VAR-200604-0560
Vulnerability from variot - Updated: 2023-12-18 13:25The Gmax Mail client in Hitachi Groupmax before 20060426 allows remote attackers to cause a denial of service (application hang or erroneous behavior) via an attachment with an MS-DOS device filename. Some email clients contain a vulnerability which may crash themselves as they do not properly handle an attached file with an particular file name.Actual impact could differ depending on the email clients though, email clients may crash when hadling an attached file with a particular file name. Other possible impacts could be an attached file not being saved or hanged up while in the saving process, or an error message being displayed on the application related to the attached file. Groupmax Integrated Desktop is prone to a denial-of-service vulnerability.
TITLE: Groupmax Mail Client Attachment Filename Handling Weakness
SECUNIA ADVISORY ID: SA19840
VERIFY ADVISORY: http://secunia.com/advisories/19840/
CRITICAL: Not critical
IMPACT: DoS
WHERE:
From remote
SOFTWARE: Groupmax World Wide Web Desktop 5.x http://secunia.com/product/4333/ Groupmax World Wide Web 3.x http://secunia.com/product/4332/ Groupmax World Wide Web 2.x http://secunia.com/product/4331/ Groupmax Mail 7.x http://secunia.com/product/6160/ Groupmax Mail 6.x http://secunia.com/product/6159/ Groupmax Integrated Desktop Version 7.x http://secunia.com/product/9565/ Groupmax Integrated Desktop Version 6.x http://secunia.com/product/9564/ Groupmax Integrated Desktop Version 5.x http://secunia.com/product/9563/ Groupmax Integrated Desktop Version 3.x http://secunia.com/product/9562/ Groupmax Integrated Desktop Version 2.x http://secunia.com/product/9561/ Groupmax World Wide Web Desktop 6.x http://secunia.com/product/4334/ Groupmax World Wide Web Desktop for Jichitai 6.x http://secunia.com/product/4335/
DESCRIPTION: A weakness has been reported in Groupmax Mail Client, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).
The weakness is caused due to an error within the handling of email attachments.
The weakness has been reported in the following products: * Groupmax Integrated Desktop version 3, 5, 6, 7. * Mail Client version 02-00 through 02-31-/E. * GroupMail/Client(DOS/V) version 01-21-/C through 01-21-/D. * GroupMail/Client version 01-01 through 01-21-/G. * Groupmax World Wide Web Desktop Version 2, 3, 5, 6.
SOLUTION: Apply patches (see patch matrix in the vendor advisory).
PROVIDED AND/OR DISCOVERED BY: Reported by vendor.
ORIGINAL ADVISORY: http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/index-e.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200604-0560",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "groupmax world wide web desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "hitachi",
"version": "*"
},
{
"model": "groupmax world wide web",
"scope": "eq",
"trust": 1.0,
"vendor": "hitachi",
"version": "*"
},
{
"model": "groupmax mail",
"scope": "eq",
"trust": 1.0,
"vendor": "hitachi",
"version": "*"
},
{
"model": "groupmax integrated desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "hitachi",
"version": "*"
},
{
"model": "groupmail/client",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "(dosv) 01-21-/c - 01-21-/d"
},
{
"model": "groupmail/client",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "01-01 - 01-21-/g"
},
{
"model": "groupmax integrated desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "version 2.0 02-10 - 02-31-/s"
},
{
"model": "groupmax integrated desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "version 3 03-00 - 03-10-/p"
},
{
"model": "groupmax integrated desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "version 5 05-00 - 05-11-/h"
},
{
"model": "groupmax integrated desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "version 6 06-00 - 06-52-/c"
},
{
"model": "groupmax integrated desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "version 7 07-00 - 07-20-/c"
},
{
"model": "groupmax world wide web desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "for jichitai 06-51 - 06-52-/a"
},
{
"model": "groupmax world wide web desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "version 2.0"
},
{
"model": "groupmax world wide web desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "version 3"
},
{
"model": "groupmax world wide web desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "version 5"
},
{
"model": "groupmax world wide web desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "version 6 02-00 - 02-31-/i"
},
{
"model": "mail client",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "02-00 - 02-31-/e"
},
{
"model": null,
"scope": null,
"trust": 0.6,
"vendor": "none",
"version": null
},
{
"model": "groupmax integrated desktop",
"scope": null,
"trust": 0.6,
"vendor": "hitachi",
"version": null
},
{
"model": "groupmax mail",
"scope": null,
"trust": 0.6,
"vendor": "hitachi",
"version": null
},
{
"model": "groupmax world wide web",
"scope": null,
