VAR-200610-0138

Vulnerability from variot - Updated: 2023-12-18 11:17

OpenBase SQL 10.0 and earlier, as used in Apple Xcode 2.2 2.2 and earlier and possibly other products, allows local users to create arbitrary files via a symlink attack on the simulation.sql file. Apple Xcode Used in etc. The OpenBase application shipped with Apple Xcode is prone to multiple privilege-escalation issues because the application fails to handle exceptional conditions when executing setuid programs. A local attacker can exploit these issues to gain superuser privileges. A successful exploit would lead to the complete compromise of affected computers. This issue affects Apple Xcode 2.2 and earlier versions. Xcode is the development tool used on Apple machines.


2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published

How do you know which Secunia advisories are important to you?

The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively.

The vulnerabilities are caused due to the inclusion of vulnerable versions of Binutils and OpenBase SQL.


Want to join the Secunia Security Team?

Secunia offers a position as a security specialist, where your daily work involves reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports.

http://secunia.com/secunia_security_specialist/


TITLE: SpamAssassin "spamd" Shell Command Injection Vulnerability

SECUNIA ADVISORY ID: SA20430

VERIFY ADVISORY: http://secunia.com/advisories/20430/

CRITICAL: Moderately critical

IMPACT: System access

WHERE:

From local network

SOFTWARE: SpamAssassin 3.x http://secunia.com/product/4506/

DESCRIPTION: A vulnerability has been reported in SpamAssassin, which can be exploited by malicious people to compromise a vulnerable system.

Some unspecified input is not properly sanitised before being used. This can be exploited to inject arbitrary shell commands.

Successful exploitation requires that spamd is used with the "--vpopmail" and "--paranoid" switches.

The vulnerability has been reported in version 3.0.3. Other versions may also be affected.

