Vulnerabilites related to skype - skype
Vulnerability from fkie_nvd
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:skype:skype:5.0.0.105:*:*:*:*:*:*:*",
"matchCriteriaId": "F17A54D5-36B9-43AB-AAAB-50060AB06841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:5.0.0.105:beta:*:*:*:*:*:*",
"matchCriteriaId": "0D24C8F2-480C-4263-A3AD-B0DD6D2E1479",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:5.0.0.123:beta:*:*:*:*:*:*",
"matchCriteriaId": "B1755686-6370-4924-B3EC-2C55E15F64F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:5.0.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "9776A81C-2D3A-40F1-BD03-BDD1FF084BE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:5.0.0.156:*:*:*:*:*:*:*",
"matchCriteriaId": "5561BF25-CAD5-49CC-9944-9D8B18A4DFB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:5.1.0.104:*:*:*:*:*:*:*",
"matchCriteriaId": "BE8AF25D-636D-4E3E-9560-7FA3887B5D8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:5.1.0.112:*:*:*:*:*:*:*",
"matchCriteriaId": "25ADBD4E-7F02-4B41-BAD9-57F487ABC6FF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the client in Skype 5.x before 5.1.0.922 on Mac OS X allows remote authenticated users to execute arbitrary code or cause a denial of service (application crash) via a crafted message."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en el cliente de Skype v5.x antes de v5.1.0.922 en Mac OS X permite a usuarios autenticados remotamente ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (solicitud de bloqueo) a trav\u00e9s de un mensaje manipulado."
}
],
"evaluatorComment": "Per: http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html\r\n\r\n\u0027Please note, Skype\u0027s other clients, e.g. Windows and Linux, are not susceptible to this vulnerability.\u0027",
"id": "CVE-2011-2074",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2011-05-10T18:55:02.590",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html"
},
{
"source": "cve@mitre.org",
"url": "http://isc.sans.edu/diary.html?storyid=10837"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/44522"
},
{
"source": "cve@mitre.org",
"url": "http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/47747"
},
{
"source": "cve@mitre.org",
"url": "http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/1192"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://isc.sans.edu/diary.html?storyid=10837"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/44522"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/47747"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/1192"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:skype:skype:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A0E061A-71C1-433B-AB31-6E2F67F91613",
"versionEndExcluding": "2.0.0.105",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45A2F435-8951-44FC-A081-67B385A36727",
"versionEndExcluding": "2.5.0.79",
"versionStartIncluding": "2.5.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Argument injection vulnerability in the URI handler in Skype 2.0.*.104 and 2.5.*.0 through 2.5.*.78 for Windows allows remote authorized attackers to download arbitrary files via a URL that contains certain command-line switches."
}
],
"evaluatorSolution": "Update to the fixed versions.",
"id": "CVE-2006-2312",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2006-05-19T21:02:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0549.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/20154"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/466428"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.osvdb.org/25658"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/434707/30/4860/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/18038"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.skype.com/security/skype-sb-2006-001.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2006/1871"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26557"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0549.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/20154"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/466428"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.osvdb.org/25658"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/434707/30/4860/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/18038"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.skype.com/security/skype-sb-2006-001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2006/1871"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26557"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-88"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
| Vendor | Product | Version | |
|---|---|---|---|
| skype | skype | * | |
| skype | skype | 0.90.0.5 | |
| skype | skype | 0.90.0.10 | |
| skype | skype | 0.91.0.2 | |
| skype | skype | 0.92.0.4 | |
| skype | skype | 0.93.0.18 | |
| skype | skype | 0.93.1.1 | |
| skype | skype | 0.94.0.19 | |
| skype | skype | 0.94.0.28 | |
| skype | skype | 0.95.0.11 | |
| skype | skype | 0.95.0.25 | |
| skype | skype | 0.95.0.36 | |
| skype | skype | 0.95.0.40 | |
| skype | skype | 0.96.0.1 | |
| skype | skype | 0.96.0.3 | |
| skype | skype | 0.97.0.1 | |
| skype | skype | 0.97.0.3 | |
| skype | skype | 0.97.0.6 | |
| skype | skype | 0.97.0.40 | |
| skype | skype | 0.98.0.04 | |
| skype | skype | 0.98.0.6 | |
| skype | skype | 0.98.0.28 | |
| skype | skype | 0.98.0.42 | |
| skype | skype | 0.98.0.68 | |
| skype | skype | 1.0.0.9 | |
| skype | skype | 1.0.0.10 | |
| skype | skype | 1.0.0.18 | |
| skype | skype | 1.0.0.29 | |
| skype | skype | 1.0.0.94 | |
| skype | skype | 1.0.0.97 | |
| skype | skype | 1.0.0.100 | |
| skype | skype | 1.0.0.106 | |
| skype | skype | 1.1.0.6 | |
| skype | skype | 1.1.0.73 | |
| skype | skype | 1.1.0.79 | |
| skype | skype | 1.2.0.37 | |
| skype | skype | 1.2.0.41 | |
| skype | skype | 1.2.0.48 | |
| skype | skype | 1.3.0.45 | |
| skype | skype | 1.3.0.48 | |
| skype | skype | 1.3.0.51 | |
| skype | skype | 1.3.0.54 | |
| skype | skype | 1.3.0.55 | |
| skype | skype | 1.3.0.57 | |
| skype | skype | 1.3.0.60 | |
| skype | skype | 1.3.0.66 | |
| skype | skype | 1.4.0.71 | |
| skype | skype | 1.4.0.78 | |
| skype | skype | 1.4.0.84 | |
| skype | skype | 2.0.0.69 | |
| skype | skype | 2.0.0.73 | |
| skype | skype | 2.0.0.79 | |
| skype | skype | 2.0.0.81 | |
| skype | skype | 2.0.0.90 | |
| skype | skype | 2.0.0.97 | |
| skype | skype | 2.0.0.103 | |
| skype | skype | 2.0.0.105 | |
| skype | skype | 2.0.0.107 | |
| skype | skype | 2.5.0.72 | |
| skype | skype | 2.5.0.82 | |
| skype | skype | 2.5.0.91 | |
| skype | skype | 2.5.0.113 | |
| skype | skype | 2.5.0.122 | |
| skype | skype | 2.5.0.126 | |
| skype | skype | 2.5.0.130 | |
| skype | skype | 2.5.0.137 | |
| skype | skype | 2.5.0.141 | |
| skype | skype | 2.5.0.151 | |
| skype | skype | 2.5.0.154 | |
| skype | skype | 2.6.0.67 | |
| skype | skype | 2.6.0.74 | |
| skype | skype | 2.6.0.81 | |
| skype | skype | 2.6.0.97 | |
| skype | skype | 2.6.0.103 | |
| skype | skype | 2.6.0.105 | |
| skype | skype | 3.0.0.106 | |
| skype | skype | 3.0.0.123 | |
| skype | skype | 3.0.0.137 | |
| skype | skype | 3.0.0.154 | |
| skype | skype | 3.0.0.190 | |
| skype | skype | 3.0.0.198 | |
| skype | skype | 3.0.0.205 | |
| skype | skype | 3.0.0.209 | |
| skype | skype | 3.0.0.214 | |
| skype | skype | 3.0.0.216 | |
| skype | skype | 3.0.0.217 | |
| skype | skype | 3.0.0.218 | |
| skype | skype | 3.1.0.112 | |
| skype | skype | 3.1.0.134 | |
| skype | skype | 3.1.0.144 | |
| skype | skype | 3.1.0.147 | |
| skype | skype | 3.1.0.150 | |
| skype | skype | 3.1.0.152 | |
| skype | skype | 3.2.0.53 | |
| skype | skype | 3.2.0.63 | |
| skype | skype | 3.2.0.82 | |
| skype | skype | 3.2.0.115 | |
| skype | skype | 3.2.0.145 | |
| skype | skype | 3.2.0.148 | |
| skype | skype | 3.2.0.152 | |
| skype | skype | 3.2.0.158 | |
| skype | skype | 3.2.0.163 | |
| skype | skype | 3.2.0.175 | |
| skype | skype | 3.5.0.107 | |
| skype | skype | 3.5.0.158 | |
| skype | skype | 3.5.0.178 | |
| skype | skype | 3.5.0.202 | |
