var-200608-0038
Vulnerability from variot
Unspecified vulnerability in AFP Server in Apple Mac OS X 10.3.9 allows remote attackers to determine names of unauthorized files and folders via unknown vectors related to the search results. The Apple Mac OS X ImageIO framework contains an integer overflow that may allow a remote attacker to execute arbitrary code on an affected system. These issue affect Mac OS X and various applications including AFP Server, Bluetooth, Bom, DHCP, Image RAW, ImageIO, Launch Services, OpenSSH, and WebKit. A remote attacker may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and disclose potentially sensitive information. If the file name itself is sensitive information, it may lead to information disclosure; if the permissions allow, the attacker can also access the file content
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-200608-0038", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: null, scope: null, trust: 4.8, vendor: "apple computer", version: null, }, { model: "mac os x", scope: "eq", trust: 2.4, vendor: "apple", version: "10.3.9", }, { model: "mac os x server", scope: "eq", trust: 1.6, vendor: "apple", version: "10.3.9", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.8", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1.1", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.5", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.2", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.0.4", }, { model: "iphone", scope: "eq", trust: 0.3, vendor: "apple", version: "1.0.2", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.9", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1.2", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.4", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.5", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.6", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.6", }, { model: "directory pro", scope: "eq", trust: 0.3, vendor: "cosmicperl", version: "10.0.3", }, { model: "iphone", scope: "eq", trust: 0.3, vendor: "apple", version: "1.0.1", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.1", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.1", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.4", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.6", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.7", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.03", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.8", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1.4", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1.3", }, { model: "iphone", scope: "eq", trust: 0.3, vendor: "apple", version: "1", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.7", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.4", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.2", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.3", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.5", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1.5", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.7", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.1", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.3", }, { model: "ipod touch", scope: "eq", trust: 0.3, vendor: "apple", version: "1.1.1", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.2", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.3", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.8", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.5", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.0.1", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1.1", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.2", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1.2", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.9", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.5", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.6", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.6", }, { model: "ipod touch", scope: "eq", trust: 0.3, vendor: "apple", version: "1.1", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.4", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.6", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.7", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.0.2", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.1", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.0.3", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.1", }, { model: "iphone", scope: "eq", trust: 0.3, vendor: "apple", version: "1.1.1", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.7", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.8", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1.4", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1.3", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.4", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.5", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.2", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.4", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.3", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.1", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.3", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1.5", }, { model: "mac os server", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.7", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.2", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.3", }, ], sources: [ { db: "CERT/CC", id: "VU#708340", }, { db: "CERT/CC", id: "VU#514740", }, { db: "CERT/CC", id: "VU#566132", }, { db: "CERT/CC", id: "VU#651844", }, { db: "CERT/CC", id: "VU#605908", }, { db: "CERT/CC", id: "VU#172244", }, { db: "BID", id: "19289", }, { db: "JVNDB", id: "JVNDB-2006-001005", }, { db: "CNNVD", id: "CNNVD-200608-035", }, { db: "NVD", id: "CVE-2006-1472", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { cpe_match: [ { cpe22Uri: "cpe:/o:apple:mac_os_x", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2006-001005", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Dino Dai Zovi ddaizovi@atstake.com Tom Ferris※ tommy@security-protocols.com Neil ArchibaldRob MiddletonGael DelalleauJesse Ruderman jruderman@gmail.com", sources: [ { db: "CNNVD", id: "CNNVD-200608-035", }, ], trust: 0.6, }, cve: "CVE-2006-1472", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, id: "CVE-2006-1472", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 1.8, vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, id: "VHN-17580", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:P/I:N/A:N", version: "2.0", }, ], cvssV3: [], severity: [ { author: "nvd@nist.gov", id: "CVE-2006-1472", trust: 1, value: "MEDIUM", }, { author: "CARNEGIE MELLON", id: "VU#776628", trust: 0.8, value: "0.13", }, { author: "CARNEGIE MELLON", id: "VU#514740", trust: 0.8, value: "0.48", }, { author: "CARNEGIE MELLON", id: "VU#566132", trust: 0.8, value: "1.64", }, { author: "CARNEGIE MELLON", id: "VU#651844", trust: 0.8, value: "7.43", }, { author: "CARNEGIE MELLON", id: "VU#605908", trust: 0.8, value: "8.78", }, { author: "CARNEGIE MELLON", id: "VU#172244", trust: 0.8, value: "7.43", }, { author: "NVD", id: "CVE-2006-1472", trust: 0.8, value: "Medium", }, { author: "CNNVD", id: "CNNVD-200608-035", trust: 0.6, value: "MEDIUM", }, { author: "VULHUB", id: "VHN-17580", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "CERT/CC", id: "VU#776628", }, { db: "CERT/CC", id: "VU#514740", }, { db: "CERT/CC", id: "VU#566132", }, { db: "CERT/CC", id: "VU#651844", }, { db: "CERT/CC", id: "VU#605908", }, { db: "CERT/CC", id: "VU#172244", }, { db: "VULHUB", id: "VHN-17580", }, { db: "JVNDB", id: "JVNDB-2006-001005", }, { db: "CNNVD", id: "CNNVD-200608-035", }, { db: "NVD", id: "CVE-2006-1472", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Unspecified vulnerability in AFP Server in Apple Mac OS X 10.3.9 allows remote attackers to determine names of unauthorized files and folders via unknown vectors related to the search results. The Apple Mac OS X ImageIO framework contains an integer overflow that may allow a remote attacker to execute arbitrary code on an affected system. \nThese issue affect Mac OS X and various applications including AFP Server, Bluetooth, Bom, DHCP, Image RAW, ImageIO, Launch Services, OpenSSH, and WebKit. A remote attacker may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and disclose potentially sensitive information. If the file name itself is sensitive information, it may lead to information disclosure; if the permissions allow, the attacker can also access the file content", sources: [ { db: "NVD", id: "CVE-2006-1472", }, { db: "CERT/CC", id: "VU#708340", }, { db: "CERT/CC", id: "VU#776628", }, { db: "CERT/CC", id: "VU#514740", }, { db: "CERT/CC", id: "VU#566132", }, { db: "CERT/CC", id: "VU#651844", }, { db: "CERT/CC", id: "VU#605908", }, { db: "CERT/CC", id: "VU#172244", }, { db: "JVNDB", id: "JVNDB-2006-001005", }, { db: "BID", id: "19289", }, { db: "VULHUB", id: "VHN-17580", }, ], trust: 7.02, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "SECUNIA", id: "21253", trust: 6.5, }, { db: "NVD", id: "CVE-2006-1472", trust: 2.8, }, { db: "USCERT", id: "TA06-214A", trust: 2.5, }, { db: "BID", id: "19289", trust: 2, }, { db: "SECTRACK", id: "1016620", trust: 1.7, }, { db: "VUPEN", id: "ADV-2006-3101", trust: 1.7, }, { db: "CERT/CC", id: "VU#708340", trust: 1.1, }, { db: "CERT/CC", id: "VU#776628", trust: 1.1, }, { db: "CERT/CC", id: "VU#514740", trust: 1.1, }, { db: "CERT/CC", id: "VU#566132", trust: 1.1, }, { db: "CERT/CC", id: "VU#651844", trust: 1.1, }, { db: "CERT/CC", id: "VU#605908", trust: 1.1, }, { db: "CERT/CC", id: "VU#172244", trust: 1.1, }, { db: "JVNDB", id: "JVNDB-2006-001005", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-200608-035", trust: 0.7, }, { db: "XF", id: "28134", trust: 0.6, }, { db: "CERT/CC", id: "TA06-214A", trust: 0.6, }, { db: "APPLE", id: "APPLE-SA-2006-08-01", trust: 0.6, }, { db: "VULHUB", id: "VHN-17580", trust: 0.1, }, ], sources: [ { db: "CERT/CC", id: "VU#708340", }, { db: "CERT/CC", id: "VU#776628", }, { db: "CERT/CC", id: "VU#514740", }, { db: "CERT/CC", id: "VU#566132", }, { db: "CERT/CC", id: "VU#651844", }, { db: "CERT/CC", id: "VU#605908", }, { db: "CERT/CC", id: "VU#172244", }, { db: "VULHUB", id: "VHN-17580", }, { db: "BID", id: "19289", }, { db: "JVNDB", id: "JVNDB-2006-001005", }, { db: "CNNVD", id: "CNNVD-200608-035", }, { db: "NVD", id: "CVE-2006-1472", }, ], }, id: "VAR-200608-0038", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-17580", }, ], trust: 