var-200609-0297
Vulnerability from variot
Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands. Ipswitch WS_FTP Server is prone to a number of stack-overflow vulnerabilities. Updates are available. A successful exploit may lead to remote arbitrary code execution with administrative privileges, facilitating the complete compromise of affected computers. Ipswitch WS_FTP Server 5.04 and 5.05 are vulnerable to these issues; other versions may also be affected. Ipswitch WS_FTP Server is an FTP service program suitable for Windows systems. There is a typical stack overflow vulnerability in WS_FTP when processing super long XCRC/XSHA1/XMD5 extended command parameters. The exploitation of the vulnerability requires the user to log in to the system with a legal account, but No writable directory is required.
Want to work within IT-Security?
Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit.
Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/
TITLE: WS_FTP Server FTP Commands Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA21932
VERIFY ADVISORY: http://secunia.com/advisories/21932/
CRITICAL: Moderately critical
IMPACT: System access
WHERE:
From remote
SOFTWARE: WS_FTP Server 5.x http://secunia.com/product/3853/
DESCRIPTION: A vulnerability have been reported in WS_FTP Server, which can be exploited by malicious users to compromise a vulnerable system.
The vulnerability is due to a boundary error when parsing arguments to the "XCRC", "XSHA1", and "XMD5" commands. This can be exploited to cause stack-based buffer overflows via overly long command arguments.
The vulnerability has been reported in version 5.05.
SOLUTION: Apply patch. http://ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200609-0297", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ws ftp server", "scope": "eq", "trust": 1.6, "vendor": "ipswitch", "version": "5.03" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.6, "vendor": "ipswitch", "version": "4.01" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.6, "vendor": "ipswitch", "version": "5.02" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "3.1.1" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "1.0.2" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "2.0.1" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "2.0.2" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "1.0.1.e" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "3.0" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "3.4" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "2.0.4" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "1.0.5" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "3.1" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "3.1.2" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "2.0.3" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "4.0.2" }, { "model": "ws ftp server", "scope": "lte", "trust": 1.0, "vendor": "progress", "version": "5.05" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "1.0.3" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "ipswitch", "version": "1.0.2eval" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "1.0.1" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "ipswitch", "version": "1.0.1eval" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "4.0" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "3.1.3" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "ipswitch", "version": "3.0_1" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "1.0.2.e" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "2.0" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "1.0.4" }, { "model": "ws ftp server", "scope": "eq", "trust": 0.9, "vendor": "ipswitch", "version": "5.05" }, { "model": "ws ftp server", "scope": "eq", "trust": 0.8, "vendor": "ipswitch", "version": "hotfix 1" }, { "model": "ws ftp server", "scope": "lt", "trust": 0.8, "vendor": "ipswitch", "version": "5.05" }, { "model": "ws ftp server", "scope": "eq", "trust": 0.6, "vendor": "ipswitch", "version": "4.0" }, { "model": "ws ftp server", "scope": "eq", "trust": 0.6, "vendor": "ipswitch", "version": "4.0.2" }, { "model": "ws ftp server", "scope": "eq", "trust": 0.6, "vendor": "ipswitch", "version": "3.4" }, { "model": "ws ftp server", "scope": "eq", "trust": 0.6, "vendor": "ipswitch", "version": "3.1.3" }, { "model": "ws ftp server", "scope": "eq", "trust": 0.6, "vendor": "ipswitch", "version": "3.1.1" }, { "model": "ws ftp server", "scope": "eq", "trust": 0.6, "vendor": "ipswitch", "version": "3.1.2" }, { "model": "ws ftp server", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "5.04" }, { "model": "ws ftp server hotfix", "scope": "ne", "trust": 0.3, "vendor": "ipswitch", "version": "5.051" } ], "sources": [ { "db": "BID", "id": "20076" }, { "db": "JVNDB", "id": "JVNDB-2006-002114" }, { "db": "CNNVD", "id": "CNNVD-200609-295" }, { "db": "NVD", "id": "CVE-2006-4847" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:ipswitch:ws_ftp_server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-002114" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This vulnerability was discovered by an anonymous researcher.", "sources": [ { "db": "BID", "id": "20076" } ], "trust": 0.3 }, "cve": "CVE-2006-4847", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CVE-2006-4847", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-20955", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2006-4847", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2006-4847", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200609-295", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-20955", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-20955" }, { "db": "JVNDB", "id": "JVNDB-2006-002114" }, { "db": "CNNVD", "id": "CNNVD-200609-295" }, { "db": "NVD", "id": "CVE-2006-4847" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands. Ipswitch WS_FTP Server is prone to a number of stack-overflow vulnerabilities. Updates are available. \nA successful exploit may lead to remote arbitrary code execution with administrative privileges, facilitating the complete compromise of affected computers. \nIpswitch WS_FTP Server 5.04 and 5.05 are vulnerable to these issues; other versions may also be affected. Ipswitch WS_FTP Server is an FTP service program suitable for Windows systems. There is a typical stack overflow vulnerability in WS_FTP when processing super long XCRC/XSHA1/XMD5 extended command parameters. The exploitation of the vulnerability requires the user to log in to the system with a legal account, but No writable directory is required. \n\n----------------------------------------------------------------------\n\nWant to work within IT-Security?