| skype | skype | 3.5.0.214 | |
| skype | skype | 3.5.0.229 | |
| skype | skype | 3.5.0.234 | |
| skype | skype | 3.5.0.239 | |
| skype | skype | 3.6.0.127 | |
| skype | skype | 3.6.0.159 | |
| skype | skype | 3.6.0.216 | |
| skype | skype | 3.6.0.244 | |
| skype | skype | 3.6.0.248 | |
| skype | skype | 3.8.0.96 | |
| skype | skype | 3.8.0.115 | |
| skype | skype | 3.8.0.139 | |
| skype | skype | 3.8.0.144 | |
| skype | skype | 3.8.0.154 | |
| skype | skype | 3.8.0.180 | |
| skype | skype | 3.8.0.188 | |
| skype | skype | 4.0 | |
| skype | skype | 4.0.0.145 | |
| skype | skype | 4.0.0.150 | |
| skype | skype | 4.0.0.155 | |
| skype | skype | 4.0.0.161 | |
| skype | skype | 4.0.0.166 | |
| skype | skype | 4.0.0.168 | |
| skype | skype | 4.0.0.169 | |
| skype | skype | 4.0.0.176 | |
| skype | skype | 4.0.0.181 | |
| skype | skype | 4.0.0.206 | |
| skype | skype | 4.0.0.215 | |
| skype | skype | 4.0.0.216 | |
| skype | skype | 4.0.0.224 | |
| skype | skype | 4.0.0.226 | |
| skype | skype | 4.0.0.227 | |
| skype | skype | 4.1.0.130 | |
| skype | skype | 4.1.0.130 | |
| skype | skype | 4.1.0.136 | |
| skype | skype | 4.1.0.141 | |
| microsoft | windows | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:skype:skype:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3041A33-C8F4-48E3-8B33-752E1F613881",
"versionEndIncluding": "4.1.0.166",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.90.0.5:beta:*:*:*:*:*:*",
"matchCriteriaId": "4347B1A3-06EB-4B6C-ADFD-87967F7CD9A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.90.0.10:beta:*:*:*:*:*:*",
"matchCriteriaId": "9872E235-52DC-402E-A135-AFC7845474FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.91.0.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "B39A42AF-2C67-4858-8511-42ECEAD00B84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.92.0.4:beta:*:*:*:*:*:*",
"matchCriteriaId": "BD3B70FC-6A5C-4F36-9F64-A27879BBA75C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.93.0.18:beta:*:*:*:*:*:*",
"matchCriteriaId": "77B4C334-4863-40A6-A4C5-F5E2250E6BCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.93.1.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "27D1A581-BB48-4E48-A6F9-442C2031F49B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.94.0.19:beta:*:*:*:*:*:*",
"matchCriteriaId": "4D0BD696-6C7B-4455-BC5D-7092766EF821",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.94.0.28:beta:*:*:*:*:*:*",
"matchCriteriaId": "17EE6ED4-7C68-4E51-BB01-1D83BAE7D4AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.95.0.11:beta:*:*:*:*:*:*",
"matchCriteriaId": "77E346FA-47D3-4220-8AC8-C248E68104E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.95.0.25:beta:*:*:*:*:*:*",
"matchCriteriaId": "39482A01-6B66-4D32-A35E-8868B97F80A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.95.0.36:beta:*:*:*:*:*:*",
"matchCriteriaId": "B7E3A0CC-A6AB-418E-8C77-2E7B2AEBD1BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.95.0.40:beta:*:*:*:*:*:*",
"matchCriteriaId": "7C1E53EA-85CA-44D3-9714-6236A5FBCA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.96.0.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "558A004A-1562-428F-870B-C9219315418A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.96.0.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "5FA2440F-E72B-4093-ABED-F55FAFA0DCEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.97.0.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "9FF45E16-4E79-4FA7-BDF6-28D3B83AE705",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.97.0.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "C9094503-0100-4544-80DA-A87685BABD8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.97.0.6:beta:*:*:*:*:*:*",
"matchCriteriaId": "2C101656-3DD2-46B2-8069-F8931EF2429B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.97.0.40:beta:*:*:*:*:*:*",
"matchCriteriaId": "2B63F2F2-628B-4E6F-81C2-CBAE0A95D775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.98.0.04:beta:*:*:*:*:*:*",
"matchCriteriaId": "44EB1F86-6D75-448A-BD95-084E2FB867EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.98.0.6:beta:*:*:*:*:*:*",
"matchCriteriaId": "85E9F595-EF59-4D72-840A-67DBCC06BE21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.98.0.28:beta:*:*:*:*:*:*",
"matchCriteriaId": "02A989D1-8957-4E4E-B418-E96165008F7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.98.0.42:beta:*:*:*:*:*:*",
"matchCriteriaId": "16796596-C3EB-4D51-8AD6-B71EFD501C49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.98.0.68:beta:*:*:*:*:*:*",
"matchCriteriaId": "0BC8B49D-F727-4929-945C-E99C0336BCF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B6B904-DF16-49AA-B481-A29C4678A732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C4D2F33D-0000-4C65-BFB6-D61B6C474A95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "68588557-B1B8-46D7-9AF7-70F9B30D6166",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "7E73FD84-4C29-44DA-9E3F-8279787B2D78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.94:*:*:*:*:*:*:*",
"matchCriteriaId": "C64674AE-8C59-4878-BD45-279C3DAABBDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.97:*:*:*:*:*:*:*",
"matchCriteriaId": "97FEDF7C-3DE1-46E6-B9C0-A585E4C6B0AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.100:*:*:*:*:*:*:*",
"matchCriteriaId": "17833EDB-F84E-4A01-A1C7-09B3C22FC267",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.106:*:*:*:*:*:*:*",
"matchCriteriaId": "E01D6175-0976-4032-9D27-01F51205C6C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F678DC-42BD-47F5-AD6D-3CB666CAFD0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.1.0.73:*:*:*:*:*:*:*",
"matchCriteriaId": "791D4B01-A6B9-401A-8DCD-CB628A73777D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.1.0.79:*:*:*:*:*:*:*",
"matchCriteriaId": "C6ADA513-8C04-4C59-A092-216A135FCF61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.2.0.37:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B9862D-5582-44D1-853C-6C3A90B9F913",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.2.0.41:*:*:*:*:*:*:*",
"matchCriteriaId": "9FBC565C-EB87-4B1B-B8CE-0A4D0CA2129E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.2.0.48:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E80B11-3202-4EA9-AD09-28E45A9095DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.45:*:*:*:*:*:*:*",
"matchCriteriaId": "A88FFB24-E27E-419B-9AD5-2F0F7E87D480",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.48:*:*:*:*:*:*:*",
"matchCriteriaId": "417E40F7-21E4-45A1-89AB-76E678AA8779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.51:*:*:*:*:*:*:*",
"matchCriteriaId": "6B86DD6A-2B02-4ECC-A715-C6122EA702D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.54:*:*:*:*:*:*:*",
"matchCriteriaId": "BB05BB0B-EC51-4078-BEB9-387C63CBA657",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.55:*:*:*:*:*:*:*",
"matchCriteriaId": "190E2D35-CB24-450A-B0F7-E13C02D3D68F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.57:*:*:*:*:*:*:*",
"matchCriteriaId": "04CC9C86-4C59-4E83-92D0-47CB379B3885",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.60:*:*:*:*:*:*:*",
"matchCriteriaId": "73E7C75C-31FD-41CB-953D-296E359CAB50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.66:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D0FF8F-6B44-4739-9D63-FC390546A680",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.4.0.71:*:*:*:*:*:*:*",
"matchCriteriaId": "8986EC65-EF3C-479B-AD8F-22C4AA09CBE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.4.0.78:*:*:*:*:*:*:*",
"matchCriteriaId": "4D9535F9-C39D-48B6-852D-D4FA487E543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.4.0.84:*:*:*:*:*:*:*",
"matchCriteriaId": "88931FE1-276F-450A-929C-A39F9877D840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.69:*:*:*:*:*:*:*",
"matchCriteriaId": "126A07A6-79DF-4E46-A102-B1B05F859642",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.73:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D4A9C3-A418-42A1-AD3F-259B3249D222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.79:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A169E6-8A9E-4179-8BB0-B2D11C9E9D59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.81:*:*:*:*:*:*:*",
