562" }, { "db": "JVNDB", "id": "JVNDB-2006-000979" }, { "db": "PACKETSTORM", "id": "60583" }, { "db": "PACKETSTORM", "id": "50989" }, { "db": "PACKETSTORM", "id": "47075" }, { "db": "NVD", "id": "CVE-2006-5327" }, { "db": "CNNVD", "id": "CNNVD-200610-256" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-21435" }, { "db": "BID", "id": "20562" }, { "db": "JVNDB", "id": "JVNDB-2006-000979" }, { "db": "PACKETSTORM", "id": "60583" }, { "db": "PACKETSTORM", "id": "50989" }, { "db": "PACKETSTORM", "id": "47075" }, { "db": "NVD", "id": "CVE-2006-5327" }, { "db": "CNNVD", "id": "CNNVD-200610-256" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-10-17T00:00:00", "db": "VULHUB", "id": "VHN-21435" }, { "date": "2006-10-16T00:00:00", "db": "BID", "id": "20562" }, { "date": "2007-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-000979" }, { "date": "2007-11-01T00:17:02", "db": "PACKETSTORM", "id": "60583" }, { "date": "2006-10-17T17:58:16", "db": "PACKETSTORM", "id": "50989" }, { "date": "2006-06-10T05:36:59", "db": "PACKETSTORM", "id": "47075" }, { "date": "2006-10-17T21:07:00", "db": "NVD", "id": "CVE-2006-5327" }, { "date": "2006-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-200610-256" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-08-13T00:00:00", "db": "VULHUB", "id": "VHN-21435" }, { "date": "2007-10-31T19:36:00", "db": "BID", "id": "20562" }, { "date": "2007-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-000979" }, { "date": "2023-11-07T01:59:29.767000", "db": "NVD", "id": "CVE-2006-5327" }, { "date": "2006-10-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200610-256" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "20562" }, { "db": "PACKETSTORM", "id": "60583" }, { "db": "PACKETSTORM", "id": "50989" }, { "db": "CNNVD", "id": "CNNVD-200610-256" } ], "trust": 1.1 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenBase SQL Vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-000979" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200610-256" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.