\n\nSecunia is expanding its team of highly skilled security experts. \nWe will help with relocation and obtaining a work permit. \n\nCurrently the following type of positions are available:\nhttp://secunia.com/quality_assurance_analyst/\nhttp://secunia.com/web_application_security_specialist/ \nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\n----------------------------------------------------------------------\n\nTITLE:\nWS_FTP Server FTP Commands Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA21932\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/21932/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nWS_FTP Server 5.x\nhttp://secunia.com/product/3853/\n\nDESCRIPTION:\nA vulnerability have been reported in WS_FTP Server, which can be\nexploited by malicious users to compromise a vulnerable system. \n\nThe vulnerability is due to a boundary error when parsing arguments\nto the \"XCRC\", \"XSHA1\", and \"XMD5\" commands. This can be exploited to\ncause stack-based buffer overflows via overly long command arguments. \n\nThe vulnerability has been reported in version 5.05. \n\nSOLUTION:\nApply patch. \nhttp://ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-4847" }, { "db": "JVNDB", "id": "JVNDB-2006-002114" }, { "db": "BID", "id": "20076" }, { "db": "VULHUB", "id": "VHN-20955" }, { "db": "PACKETSTORM", "id": "50127" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-20955", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-20955" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-4847", "trust": 2.8 }, { "db": "BID", "id": "20076", "trust": 2.0 }, { "db": "SECUNIA", "id": "21932", "trust": 1.8 }, { "db": "OSVDB", "id": "28939", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2006-3655", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2006-002114", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200609-295", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "82965", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-71222", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "16717", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "3335", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-20955", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "50127", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-20955" }, { "db": "BID", "id": "20076" }, { "db": "JVNDB", "id": "JVNDB-2006-002114" }, { "db": "PACKETSTORM", "id": "50127" }, { "db": "CNNVD", "id": "CNNVD-200609-295" }, { "db": "NVD", "id": "CVE-2006-4847" } ] }, "id": "VAR-200609-0297", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-20955" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:57:32.645000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WS_FTP Server 5.05 Hotfix 1", "trust": 0.8, "url": "http://ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp" }, { "title": "Ipswitch WS_FTP Server Buffer Overflow Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=96806" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-002114" }, { "db": "CNNVD", "id": "CNNVD-200609-295" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4847" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/20076" }, { "trust": 1.7, "url": "http://www.osvdb.org/28939" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21932" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2006/3655" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28983" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4847" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4847" }, { "trust": 0.3, "url": "http://www.ipswitch.com/products/ws_ftp/home/index.asp" }, { "trust": 0.3, "url": "/archive/1/447077" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/21932/" }, { "trust": 0.1, "url": "http://secunia.com/quality_assurance_analyst/" }, { "trust": 0.1, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/web_application_security_specialist/" }, { "trust": 0.1, "url": "http://secunia.com/product/3853/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-20955" }, { "db": "BID", "id": "20076" }, { "db": "JVNDB", "id": "JVNDB-2006-002114" }, { "db": "PACKETSTORM", "id": "50127" }, { "db": "CNNVD", "id": "CNNVD-200609-295" }, { "db": "NVD", "id": "CVE-2006-4847" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-20955" }, { "db": "BID", "id": "20076" }, { "db": "JVNDB", "id": "JVNDB-2006-002114" }, { "db": "PACKETSTORM", "id": "50127" }, { "db": "CNNVD", "id": "CNNVD-200609-295" }, { "db": "NVD", "id": "CVE-2006-4847" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-09-19T00:00:00", "db": "VULHUB", "id": "VHN-20955" }, { "date": "2006-09-14T00:00:00", "db": "BID", "id": "20076" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-002114" }, { "date": "2006-09-21T23:56:25", "db": "PACKETSTORM", "id": "50127" }, { "date": "2006-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-295" }, { "date": "2006-09-19T01:07:00", "db": "NVD", "id": "CVE-2006-4847" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-13T00:00:00", "db": "VULHUB", "id": "VHN-20955" }, { "date": "2016-07-05T21:38:00", "db": "BID", "id": "20076" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-002114" }, { "date": "2019-08-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-295" }, { "date": "2024-11-21T00:16:53.137000", "db": "NVD", "id": "CVE-2006-4847" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-295" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ipswitch WS_FTP Server Vulnerable to buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-002114" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-295" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.