"matchCriteriaId": "EBFBA895-802E-4D9C-A15E-6BF97D63B2FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.90:*:*:*:*:*:*:*",
"matchCriteriaId": "0C713220-2A47-4A3B-9466-A57D29318F83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.97:*:*:*:*:*:*:*",
"matchCriteriaId": "C35A3470-5AAC-4E70-81C0-37BEE3A6E2D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.103:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A62B7B-50E6-4FD5-B14E-5EE7F6FA8353",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.105:*:*:*:*:*:*:*",
"matchCriteriaId": "9323C4E9-2FF9-4D92-B70B-CF7A5C385FF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.107:*:*:*:*:*:*:*",
"matchCriteriaId": "E07F388E-770E-4450-B28D-DD2FA799A1F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.72:*:*:*:*:*:*:*",
"matchCriteriaId": "0AA3B772-DF05-4AF6-9C1A-4CA5B0FF3E82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.82:*:*:*:*:*:*:*",
"matchCriteriaId": "5C09AFC0-4829-459C-9A02-6D6166840F2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.91:*:*:*:*:*:*:*",
"matchCriteriaId": "5FB3D033-697A-4B87-930A-58F74DCA4481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.113:*:*:*:*:*:*:*",
"matchCriteriaId": "D549B7F6-1A95-494A-9B75-70FFB41A38E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.122:*:*:*:*:*:*:*",
"matchCriteriaId": "6433ACA2-0CEB-4EE3-84D2-94EAF015DC8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.126:*:*:*:*:*:*:*",
"matchCriteriaId": "511D24FC-B5DE-42BD-A3A1-140B677CB5F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.130:*:*:*:*:*:*:*",
"matchCriteriaId": "9A4EA665-99DE-4F60-A8DF-19E9FDAC45F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.137:*:*:*:*:*:*:*",
"matchCriteriaId": "79EA2C60-7AE5-4FED-A800-AF09B25B5CD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.141:*:*:*:*:*:*:*",
"matchCriteriaId": "AD281AEE-1DB2-4313-8F87-A5A07CC977EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.151:*:*:*:*:*:*:*",
"matchCriteriaId": "7ECC2D86-F555-4886-98F7-1C3FF27E1827",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.154:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA42766-129E-47EE-AE68-827248E39488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.6.0.67:beta:*:*:*:*:*:*",
"matchCriteriaId": "F03FDE58-53B3-4060-B285-ABC9E223EE44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.6.0.74:beta:*:*:*:*:*:*",
"matchCriteriaId": "80B0F546-5D5A-44A2-8758-86D6355E2F69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.6.0.81:beta:*:*:*:*:*:*",
"matchCriteriaId": "7F416029-905B-450B-BE0B-2BA86F1BFD0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.6.0.97:beta:*:*:*:*:*:*",
"matchCriteriaId": "5C2E1960-3746-478D-ABC9-B95071A8B1EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.6.0.103:beta:*:*:*:*:*:*",
"matchCriteriaId": "B5C981CC-42D8-4BF2-99D1-0A500175E512",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.6.0.105:beta:*:*:*:*:*:*",
"matchCriteriaId": "E7D12ECC-424F-4E49-8937-CF35FF9CE5CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.106:beta:*:*:*:*:*:*",
"matchCriteriaId": "FA7C122A-E968-4A59-BD50-E9F8F98005BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.123:beta:*:*:*:*:*:*",
"matchCriteriaId": "F735E486-0B0D-4F97-8E8F-9CDFFE3B4DE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.137:beta:*:*:*:*:*:*",
"matchCriteriaId": "8A33F38D-0636-4F70-9E88-F9706C0BFD7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.154:beta:*:*:*:*:*:*",
"matchCriteriaId": "E7CA33B3-50EF-479B-8201-72CCCC78B259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.190:*:*:*:*:*:*:*",
"matchCriteriaId": "EE4535E7-C455-49A7-99D9-2103C69D1A83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.198:*:*:*:*:*:*:*",
"matchCriteriaId": "5A042F07-E1C0-46C5-904D-725DED823B15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.205:*:*:*:*:*:*:*",
"matchCriteriaId": "45270047-5735-4EC3-BCE1-1EB987AB9AB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.209:*:*:*:*:*:*:*",
"matchCriteriaId": "64AA9FD4-B7BB-4AF2-9372-B1206291C424",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.214:*:*:*:*:*:*:*",
"matchCriteriaId": "9A6BCEAE-89BF-494A-B8ED-8464F2922924",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.216:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC8D0AF-E420-47F8-BACE-20BA862C89A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.217:*:*:*:*:*:*:*",
"matchCriteriaId": "DE388BAB-2CFA-4931-82AE-244A25CCAC92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.218:*:*:*:*:*:*:*",
"matchCriteriaId": "AC57AFCF-1DFE-4207-94C2-F8D50FFCDB0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.1.0.112:beta:*:*:*:*:*:*",
"matchCriteriaId": "430996CF-EEAF-4844-A8D6-0ED40B5EBC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.1.0.134:beta:*:*:*:*:*:*",
"matchCriteriaId": "42A5D0BA-3A78-4DBC-B92B-643CAD4917F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.1.0.144:*:*:*:*:*:*:*",
"matchCriteriaId": "FBBCF519-2C0C-4128-BF30-A4EA27083F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.1.0.147:*:*:*:*:*:*:*",
"matchCriteriaId": "909B644A-C6AC-4A9E-8603-7709E243A9A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.1.0.150:*:*:*:*:*:*:*",
"matchCriteriaId": "1F36126F-1BE3-4BE3-AFC6-E968F852025F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.1.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "F62E1DDA-8D3A-48A7-9C5A-11346AC6D353",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.53:beta:*:*:*:*:*:*",
"matchCriteriaId": "29E9C27A-B036-4858-9230-39DC68F51364",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.63:beta:*:*:*:*:*:*",
"matchCriteriaId": "774831F5-76C6-4E7A-9A9B-81246EE5E5CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.82:beta:*:*:*:*:*:*",
"matchCriteriaId": "DD315ADB-3FE8-41B5-9769-5B5C60915A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.115:beta:*:*:*:*:*:*",
"matchCriteriaId": "CD9C7D5D-4851-467C-B65B-4F991EDF1E6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.145:*:*:*:*:*:*:*",
"matchCriteriaId": "87BED1EE-702C-4B2C-96F5-10DD74E3A2B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.148:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8306B3-073C-4E60-8EC8-6E480287F162",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAB23AA-62F2-4ABA-BB45-8A0A0FA20092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.158:*:*:*:*:*:*:*",
"matchCriteriaId": "ECCCBBB5-9CFB-4DA0-A29E-2E76B1CF6F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.163:*:*:*:*:*:*:*",
"matchCriteriaId": "63F6DC03-719D-4475-80D9-D8A5C56040ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.175:*:*:*:*:*:*:*",
"matchCriteriaId": "C2222B5B-298D-4A60-BB28-FFA9CC6F4B19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.107:beta:*:*:*:*:*:*",
"matchCriteriaId": "6BFBA483-C37B-4F11-8B40-6D47FC26D707",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.158:beta:*:*:*:*:*:*",
"matchCriteriaId": "1118ABD4-B464-4B74-BB66-19D74E998EAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.178:*:*:*:*:*:*:*",
"matchCriteriaId": "DE886272-5B93-477D-B60E-F8E7C34BA475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.202:*:*:*:*:*:*:*",
"matchCriteriaId": "47173E47-6916-4814-AECB-F50F060C0F53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.214:*:*:*:*:*:*:*",
"matchCriteriaId": "04E6928A-D6A4-480C-A45D-2ADF7C51C5B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.229:*:*:*:*:*:*:*",
"matchCriteriaId": "FEC8C9A8-3290-4E3F-A69A-BB522AD1608A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.234:*:*:*:*:*:*:*",
"matchCriteriaId": "663F3CF2-348E-4635-877F-75135C1158C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.239:*:*:*:*:*:*:*",
"matchCriteriaId": "94D9C8CB-4BF1-41EB-9B10-DD52D722AE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.6.0.127:beta:*:*:*:*:*:*",
"matchCriteriaId": "4475186E-992B-4D02-8D47-76518DE1163D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.6.0.159:beta:*:*:*:*:*:*",