"trust": 0.6,
"vendor": "hitachi",
"version": null
},
{
"model": "groupmax world wide web desktop",
"scope": null,
"trust": 0.6,
"vendor": "hitachi",
"version": null
},
{
"model": "groupmax world wide web desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "groupmax world wide web",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "groupmax mail",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "groupmax integrated desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-2773"
},
{
"db": "BID",
"id": "87657"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000602"
},
{
"db": "NVD",
"id": "CVE-2006-2087"
},
{
"db": "CNNVD",
"id": "CNNVD-200604-556"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:hitachi:groupmax_integrated_desktop:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:hitachi:groupmax_mail:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:hitachi:groupmax_world_wide_web:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:hitachi:groupmax_world_wide_web_desktop:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2006-2087"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unknown",
"sources": [
{
"db": "BID",
"id": "87657"
}
],
"trust": 0.3
},
"cve": "CVE-2006-2087",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2006-000602",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2006-2773",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2006-2087",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "IPA",
"id": "JVNDB-2006-000602",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2006-2773",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200604-556",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-2773"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000602"
},
{
"db": "NVD",
"id": "CVE-2006-2087"
},
{
"db": "CNNVD",
"id": "CNNVD-200604-556"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Gmax Mail client in Hitachi Groupmax before 20060426 allows remote attackers to cause a denial of service (application hang or erroneous behavior) via an attachment with an MS-DOS device filename. Some email clients contain a vulnerability which may crash themselves as they do not properly handle an attached file with an particular file name.Actual impact could differ depending on the email clients though, email clients may crash when hadling an attached file with a particular file name. Other possible impacts could be an attached file not being saved or hanged up while in the saving process, or an error message being displayed on the application related to the attached file. Groupmax Integrated Desktop is prone to a denial-of-service vulnerability. \n\nTITLE:\nGroupmax Mail Client Attachment Filename Handling Weakness\n\nSECUNIA ADVISORY ID:\nSA19840\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/19840/\n\nCRITICAL:\nNot critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nGroupmax World Wide Web Desktop 5.x\nhttp://secunia.com/product/4333/\nGroupmax World Wide Web 3.x\nhttp://secunia.com/product/4332/\nGroupmax World Wide Web 2.x\nhttp://secunia.com/product/4331/\nGroupmax Mail 7.x\nhttp://secunia.com/product/6160/\nGroupmax Mail 6.x\nhttp://secunia.com/product/6159/\nGroupmax Integrated Desktop Version 7.x\nhttp://secunia.com/product/9565/\nGroupmax Integrated Desktop Version 6.x\nhttp://secunia.com/product/9564/\nGroupmax Integrated Desktop Version 5.x\nhttp://secunia.com/product/9563/\nGroupmax Integrated Desktop Version 3.x\nhttp://secunia.com/product/9562/\nGroupmax Integrated Desktop Version 2.x\nhttp://secunia.com/product/9561/\nGroupmax World Wide Web Desktop 6.x\nhttp://secunia.com/product/4334/\nGroupmax World Wide Web Desktop for Jichitai 6.x\nhttp://secunia.com/product/4335/\n\nDESCRIPTION:\nA weakness has been reported in Groupmax Mail Client, which\npotentially can be exploited by malicious people to cause a DoS\n(Denial of Service). \n\nThe weakness is caused due to an error within the handling of email\nattachments. \n\nThe weakness has been reported in the following products:\n* Groupmax Integrated Desktop version 3, 5, 6, 7. \n* Mail Client version 02-00 through 02-31-/E. \n* GroupMail/Client(DOS/V) version 01-21-/C through 01-21-/D. \n* GroupMail/Client version 01-01 through 01-21-/G. \n* Groupmax World Wide Web Desktop Version 2, 3, 5, 6. \n\nSOLUTION:\nApply patches (see patch matrix in the vendor advisory). \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by vendor. \n\nORIGINAL ADVISORY:\nhttp://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/index-e.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2006-2087"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000602"
},
{
"db": "CNVD",
"id": "CNVD-2006-2773"
},
{
"db": "BID",
"id": "87657"
},
{
"db": "PACKETSTORM",
"id": "45729"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2006-2087",
"trust": 3.3
},
{
"db": "SECUNIA",
"id": "19840",
"trust": 3.2
},
{
"db": "OSVDB",
"id": "24969",
"trust": 2.4
},
{