0.01, }, last_update_date: "2024-11-29T22:34:43.959000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "APPLE-SA-2006-08-01", trust: 0.8, url: "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2006-001005", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-Other", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2006-1472", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 4.8, url: "http://docs.info.apple.com/article.html?artnum=304063", }, { trust: 4.8, url: "http://secunia.com/advisories/21253/", }, { trust: 2.5, url: "http://www.us-cert.gov/cas/techalerts/ta06-214a.html", }, { trust: 1.7, url: "http://lists.apple.com/archives/security-announce/2006//aug/msg00000.html", }, { trust: 1.7, url: "http://www.securityfocus.com/bid/19289", }, { trust: 1.7, url: "http://securitytracker.com/id?1016620", }, { trust: 1.7, url: "http://secunia.com/advisories/21253", }, { trust: 1.1, url: "http://www.vupen.com/english/advisories/2006/3101", }, { trust: 1.1, url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/28134", }, { trust: 0.8, url: "http://manuals.info.apple.com/en/macosxsrvr10.3_systemimageadmin.pdf", }, { trust: 0.8, url: "about vulnerability notes", }, { trust: 0.8, url: "contact us about this vulnerability", }, { trust: 0.8, url: "provide a vendor statement", }, { trust: 0.8, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1472", }, { trust: 0.8, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-1472", }, { trust: 0.6, url: "http://xforce.iss.net/xforce/xfdb/28134", }, { trust: 0.6, url: "http://www.frsirt.com/english/advisories/2006/3101", }, { trust: 0.3, url: "http://www.info.apple.com/usen/security/security_updates.html", }, { trust: 0.3, url: "http://www.apple.com/macosx/", }, { trust: 0.3, url: "http://www.kb.cert.org/vuls/id/172244", }, { trust: 0.3, url: "http://www.kb.cert.org/vuls/id/514740", }, { trust: 0.3, url: "http://www.kb.cert.org/vuls/id/566132", }, { trust: 0.3, url: "http://www.kb.cert.org/vuls/id/605908", }, { trust: 0.3, url: "http://www.kb.cert.org/vuls/id/651844", }, { trust: 0.3, url: "http://www.kb.cert.org/vuls/id/776628", }, { trust: 0.3, url: "http://www.kb.cert.org/vuls/id/708340", }, ], sources: [ { db: "CERT/CC", id: "VU#708340", }, { db: "CERT/CC", id: "VU#776628", }, { db: "CERT/CC", id: "VU#514740", }, { db: "CERT/CC", id: "VU#566132", }, { db: "CERT/CC", id: "VU#651844", }, { db: "CERT/CC", id: "VU#605908", }, { db: "CERT/CC", id: "VU#172244", }, { db: "VULHUB", id: "VHN-17580", }, { db: "BID", id: "19289", }, { db: "JVNDB", id: "JVNDB-2006-001005", }, { db: "CNNVD", id: "CNNVD-200608-035", }, { db: "NVD", id: "CVE-2006-1472", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CERT/CC", id: "VU#708340", }, { db: "CERT/CC", id: "VU#776628", }, { db: "CERT/CC", id: "VU#514740", }, { db: "CERT/CC", id: "VU#566132", }, { db: "CERT/CC", id: "VU#651844", }, { db: "CERT/CC", id: "VU#605908", }, { db: "CERT/CC", id: "VU#172244", }, { db: "VULHUB", id: "VHN-17580", }, { db: "BID", id: "19289", }, { db: "JVNDB", id: "JVNDB-2006-001005", }, { db: "CNNVD", id: "CNNVD-200608-035", }, { db: "NVD", id: "CVE-2006-1472", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2007-01-29T00:00:00", db: "CERT/CC", id: "VU#708340", }, { date: "2006-08-02T00:00:00", db: "CERT/CC", id: "VU#776628", }, { date: "2006-08-02T00:00:00", db: "CERT/CC", id: "VU#514740", }, { date: "2006-08-02T00:00:00", db: "CERT/CC", id: "VU#566132", }, { date: "2006-08-02T00:00:00", db: "CERT/CC", id: "VU#651844", }, { date: "2006-08-02T00:00:00", db: "CERT/CC", id: "VU#605908", }, { date: "2006-08-02T00:00:00", db: "CERT/CC", id: "VU#172244", }, { date: "2006-08-02T00:00:00", db: "VULHUB", id: "VHN-17580", }, { date: "2006-08-01T00:00:00", db: "BID", id: "19289", }, { date: "2012-06-26T00:00:00", db: "JVNDB", id: "JVNDB-2006-001005", }, { date: "2005-04-21T00:00:00", db: "CNNVD", id: "CNNVD-200608-035", }, { date: "2006-08-02T16:04:00", db: "NVD", id: "CVE-2006-1472", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2007-01-29T00:00:00", db: "CERT/CC", id: "VU#708340", }, { date: "2006-08-03T00:00:00", db: "CERT/CC", id: "VU#776628", }, { date: "2006-08-02T00:00:00", db: "CERT/CC", id: "VU#514740", }, { date: "2006-08-02T00:00:00", db: "CERT/CC", id: "VU#566132", }, { date: "2006-08-14T00:00:00", db: "CERT/CC", id: "VU#651844", }, { date: "2006-08-14T00:00:00", db: "CERT/CC", id: "VU#605908", }, { date: "2006-08-14T00:00:00", db: "CERT/CC", id: "VU#172244", }, { date: "2017-07-21T00:00:00", db: "VULHUB", id: "VHN-17580", }, { date: "2007-11-15T00:35:00", db: "BID", id: "19289", }, { date: "2012-06-26T00:00:00", db: "JVNDB", id: "JVNDB-2006-001005", }, { date: "2006-08-26T00:00:00", db: "CNNVD", id: "CNNVD-200608-035", }, { date: "2024-11-21T00:08:57.420000", db: "NVD", id: "CVE-2006-1472", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-200608-035", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Apple Mac OS X AFP server may disclose file and folder information in search results", sources: [ { db: "CERT/CC", id: "VU#708340", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "lack of information", sources: [ { db: "CNNVD", id: "CNNVD-200608-035", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.