"matchCriteriaId": "EE4160A1-F8F5-4376-8AAA-905895FFAC7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.6.0.216:*:*:*:*:*:*:*",
"matchCriteriaId": "AA893BCF-F609-4962-A30C-2E64D3528063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.6.0.244:*:*:*:*:*:*:*",
"matchCriteriaId": "78EBFF6B-7622-46B4-8D9A-07EDA1A1555D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.6.0.248:*:*:*:*:*:*:*",
"matchCriteriaId": "C46BEF3E-1062-4766-A4FF-55A3DB1AC144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.8.0.96:beta:*:*:*:*:*:*",
"matchCriteriaId": "5D1A63EE-A6C7-46DD-ADDE-97486144683F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.8.0.115:*:*:*:*:*:*:*",
"matchCriteriaId": "5DCD3163-F200-477B-B77F-76E6086D0B68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.8.0.139:*:*:*:*:*:*:*",
"matchCriteriaId": "991E59B3-4F9E-45A7-9C9A-31F5F19B5017",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.8.0.144:*:*:*:*:*:*:*",
"matchCriteriaId": "9297E18A-390B-4499-BD1E-4FDF2A833EC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.8.0.154:*:*:*:*:*:*:*",
"matchCriteriaId": "00997409-6334-443D-A1D1-D3FD968D6184",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.8.0.180:*:*:*:*:*:*:*",
"matchCriteriaId": "AFD78C82-1752-4830-BF88-1EF31E655CB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.8.0.188:*:*:*:*:*:*:*",
"matchCriteriaId": "CB7108CB-6748-410B-8610-177748A1064B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0:beta_3:*:*:*:*:*:*",
"matchCriteriaId": "92DBF2AA-9563-4A4A-9AF4-E251549CA90A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.145:beta:*:*:*:*:*:*",
"matchCriteriaId": "45E9C376-0EE4-40B2-85CA-C0A514C024AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.150:beta:*:*:*:*:*:*",
"matchCriteriaId": "8AF6CA00-EA1A-4D1A-A92C-B66F1C6D1298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.155:beta_1:*:*:*:*:*:*",
"matchCriteriaId": "DA057530-AFC2-4B48-8A61-089D7A1C8827",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.161:beta:*:*:*:*:*:*",
"matchCriteriaId": "29BEA3DA-9F3F-48C2-8090-2DD8369E4188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.166:beta_2:*:*:*:*:*:*",
"matchCriteriaId": "E7B7C371-214A-4827-BDF8-B593E6C8D965",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.168:beta_2:*:*:*:*:*:*",
"matchCriteriaId": "47B37889-FD25-44CD-B7D9-DABAEEBB08A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.169:beta_2:*:*:*:*:*:*",
"matchCriteriaId": "C4B5BC42-DB73-483E-9853-887200FA0B4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.176:beta_3:*:*:*:*:*:*",
"matchCriteriaId": "F0310618-73CB-4E03-B404-413B48C4814A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.181:beta_3:*:*:*:*:*:*",
"matchCriteriaId": "CF55ADFE-588A-47BC-9B08-414CF5DF7A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.206:*:*:*:*:*:*:*",
"matchCriteriaId": "EC55DBC2-1B0F-4BF0-8420-238825A38940",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.215:*:*:*:*:*:*:*",
"matchCriteriaId": "B7ED6478-E4F3-4EE7-A88E-A51E26981595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.216:*:*:*:*:*:*:*",
"matchCriteriaId": "395563B5-D9D6-418F-924A-DB9D7D0C1A01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.224:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3FB018-5F7F-4EA4-B625-94BAFF56692E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.226:*:*:*:*:*:*:*",
"matchCriteriaId": "12D3CA67-2764-4D83-A2D2-58542DF0DA06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.227:*:*:*:*:*:*:*",
"matchCriteriaId": "58A6DD96-46A8-40E7-A872-BB1D540A7A58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.1.0.130:*:*:*:*:*:*:*",
"matchCriteriaId": "5531E97B-8ECD-4DFB-B65D-8F0E49907084",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.1.0.130:beta:*:*:*:*:*:*",
"matchCriteriaId": "6D5AD56B-9D77-448B-B113-96DA92E6BCA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.1.0.136:*:*:*:*:*:*:*",
"matchCriteriaId": "55542083-CE3A-4447-9F65-38F586926DF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.1.0.141:*:*:*:*:*:*:*",
"matchCriteriaId": "E6340539-8060-47A3-935E-FB6C81C96A66",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Extras Manager before 2.0.0.67 in Skype before 4.1.0.179 on Windows has unknown impact and attack vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad no espec\u00edfica en Extras Manager anteriores a v2.0.0.67 en Skype anteriores a v4.1.0.179 en Windows, tiene impacto y vectores de ataque desconocidos.\r\n"
}
],
"id": "CVE-2009-4741",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-03-26T20:30:00.377",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37012"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/36459"
},
{
"source": "cve@mitre.org",
"url": "https://developer.skype.com/WindowsSkype/ReleaseNotes#head-21c1b2583e7cc405f994ca162d574fb15a6e986b"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37012"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/36459"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://developer.skype.com/WindowsSkype/ReleaseNotes#head-21c1b2583e7cc405f994ca162d574fb15a6e986b"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
| ▼ | URL | Tags | |
|---|---|---|---|
| cve@mitre.org | http://marc.info/?l=bugtraq&m=110374568916303&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://marc.info/?l=bugtraq&m=110868557905786&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://www.securityfocus.com/bid/12081 | Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory | |
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/18644 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=110374568916303&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=110868557905786&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/12081 | Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/18644 | Third Party Advisory, VDB Entry |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:skype:skype:0.92.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "7F48FDA5-1522-476F-BF29-32D5C41A02D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2A28B919-9FC1-4247-94A6-CC4DCB0786B8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Skype 0.92.0.12 and 1.0.0.1 for Linux, and possibly other versions, creates the /usr/share/skype/lang directory with world-writable permissions, which allows local users to modify language files and possibly conduct social engineering or other attacks."
}
],
"id": "CVE-2004-1778",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-12-22T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=110374568916303\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=110868557905786\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/12081"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18644"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=110374568916303\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=110868557905786\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/12081"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18644"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-276"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
| Vendor | Product | Version | |
|---|---|---|---|
| skype | skype | * | |
| skype | skype | 0.90.0.5 | |
| skype | skype | 0.90.0.10 | |
| skype | skype | 0.91.0.2 | |
| skype | skype | 0.92.0.4 | |
| skype | skype | 0.93.0.18 | |
| skype | skype | 0.93.1.1 | |
| skype | skype | 0.94.0.19 | |
| skype | skype | 0.94.0.28 | |
| skype | skype | 0.95.0.11 | |
| skype | skype | 0.95.0.25 | |
| skype | skype | 0.95.0.36 | |
| skype | skype | 0.95.0.40 | |
| skype | skype | 0.96.0.1 | |
| skype | skype | 0.96.0.3 | |
| skype | skype | 0.97.0.1 | |
| skype | skype | 0.97.0.3 | |
| skype | skype | 0.97.0.6 | |
| skype | skype | 0.97.0.40 | |
| skype | skype | 0.98.0.04 | |
| skype | skype | 0.98.0.6 | |
| skype | skype | 0.98.0.28 | |
| skype | skype | 0.98.0.42 | |
| skype | skype | 0.98.0.68 | |
| skype | skype | 1.0.0.9 | |
| skype | skype | 1.0.0.10 | |
| skype | skype | 1.0.0.18 | |
| skype | skype | 1.0.0.29 | |
| skype | skype | 1.0.0.94 | |