SOLUTION: Update to version 3.0.6 or 3.1.3.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200610-0138",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "openbase",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "openbase",
        "version": "9.1.5"
      },
      {
        "model": "openbase",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "openbase",
        "version": "7.0.15"
      },
      {
        "model": "xcode",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "apple",
        "version": "2.2"
      },
      {
        "model": "openbase",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "openbase",
        "version": "10.0"
      },
      {
        "model": "openbase",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "openbase",
        "version": "8.0.4"
      },
      {
        "model": "sql",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "openbase",
        "version": "10.0"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.4.x"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.5"
      },
      {
        "model": "xcode",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "tools 2.5"
      },
      {
        "model": "openbase",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "openbase",
        "version": "10.0"
      },
      {
        "model": "macosx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openbase",
        "version": "10.0"
      },
      {
        "model": "macosx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openbase",
        "version": "9.1.5"
      },
      {
        "model": "macosx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openbase",
        "version": "8.0.4"
      },
      {
        "model": "macosx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openbase",
        "version": "7.0.15"
      },
      {
        "model": "xcode",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "2.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.10"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.9"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5"
      },
      {
        "model": "xcode",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "2.3"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "20562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000980"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-5328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-249"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:openbase_international_ltd:openbase:7.0.15:*:mac_os_x:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openbase_international_ltd:openbase:*:*:mac_os_x:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "10.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openbase_international_ltd:openbase:9.1.5:*:mac_os_x:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openbase_international_ltd:openbase:8.0.4:*:mac_os_x:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-5328"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kevin Finisterre\u203b dotslash@snosoft.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-249"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2006-5328",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": true,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.2,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2006-5328",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-21436",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2006-5328",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200610-249",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-21436",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-21436"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000980"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-5328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-249"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "OpenBase SQL 10.0 and earlier, as used in Apple Xcode 2.2 2.2 and earlier and possibly other products, allows local users to create arbitrary files via a symlink attack on the simulation.sql file. Apple Xcode Used in etc. The OpenBase application shipped with Apple Xcode is prone to multiple privilege-escalation issues because the application fails to handle exceptional conditions when executing setuid programs. \nA local attacker can exploit these issues to gain superuser privileges. A successful exploit would lead to the complete compromise of affected computers. \nThis issue affects Apple Xcode 2.2 and earlier versions. Xcode is the development tool used on Apple machines. \n----------------------------------------------------------------------\n\n2003: 2,700 advisories published\n2004: 3,100 advisories published\n2005: 4,600 advisories published\n2006: 5,300 advisories published\n\nHow do you know which Secunia advisories are important to you?\n\nThe Secunia Vulnerability Intelligence Solutions allows you to filter\nand structure all the information you need, so you can address issues\neffectively. \n\nThe vulnerabilities are caused due to the inclusion of vulnerable\nversions of Binutils and OpenBase SQL. \n\n----------------------------------------------------------------------\n\nWant to join the Secunia Security Team?\n\nSecunia offers a position as a security specialist, where your daily\nwork involves reverse engineering of software and exploit code,\nauditing of source code, and analysis of vulnerability reports. \n\nhttp://secunia.com/secunia_security_specialist/\n\n----------------------------------------------------------------------\n\nTITLE:\nSpamAssassin \"spamd\" Shell Command Injection Vulnerability\n\nSECUNIA ADVISORY ID:\nSA20430\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/20430/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nSpamAssassin 3.x\nhttp://secunia.com/product/4506/\n\nDESCRIPTION:\nA vulnerability has been reported in SpamAssassin,  which can be\nexploited by malicious people to compromise a vulnerable system. \n\nSome unspecified input is not properly sanitised before being used. \nThis can be exploited to inject arbitrary shell commands. \n\nSuccessful exploitation requires that spamd is used with the\n\"--vpopmail\" and \"--paranoid\" switches. \n\nThe vulnerability has been reported in version 3.0.3. Other versions\nmay also be affected. \n\nSOLUTION:\nUpdate to version 3.0.6 or 3.1.3. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-5328"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000980"
      },
      {
        "db": "BID",
        "id": "20562"
      },
      {
        "db": "VULHUB",
        "id": "VHN-21436"
      },
      {
        "db": "PACKETSTORM",
        "id": "60583"
      },
      {
        "db": "PACKETSTORM",
        "id": "47075"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "20562",
        "trust": 2.8
      },
      {
        "db": "NVD",
        "id": "CVE-2006-5328",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "27441",
        "trust": 2.6
      },
      {
        "db": "SECUNIA",
        "id": "22390",
        "trust": 2.5
      },
      {
        "db": "SECTRACK",
        "id": "1018872",
        "trust": 2.5
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-3665",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "29794",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000980",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-249",
        "trust": 0.7
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2007-10-30",
        "trust": 0.6
      },
      {
        "db": "MISC",
        "id": "HTTP://WWW.DIGITALMUNITION.COM/DMA[2006-1016A].TXT",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-21436",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "60583",
        "trust": 0.1
      },
      {
        "db": "SECUNIA",
        "id": "20430",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "47075",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-21436"
      },
      {
        "db": "BID",
        "id": "20562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000980"
      },
      {
        "db": "PACKETSTORM",
        "id": "60583"
      },
      {
        "db": "PACKETSTORM",
        "id": "47075"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-5328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-249"
      }
    ]
  },
  "id": "VAR-200610-0138",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-21436"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T11:17:05.868000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "About the security content of Xcode Tools 2.5",
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=306847-en"
      },
      {
        "title": "About the security content of Xcode Tools 2.5",
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=306847-ja"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.openbase.com/index.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000980"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-5328"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/20562"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/22390"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/27441"
      },
      {
        "trust": 1.8,
        "url": "http://lists.apple.com/archives/security-announce/2007/oct/msg00001.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.digitalmunition.com/dma%5b2006-1016a%5d.txt"
      },
      {
        "trust": 1.7,
        "url": "http://www.digitalmunition.com/xcode_openbase_createfile.pl"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1018872"
      },
      {
        "trust": 1.4,
        "url": "http://www.frsirt.com/english/advisories/2007/3665"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2007/3665"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5328"
      },
      {
        "trust": 0.8,
        "url": "http://osvdb.org/displayvuln.php?osvdb_id=29794"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-5328"
      },
      {
        "trust": 0.8,
        "url": "http://securitytracker.com/alerts/2007/oct/1018872.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/macosx/features/xcode/"
      },
      {
        "trust": 0.3,
        "url": "http://software.cisco.com/download/navigator.html?mdfid=283613663"
      },
      {
        "trust": 0.3,
        "url": "http://www.digitalmunition.com/dma%5b2006-1107a%5d.txt"
      },
      {
        "trust": 0.3,
        "url": "http://www.openbase.com/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27441/"
      },
      {
        "trust": 0.1,
        "url": "http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/22390/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/10144/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/20188/"
      },
      {
        "trust": 0.1,
        "url": "http://developer.apple.com/tools/download/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/20430/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4506/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_specialist/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-21436"
      },
      {
        "db": "BID",
        "id": "20562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000980"
      },
      {
        "db": "PACKETSTORM",
        "id": "60583"
      },
      {
        "db": "PACKETSTORM",
        "id": "47075"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-5328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-249"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-21436"
      },
      {
        "db": "BID",
        "id": "20562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000980"
      },
      {
        "db": "PACKETSTORM",
        "id": "60583"
      },
      {
        "db": "PACKETSTORM",
        "id": "47075"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-5328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-249"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-10-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-21436"
      },
      {
        "date": "2006-10-16T00:00:00",
        "db": "BID",
        "id": "20562"
      },
      {
        "date": "2007-11-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-000980"
      },
      {
        "date": "2007-11-01T00:17:02",
        "db": "PACKETSTORM",
        "id": "60583"
      },
      {
        "date": "2006-06-10T05:36:59",
        "db": "PACKETSTORM",
        "id": "47075"
      },
      {
        "date": "2006-10-17T21:07:00",
        "db": "NVD",
        "id": "CVE-2006-5328"
      },
      {
        "date": "2006-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200610-249"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-08-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-21436"
      },
      {
        "date": "2007-10-31T19:36:00",
        "db": "BID",
        "id": "20562"
      },
      {
        "date": "2007-11-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-000980"
      },
      {
        "date": "2023-11-07T01:59:29.853000",
        "db": "NVD",
        "id": "CVE-2006-5328"
      },
      {
        "date": "2006-10-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200610-249"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "20562"
      },
      {
        "db": "PACKETSTORM",
        "id": "60583"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-249"
      }
    ],
    "trust": 1.0
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "OpenBase SQL Vulnerable to symbolic link attacks",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000980"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200610-249"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…