"db": "HITACHI",
"id": "HS06-006",
"trust": 2.0
},
{
"db": "XF",
"id": "26099",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2006-1539",
"trust": 1.6
},
{
"db": "JVN",
"id": "JVN89344424",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000602",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2006-2773",
"trust": 0.6
},
{
"db": "JVN",
"id": "JVN#89344424",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200604-556",
"trust": 0.6
},
{
"db": "BID",
"id": "87657",
"trust": 0.3
},
{
"db": "PACKETSTORM",
"id": "45729",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-2773"
},
{
"db": "BID",
"id": "87657"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000602"
},
{
"db": "PACKETSTORM",
"id": "45729"
},
{
"db": "NVD",
"id": "CVE-2006-2087"
},
{
"db": "CNNVD",
"id": "CNNVD-200604-556"
}
]
},
"id": "VAR-200604-0560",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-2773"
}
],
"trust": 1.1833333000000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-2773"
}
]
},
"last_update_date": "2023-12-18T13:25:53.571000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "HS06-006",
"trust": 0.8,
"url": "http://www.hitachi-support.com/security_e/vuls_e/hs06-006_e/01-e.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2006-000602"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2006-2087"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.0,
"url": "http://secunia.com/advisories/19840"
},
{
"trust": 2.4,
"url": "http://www.osvdb.org/24969"
},
{
"trust": 2.0,
"url": "http://www.hitachi-support.com/security_e/vuls_e/hs06-006_e/index-e.html"
},
{
"trust": 1.9,
"url": "http://jvn.jp/jp/jvn%2389344424/index.html"
},
{
"trust": 1.9,
"url": "http://www.hitachi-support.com/security_e/vuls_e/hs06-006_e/01-e.html"
},
{
"trust": 1.7,
"url": "http://xforce.iss.net/xforce/xfdb/26099"
},
{
"trust": 1.4,
"url": "http://www.frsirt.com/english/advisories/2006/1539"
},
{
"trust": 1.0,
"url": "http://www.vupen.com/english/advisories/2006/1539"
},
{
"trust": 1.0,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26099"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2087"
},
{
"trust": 0.8,
"url": "http://jvn.jp/en/jp/jvn89344424/index.html"
},
{
"trust": 0.8,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-2087"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/9561/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/19840/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/4333/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/9564/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/4335/"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/9565/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/4334/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/9563/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/4331/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/6160/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/6159/"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/9562/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/4332/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-2773"
},
{
"db": "BID",
"id": "87657"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000602"
},
{
"db": "PACKETSTORM",
"id": "45729"
},
{
"db": "NVD",
"id": "CVE-2006-2087"
},
{
"db": "CNNVD",
"id": "CNNVD-200604-556"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2006-2773"
},
{
"db": "BID",
"id": "87657"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000602"
},
{
"db": "PACKETSTORM",
"id": "45729"
},
{
"db": "NVD",
"id": "CVE-2006-2087"
},
{
"db": "CNNVD",
"id": "CNNVD-200604-556"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2006-04-29T00:00:00",
"db": "CNVD",
"id": "CNVD-2006-2773"
},
{
"date": "2006-04-29T00:00:00",
"db": "BID",
"id": "87657"
},
{
"date": "2008-05-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2006-000602"
},
{
"date": "2006-04-27T21:57:26",
"db": "PACKETSTORM",
"id": "45729"
},
{
"date": "2006-04-29T10:02:00",
"db": "NVD",
"id": "CVE-2006-2087"
},
{
"date": "2006-04-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200604-556"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2006-04-29T00:00:00",
"db": "CNVD",
"id": "CNVD-2006-2773"
},
{
"date": "2006-04-29T00:00:00",
"db": "BID",
"id": "87657"
},
{
"date": "2008-05-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2006-000602"
},
{
"date": "2017-07-20T01:31:10.333000",
"db": "NVD",
"id": "CVE-2006-2087"
},
{
"date": "2006-04-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200604-556"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200604-556"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Gmax Mail client in Hitachi Groupmax Denial of Service Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-2773"
},
{
"db": "CNNVD",
"id": "CNNVD-200604-556"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "unknown",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200604-556"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.