| skype | skype | 1.0.0.97 | |
| skype | skype | 1.0.0.100 | |
| skype | skype | 1.0.0.106 | |
| skype | skype | 1.1.0.6 | |
| skype | skype | 1.1.0.73 | |
| skype | skype | 1.1.0.79 | |
| skype | skype | 1.2.0.37 | |
| skype | skype | 1.2.0.41 | |
| skype | skype | 1.2.0.48 | |
| skype | skype | 1.3.0.45 | |
| skype | skype | 1.3.0.48 | |
| skype | skype | 1.3.0.51 | |
| skype | skype | 1.3.0.54 | |
| skype | skype | 1.3.0.55 | |
| skype | skype | 1.3.0.57 | |
| skype | skype | 1.3.0.60 | |
| skype | skype | 1.3.0.66 | |
| skype | skype | 1.4.0.71 | |
| skype | skype | 1.4.0.78 | |
| skype | skype | 1.4.0.84 | |
| skype | skype | 2.0.0.69 | |
| skype | skype | 2.0.0.73 | |
| skype | skype | 2.0.0.79 | |
| skype | skype | 2.0.0.81 | |
| skype | skype | 2.0.0.90 | |
| skype | skype | 2.0.0.97 | |
| skype | skype | 2.0.0.103 | |
| skype | skype | 2.0.0.105 | |
| skype | skype | 2.0.0.107 | |
| skype | skype | 2.5.0.72 | |
| skype | skype | 2.5.0.82 | |
| skype | skype | 2.5.0.91 | |
| skype | skype | 2.5.0.113 | |
| skype | skype | 2.5.0.122 | |
| skype | skype | 2.5.0.126 | |
| skype | skype | 2.5.0.130 | |
| skype | skype | 2.5.0.137 | |
| skype | skype | 2.5.0.141 | |
| skype | skype | 2.5.0.151 | |
| skype | skype | 2.5.0.154 | |
| skype | skype | 2.6.0.67 | |
| skype | skype | 2.6.0.74 | |
| skype | skype | 2.6.0.81 | |
| skype | skype | 2.6.0.97 | |
| skype | skype | 2.6.0.103 | |
| skype | skype | 2.6.0.105 | |
| skype | skype | 3.0.0.106 | |
| skype | skype | 3.0.0.123 | |
| skype | skype | 3.0.0.137 | |
| skype | skype | 3.0.0.154 | |
| skype | skype | 3.0.0.190 | |
| skype | skype | 3.0.0.198 | |
| skype | skype | 3.0.0.205 | |
| skype | skype | 3.0.0.209 | |
| skype | skype | 3.0.0.214 | |
| skype | skype | 3.0.0.216 | |
| skype | skype | 3.0.0.217 | |
| skype | skype | 3.0.0.218 | |
| skype | skype | 3.1.0.112 | |
| skype | skype | 3.1.0.134 | |
| skype | skype | 3.1.0.144 | |
| skype | skype | 3.1.0.147 | |
| skype | skype | 3.1.0.150 | |
| skype | skype | 3.1.0.152 | |
| skype | skype | 3.2.0.53 | |
| skype | skype | 3.2.0.63 | |
| skype | skype | 3.2.0.82 | |
| skype | skype | 3.2.0.115 | |
| skype | skype | 3.2.0.145 | |
| skype | skype | 3.2.0.148 | |
| skype | skype | 3.2.0.152 | |
| skype | skype | 3.2.0.158 | |
| skype | skype | 3.2.0.163 | |
| skype | skype | 3.2.0.175 | |
| skype | skype | 3.5.0.107 | |
| skype | skype | 3.5.0.158 | |
| skype | skype | 3.5.0.178 | |
| skype | skype | 3.5.0.202 | |
| skype | skype | 3.5.0.214 | |
| skype | skype | 3.5.0.229 | |
| skype | skype | 3.5.0.234 | |
| skype | skype | 3.5.0.239 | |
| skype | skype | 3.6.0.127 | |
| skype | skype | 3.6.0.159 | |
| skype | skype | 3.6.0.216 | |
| skype | skype | 3.6.0.244 | |
| skype | skype | 3.6.0.248 | |
| skype | skype | 3.8.0.96 | |
| skype | skype | 3.8.0.115 | |
| skype | skype | 3.8.0.139 | |
| skype | skype | 3.8.0.144 | |
| skype | skype | 3.8.0.154 | |
| skype | skype | 3.8.0.180 | |
| skype | skype | 3.8.0.188 | |
| skype | skype | 4.0 | |
| skype | skype | 4.0.0.145 | |
| skype | skype | 4.0.0.150 | |
| skype | skype | 4.0.0.155 | |
| skype | skype | 4.0.0.161 | |
| skype | skype | 4.0.0.166 | |
| skype | skype | 4.0.0.168 | |
| skype | skype | 4.0.0.169 | |
| skype | skype | 4.0.0.176 | |
| skype | skype | 4.0.0.181 | |
| skype | skype | 4.0.0.206 | |
| skype | skype | 4.0.0.215 | |
| skype | skype | 4.0.0.216 | |
| skype | skype | 4.0.0.224 | |
| skype | skype | 4.0.0.226 | |
| skype | skype | 4.0.0.227 | |
| skype | skype | 4.1.0.130 | |
| skype | skype | 4.1.0.130 | |
| skype | skype | 4.1.0.136 | |
| skype | skype | 4.1.0.141 | |
| skype | skype | 4.1.0.166 | |
| skype | skype | 4.1.0.179 | |
| skype | skype | 4.2.0.141 | |
| skype | skype | 4.2.0.152 | |
| skype | skype | 4.2.0.155 | |
| skype | skype | 4.2.0.158 | |
| skype | skype | 4.2.0.163 | |
| skype | skype | 4.2.0.166 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:skype:skype:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8BEA240-02D3-45F3-AA3C-CD95DD81A935",
"versionEndIncluding": "4.2.0.169",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.90.0.5:beta:*:*:*:*:*:*",
"matchCriteriaId": "4347B1A3-06EB-4B6C-ADFD-87967F7CD9A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.90.0.10:beta:*:*:*:*:*:*",
"matchCriteriaId": "9872E235-52DC-402E-A135-AFC7845474FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.91.0.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "B39A42AF-2C67-4858-8511-42ECEAD00B84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.92.0.4:beta:*:*:*:*:*:*",
"matchCriteriaId": "BD3B70FC-6A5C-4F36-9F64-A27879BBA75C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.93.0.18:beta:*:*:*:*:*:*",
"matchCriteriaId": "77B4C334-4863-40A6-A4C5-F5E2250E6BCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.93.1.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "27D1A581-BB48-4E48-A6F9-442C2031F49B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.94.0.19:beta:*:*:*:*:*:*",
"matchCriteriaId": "4D0BD696-6C7B-4455-BC5D-7092766EF821",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.94.0.28:beta:*:*:*:*:*:*",
"matchCriteriaId": "17EE6ED4-7C68-4E51-BB01-1D83BAE7D4AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.95.0.11:beta:*:*:*:*:*:*",
"matchCriteriaId": "77E346FA-47D3-4220-8AC8-C248E68104E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.95.0.25:beta:*:*:*:*:*:*",
"matchCriteriaId": "39482A01-6B66-4D32-A35E-8868B97F80A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.95.0.36:beta:*:*:*:*:*:*",
"matchCriteriaId": "B7E3A0CC-A6AB-418E-8C77-2E7B2AEBD1BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.95.0.40:beta:*:*:*:*:*:*",
"matchCriteriaId": "7C1E53EA-85CA-44D3-9714-6236A5FBCA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.96.0.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "558A004A-1562-428F-870B-C9219315418A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.96.0.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "5FA2440F-E72B-4093-ABED-F55FAFA0DCEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.97.0.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "9FF45E16-4E79-4FA7-BDF6-28D3B83AE705",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.97.0.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "C9094503-0100-4544-80DA-A87685BABD8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.97.0.6:beta:*:*:*:*:*:*",
"matchCriteriaId": "2C101656-3DD2-46B2-8069-F8931EF2429B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.97.0.40:beta:*:*:*:*:*:*",
"matchCriteriaId": "2B63F2F2-628B-4E6F-81C2-CBAE0A95D775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.98.0.04:beta:*:*:*:*:*:*",
"matchCriteriaId": "44EB1F86-6D75-448A-BD95-084E2FB867EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.98.0.6:beta:*:*:*:*:*:*",
"matchCriteriaId": "85E9F595-EF59-4D72-840A-67DBCC06BE21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.98.0.28:beta:*:*:*:*:*:*",
"matchCriteriaId": "02A989D1-8957-4E4E-B418-E96165008F7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.98.0.42:beta:*:*:*:*:*:*",
"matchCriteriaId": "16796596-C3EB-4D51-8AD6-B71EFD501C49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:0.98.0.68:beta:*:*:*:*:*:*",
"matchCriteriaId": "0BC8B49D-F727-4929-945C-E99C0336BCF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B6B904-DF16-49AA-B481-A29C4678A732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C4D2F33D-0000-4C65-BFB6-D61B6C474A95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "68588557-B1B8-46D7-9AF7-70F9B30D6166",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "7E73FD84-4C29-44DA-9E3F-8279787B2D78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.94:*:*:*:*:*:*:*",
"matchCriteriaId": "C64674AE-8C59-4878-BD45-279C3DAABBDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.97:*:*:*:*:*:*:*",
"matchCriteriaId": "97FEDF7C-3DE1-46E6-B9C0-A585E4C6B0AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.100:*:*:*:*:*:*:*",
"matchCriteriaId": "17833EDB-F84E-4A01-A1C7-09B3C22FC267",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.0.0.106:*:*:*:*:*:*:*",
"matchCriteriaId": "E01D6175-0976-4032-9D27-01F51205C6C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F678DC-42BD-47F5-AD6D-3CB666CAFD0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.1.0.73:*:*:*:*:*:*:*",
"matchCriteriaId": "791D4B01-A6B9-401A-8DCD-CB628A73777D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.1.0.79:*:*:*:*:*:*:*",
"matchCriteriaId": "C6ADA513-8C04-4C59-A092-216A135FCF61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.2.0.37:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B9862D-5582-44D1-853C-6C3A90B9F913",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.2.0.41:*:*:*:*:*:*:*",
"matchCriteriaId": "9FBC565C-EB87-4B1B-B8CE-0A4D0CA2129E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.2.0.48:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E80B11-3202-4EA9-AD09-28E45A9095DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.45:*:*:*:*:*:*:*",
"matchCriteriaId": "A88FFB24-E27E-419B-9AD5-2F0F7E87D480",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.48:*:*:*:*:*:*:*",
"matchCriteriaId": "417E40F7-21E4-45A1-89AB-76E678AA8779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.51:*:*:*:*:*:*:*",
"matchCriteriaId": "6B86DD6A-2B02-4ECC-A715-C6122EA702D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.54:*:*:*:*:*:*:*",
"matchCriteriaId": "BB05BB0B-EC51-4078-BEB9-387C63CBA657",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.55:*:*:*:*:*:*:*",
"matchCriteriaId": "190E2D35-CB24-450A-B0F7-E13C02D3D68F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.57:*:*:*:*:*:*:*",
"matchCriteriaId": "04CC9C86-4C59-4E83-92D0-47CB379B3885",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.60:*:*:*:*:*:*:*",
"matchCriteriaId": "73E7C75C-31FD-41CB-953D-296E359CAB50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.3.0.66:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D0FF8F-6B44-4739-9D63-FC390546A680",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.4.0.71:*:*:*:*:*:*:*",
"matchCriteriaId": "8986EC65-EF3C-479B-AD8F-22C4AA09CBE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.4.0.78:*:*:*:*:*:*:*",
"matchCriteriaId": "4D9535F9-C39D-48B6-852D-D4FA487E543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:1.4.0.84:*:*:*:*:*:*:*",
"matchCriteriaId": "88931FE1-276F-450A-929C-A39F9877D840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.69:*:*:*:*:*:*:*",
"matchCriteriaId": "126A07A6-79DF-4E46-A102-B1B05F859642",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.73:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D4A9C3-A418-42A1-AD3F-259B3249D222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.79:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A169E6-8A9E-4179-8BB0-B2D11C9E9D59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.81:*:*:*:*:*:*:*",
"matchCriteriaId": "EBFBA895-802E-4D9C-A15E-6BF97D63B2FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.90:*:*:*:*:*:*:*",
"matchCriteriaId": "0C713220-2A47-4A3B-9466-A57D29318F83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.97:*:*:*:*:*:*:*",
"matchCriteriaId": "C35A3470-5AAC-4E70-81C0-37BEE3A6E2D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.103:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A62B7B-50E6-4FD5-B14E-5EE7F6FA8353",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.105:*:*:*:*:*:*:*",
"matchCriteriaId": "9323C4E9-2FF9-4D92-B70B-CF7A5C385FF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.0.0.107:*:*:*:*:*:*:*",
"matchCriteriaId": "E07F388E-770E-4450-B28D-DD2FA799A1F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.72:*:*:*:*:*:*:*",
"matchCriteriaId": "0AA3B772-DF05-4AF6-9C1A-4CA5B0FF3E82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.82:*:*:*:*:*:*:*",
"matchCriteriaId": "5C09AFC0-4829-459C-9A02-6D6166840F2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.91:*:*:*:*:*:*:*",
"matchCriteriaId": "5FB3D033-697A-4B87-930A-58F74DCA4481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.113:*:*:*:*:*:*:*",
"matchCriteriaId": "D549B7F6-1A95-494A-9B75-70FFB41A38E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.122:*:*:*:*:*:*:*",
"matchCriteriaId": "6433ACA2-0CEB-4EE3-84D2-94EAF015DC8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.126:*:*:*:*:*:*:*",
"matchCriteriaId": "511D24FC-B5DE-42BD-A3A1-140B677CB5F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.130:*:*:*:*:*:*:*",
"matchCriteriaId": "9A4EA665-99DE-4F60-A8DF-19E9FDAC45F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.137:*:*:*:*:*:*:*",
"matchCriteriaId": "79EA2C60-7AE5-4FED-A800-AF09B25B5CD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.141:*:*:*:*:*:*:*",
"matchCriteriaId": "AD281AEE-1DB2-4313-8F87-A5A07CC977EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.151:*:*:*:*:*:*:*",
"matchCriteriaId": "7ECC2D86-F555-4886-98F7-1C3FF27E1827",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.5.0.154:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA42766-129E-47EE-AE68-827248E39488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.6.0.67:beta:*:*:*:*:*:*",
"matchCriteriaId": "F03FDE58-53B3-4060-B285-ABC9E223EE44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.6.0.74:beta:*:*:*:*:*:*",
"matchCriteriaId": "80B0F546-5D5A-44A2-8758-86D6355E2F69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.6.0.81:beta:*:*:*:*:*:*",
"matchCriteriaId": "7F416029-905B-450B-BE0B-2BA86F1BFD0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.6.0.97:beta:*:*:*:*:*:*",
"matchCriteriaId": "5C2E1960-3746-478D-ABC9-B95071A8B1EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.6.0.103:beta:*:*:*:*:*:*",
"matchCriteriaId": "B5C981CC-42D8-4BF2-99D1-0A500175E512",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:2.6.0.105:beta:*:*:*:*:*:*",
"matchCriteriaId": "E7D12ECC-424F-4E49-8937-CF35FF9CE5CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.106:beta:*:*:*:*:*:*",
"matchCriteriaId": "FA7C122A-E968-4A59-BD50-E9F8F98005BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.123:beta:*:*:*:*:*:*",
"matchCriteriaId": "F735E486-0B0D-4F97-8E8F-9CDFFE3B4DE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.137:beta:*:*:*:*:*:*",
"matchCriteriaId": "8A33F38D-0636-4F70-9E88-F9706C0BFD7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.154:beta:*:*:*:*:*:*",
"matchCriteriaId": "E7CA33B3-50EF-479B-8201-72CCCC78B259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.190:*:*:*:*:*:*:*",
"matchCriteriaId": "EE4535E7-C455-49A7-99D9-2103C69D1A83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.198:*:*:*:*:*:*:*",
"matchCriteriaId": "5A042F07-E1C0-46C5-904D-725DED823B15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.205:*:*:*:*:*:*:*",
"matchCriteriaId": "45270047-5735-4EC3-BCE1-1EB987AB9AB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.209:*:*:*:*:*:*:*",
"matchCriteriaId": "64AA9FD4-B7BB-4AF2-9372-B1206291C424",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.214:*:*:*:*:*:*:*",
"matchCriteriaId": "9A6BCEAE-89BF-494A-B8ED-8464F2922924",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.216:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC8D0AF-E420-47F8-BACE-20BA862C89A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.217:*:*:*:*:*:*:*",
"matchCriteriaId": "DE388BAB-2CFA-4931-82AE-244A25CCAC92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.0.0.218:*:*:*:*:*:*:*",
"matchCriteriaId": "AC57AFCF-1DFE-4207-94C2-F8D50FFCDB0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.1.0.112:beta:*:*:*:*:*:*",
"matchCriteriaId": "430996CF-EEAF-4844-A8D6-0ED40B5EBC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.1.0.134:beta:*:*:*:*:*:*",
"matchCriteriaId": "42A5D0BA-3A78-4DBC-B92B-643CAD4917F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.1.0.144:*:*:*:*:*:*:*",
"matchCriteriaId": "FBBCF519-2C0C-4128-BF30-A4EA27083F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.1.0.147:*:*:*:*:*:*:*",
"matchCriteriaId": "909B644A-C6AC-4A9E-8603-7709E243A9A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.1.0.150:*:*:*:*:*:*:*",
"matchCriteriaId": "1F36126F-1BE3-4BE3-AFC6-E968F852025F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.1.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "F62E1DDA-8D3A-48A7-9C5A-11346AC6D353",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.53:beta:*:*:*:*:*:*",
"matchCriteriaId": "29E9C27A-B036-4858-9230-39DC68F51364",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.63:beta:*:*:*:*:*:*",
"matchCriteriaId": "774831F5-76C6-4E7A-9A9B-81246EE5E5CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.82:beta:*:*:*:*:*:*",
"matchCriteriaId": "DD315ADB-3FE8-41B5-9769-5B5C60915A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.115:beta:*:*:*:*:*:*",
"matchCriteriaId": "CD9C7D5D-4851-467C-B65B-4F991EDF1E6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.145:*:*:*:*:*:*:*",
"matchCriteriaId": "87BED1EE-702C-4B2C-96F5-10DD74E3A2B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.148:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8306B3-073C-4E60-8EC8-6E480287F162",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAB23AA-62F2-4ABA-BB45-8A0A0FA20092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.158:*:*:*:*:*:*:*",
"matchCriteriaId": "ECCCBBB5-9CFB-4DA0-A29E-2E76B1CF6F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.163:*:*:*:*:*:*:*",
"matchCriteriaId": "63F6DC03-719D-4475-80D9-D8A5C56040ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.2.0.175:*:*:*:*:*:*:*",
"matchCriteriaId": "C2222B5B-298D-4A60-BB28-FFA9CC6F4B19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.107:beta:*:*:*:*:*:*",
"matchCriteriaId": "6BFBA483-C37B-4F11-8B40-6D47FC26D707",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.158:beta:*:*:*:*:*:*",
"matchCriteriaId": "1118ABD4-B464-4B74-BB66-19D74E998EAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.178:*:*:*:*:*:*:*",
"matchCriteriaId": "DE886272-5B93-477D-B60E-F8E7C34BA475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.202:*:*:*:*:*:*:*",
"matchCriteriaId": "47173E47-6916-4814-AECB-F50F060C0F53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.214:*:*:*:*:*:*:*",
"matchCriteriaId": "04E6928A-D6A4-480C-A45D-2ADF7C51C5B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.229:*:*:*:*:*:*:*",
"matchCriteriaId": "FEC8C9A8-3290-4E3F-A69A-BB522AD1608A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.234:*:*:*:*:*:*:*",
"matchCriteriaId": "663F3CF2-348E-4635-877F-75135C1158C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.5.0.239:*:*:*:*:*:*:*",
"matchCriteriaId": "94D9C8CB-4BF1-41EB-9B10-DD52D722AE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.6.0.127:beta:*:*:*:*:*:*",
"matchCriteriaId": "4475186E-992B-4D02-8D47-76518DE1163D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.6.0.159:beta:*:*:*:*:*:*",
"matchCriteriaId": "EE4160A1-F8F5-4376-8AAA-905895FFAC7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.6.0.216:*:*:*:*:*:*:*",
"matchCriteriaId": "AA893BCF-F609-4962-A30C-2E64D3528063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.6.0.244:*:*:*:*:*:*:*",
"matchCriteriaId": "78EBFF6B-7622-46B4-8D9A-07EDA1A1555D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.6.0.248:*:*:*:*:*:*:*",
"matchCriteriaId": "C46BEF3E-1062-4766-A4FF-55A3DB1AC144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.8.0.96:beta:*:*:*:*:*:*",
"matchCriteriaId": "5D1A63EE-A6C7-46DD-ADDE-97486144683F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.8.0.115:*:*:*:*:*:*:*",
"matchCriteriaId": "5DCD3163-F200-477B-B77F-76E6086D0B68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.8.0.139:*:*:*:*:*:*:*",
"matchCriteriaId": "991E59B3-4F9E-45A7-9C9A-31F5F19B5017",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.8.0.144:*:*:*:*:*:*:*",
"matchCriteriaId": "9297E18A-390B-4499-BD1E-4FDF2A833EC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.8.0.154:*:*:*:*:*:*:*",
"matchCriteriaId": "00997409-6334-443D-A1D1-D3FD968D6184",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.8.0.180:*:*:*:*:*:*:*",
"matchCriteriaId": "AFD78C82-1752-4830-BF88-1EF31E655CB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:3.8.0.188:*:*:*:*:*:*:*",
"matchCriteriaId": "CB7108CB-6748-410B-8610-177748A1064B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0:beta_3:*:*:*:*:*:*",
"matchCriteriaId": "92DBF2AA-9563-4A4A-9AF4-E251549CA90A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.145:beta:*:*:*:*:*:*",
"matchCriteriaId": "45E9C376-0EE4-40B2-85CA-C0A514C024AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.150:beta:*:*:*:*:*:*",
"matchCriteriaId": "8AF6CA00-EA1A-4D1A-A92C-B66F1C6D1298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.155:beta_1:*:*:*:*:*:*",
"matchCriteriaId": "DA057530-AFC2-4B48-8A61-089D7A1C8827",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.161:beta:*:*:*:*:*:*",
"matchCriteriaId": "29BEA3DA-9F3F-48C2-8090-2DD8369E4188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.166:beta_2:*:*:*:*:*:*",
"matchCriteriaId": "E7B7C371-214A-4827-BDF8-B593E6C8D965",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.168:beta_2:*:*:*:*:*:*",
"matchCriteriaId": "47B37889-FD25-44CD-B7D9-DABAEEBB08A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.169:beta_2:*:*:*:*:*:*",
"matchCriteriaId": "C4B5BC42-DB73-483E-9853-887200FA0B4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.176:beta_3:*:*:*:*:*:*",
"matchCriteriaId": "F0310618-73CB-4E03-B404-413B48C4814A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.181:beta_3:*:*:*:*:*:*",
"matchCriteriaId": "CF55ADFE-588A-47BC-9B08-414CF5DF7A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.206:*:*:*:*:*:*:*",
"matchCriteriaId": "EC55DBC2-1B0F-4BF0-8420-238825A38940",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.215:*:*:*:*:*:*:*",
"matchCriteriaId": "B7ED6478-E4F3-4EE7-A88E-A51E26981595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.216:*:*:*:*:*:*:*",
"matchCriteriaId": "395563B5-D9D6-418F-924A-DB9D7D0C1A01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.224:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3FB018-5F7F-4EA4-B625-94BAFF56692E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.226:*:*:*:*:*:*:*",
"matchCriteriaId": "12D3CA67-2764-4D83-A2D2-58542DF0DA06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.0.0.227:*:*:*:*:*:*:*",
"matchCriteriaId": "58A6DD96-46A8-40E7-A872-BB1D540A7A58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.1.0.130:*:*:*:*:*:*:*",
"matchCriteriaId": "5531E97B-8ECD-4DFB-B65D-8F0E49907084",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.1.0.130:beta:*:*:*:*:*:*",
"matchCriteriaId": "6D5AD56B-9D77-448B-B113-96DA92E6BCA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.1.0.136:*:*:*:*:*:*:*",
"matchCriteriaId": "55542083-CE3A-4447-9F65-38F586926DF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.1.0.141:*:*:*:*:*:*:*",
"matchCriteriaId": "E6340539-8060-47A3-935E-FB6C81C96A66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.1.0.166:*:*:*:*:*:*:*",
"matchCriteriaId": "E52F2A8B-0794-4879-9542-6591294336AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.1.0.179:*:*:*:*:*:*:*",
"matchCriteriaId": "E5DFAE41-B004-47BA-9AEA-BE1F6BD804E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.2.0.141:beta:*:*:*:*:*:*",
"matchCriteriaId": "B71F1DCE-3C7E-4DF8-9F92-7E7E93856365",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.2.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "3B35C1C3-0B39-42F7-80C8-0109F9232A3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.2.0.155:*:*:*:*:*:*:*",
"matchCriteriaId": "06CA6897-4AF4-4B3E-A136-D449BAB829CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.2.0.158:*:*:*:*:*:*:*",
"matchCriteriaId": "71DDCBA8-0758-4EB7-8539-2B9F13B467A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.2.0.163:*:*:*:*:*:*:*",
"matchCriteriaId": "2D38F87E-C9EB-4B84-B7A3-2AC193A732DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:skype:skype:4.2.0.166:*:*:*:*:*:*:*",
"matchCriteriaId": "C5E68021-426A-4FC3-8C66-A0D1A386C3B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in Skype 4.2.0.169 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wab32.dll that is located in the same folder as a .skype file."
},
{
"lang": "es",
"value": "Vulnerabilidad de b\u00fasqueda en ruta no confiable en Skype v4.2.0.169 y anteriores, permite a usuarios locales y posiblemente atacantes remotos, la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n y llevar a cabo ataques de secuestro de DLL a trav\u00e9s de un troyano wab32.dll que est\u00e1 localizada en la misma carpeta como un archivo .skype."
}
],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\nCWE-426 - \u0027Untrusted Search Path Vulnerability\u0027",
"id": "CVE-2010-3136",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2010-08-26T18:36:36.107",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.exploit-db.com/exploits/14766"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64577"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11833"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.exploit-db.com/exploits/14766"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64577"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11833"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:skype:skype:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B5491E9-29C9-41A8-B375-168072F52B29",
"versionEndExcluding": "8.113",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Skype for Consumer Remote Code Execution Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Skype para consumidores"
}
],
"id": "CVE-2024-21411",
"lastModified": "2024-12-27T17:07:01.770",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "secure@microsoft.com",
"type": "Primary"
}
]
},
"published": "2024-03-12T17:15:50.290",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21411"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21411"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-453"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2011-2074 (GCVE-0-2011-2074)
Vulnerability from cvelistv5
- n/a
| ▼ | URL | Tags |
|---|---|---|
| http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html | x_refsource_CONFIRM | |
| http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking | x_refsource_MISC | |
| http://secunia.com/advisories/44522 | third-party-advisory, x_refsource_SECUNIA | |
| http://www.securityfocus.com/bid/47747 | vdb-entry, x_refsource_BID | |
| http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/ | x_refsource_MISC | |
| http://www.vupen.com/english/advisories/2011/1192 | vdb-entry, x_refsource_VUPEN | |
| http://isc.sans.edu/diary.html?storyid=10837 | x_refsource_MISC |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:46:00.929Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking"
},
{
"name": "44522",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44522"
},
{
"name": "47747",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/47747"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/"
},
{
"name": "ADV-2011-1192",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/1192"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://isc.sans.edu/diary.html?storyid=10837"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the client in Skype 5.x before 5.1.0.922 on Mac OS X allows remote authenticated users to execute arbitrary code or cause a denial of service (application crash) via a crafted message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-05-10T18:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking"
},
{
"name": "44522",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44522"
},
{
"name": "47747",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/47747"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/"
},
{
"name": "ADV-2011-1192",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/1192"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://isc.sans.edu/diary.html?storyid=10837"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-2074",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the client in Skype 5.x before 5.1.0.922 on Mac OS X allows remote authenticated users to execute arbitrary code or cause a denial of service (application crash) via a crafted message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html",
"refsource": "CONFIRM",
"url": "http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html"
},
{
"name": "http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking",
"refsource": "MISC",
"url": "http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking"
},
{
"name": "44522",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44522"
},
{
"name": "47747",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47747"
},
{
"name": "http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/",
"refsource": "MISC",
"url": "http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/"
},
{
"name": "ADV-2011-1192",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/1192"
},
{
"name": "http://isc.sans.edu/diary.html?storyid=10837",
"refsource": "MISC",
"url": "http://isc.sans.edu/diary.html?storyid=10837"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-2074",
"datePublished": "2011-05-10T18:00:00Z",
"dateReserved": "2011-05-10T00:00:00Z",
"dateUpdated": "2024-09-17T00:37:12.887Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-21411 (GCVE-0-2024-21411)
Vulnerability from cvelistv5
- CWE-453 - Insecure Default Variable Initialization
| ▼ | URL | Tags |
|---|---|---|
| https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21411 | vendor-advisory |
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microsoft | Skype for Consumer |
Version: 1.0.0 < 8.113 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:20:40.907Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "Skype for Consumer Remote Code Execution Vulnerability",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21411"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-21411",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-03-12T18:27:58.698722Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-12T17:37:21.078Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"platforms": [
"Unknown"
],
"product": "Skype for Consumer",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "8.113",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:skype_for_consumer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.113",
"versionStartIncluding": "1.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2024-03-12T07:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "Skype for Consumer Remote Code Execution Vulnerability"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-453",
"description": "CWE-453: Insecure Default Variable Initialization",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-03T00:47:14.775Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Skype for Consumer Remote Code Execution Vulnerability",
"tags": [
"vendor-advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21411"
}
],
"title": "Skype for Consumer Remote Code Execution Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2024-21411",
"datePublished": "2024-03-12T16:57:42.580Z",
"dateReserved": "2023-12-08T22:45:21.300Z",
"dateUpdated": "2025-05-03T00:47:14.775Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-2312 (GCVE-0-2006-2312)
Vulnerability from cvelistv5
- n/a
| ▼ | URL | Tags |
|---|---|---|
| http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0549.html | mailing-list, x_refsource_FULLDISC | |
| http://www.securityfocus.com/bid/18038 | vdb-entry, x_refsource_BID | |
| http://www.kb.cert.org/vuls/id/466428 | third-party-advisory, x_refsource_CERT-VN | |
| http://www.vupen.com/english/advisories/2006/1871 | vdb-entry, x_refsource_VUPEN | |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/26557 | vdb-entry, x_refsource_XF | |
| http://www.securityfocus.com/archive/1/434707/30/4860/threaded | mailing-list, x_refsource_BUGTRAQ | |
| http://www.osvdb.org/25658 | vdb-entry, x_refsource_OSVDB | |
| http://secunia.com/advisories/20154 | third-party-advisory, x_refsource_SECUNIA | |
| http://www.skype.com/security/skype-sb-2006-001.html | x_refsource_CONFIRM |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T17:43:29.102Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20060521 Skype - URI Handler Command Switch Parsing",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0549.html"
},
{
"name": "18038",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/18038"
},
{
"name": "VU#466428",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/466428"
},
{
"name": "ADV-2006-1871",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/1871"
},
{
"name": "skype-uri-handler-file-access(26557)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26557"
},
{
"name": "20060521 Skype - URI Handler Command Switch Parsing",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/434707/30/4860/threaded"
},
{
"name": "25658",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/25658"
},
{
"name": "20154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/20154"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.skype.com/security/skype-sb-2006-001.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-05-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Argument injection vulnerability in the URI handler in Skype 2.0.*.104 and 2.5.*.0 through 2.5.*.78 for Windows allows remote authorized attackers to download arbitrary files via a URL that contains certain command-line switches."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-18T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20060521 Skype - URI Handler Command Switch Parsing",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0549.html"
},
{
"name": "18038",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/18038"
},
{
"name": "VU#466428",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/466428"
},
{
"name": "ADV-2006-1871",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/1871"
},
{
"name": "skype-uri-handler-file-access(26557)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26557"
},
{
"name": "20060521 Skype - URI Handler Command Switch Parsing",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/434707/30/4860/threaded"
},
{
"name": "25658",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/25658"
},
{
"name": "20154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/20154"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.skype.com/security/skype-sb-2006-001.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-2312",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Argument injection vulnerability in the URI handler in Skype 2.0.*.104 and 2.5.*.0 through 2.5.*.78 for Windows allows remote authorized attackers to download arbitrary files via a URL that contains certain command-line switches."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20060521 Skype - URI Handler Command Switch Parsing",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0549.html"
},
{
"name": "18038",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18038"
},
{
"name": "VU#466428",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/466428"
},
{
"name": "ADV-2006-1871",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1871"
},
{
"name": "skype-uri-handler-file-access(26557)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26557"
},
{
"name": "20060521 Skype - URI Handler Command Switch Parsing",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/434707/30/4860/threaded"
},
{
"name": "25658",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25658"
},
{
"name": "20154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20154"
},
{
"name": "http://www.skype.com/security/skype-sb-2006-001.html",
"refsource": "CONFIRM",
"url": "http://www.skype.com/security/skype-sb-2006-001.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-2312",
"datePublished": "2006-05-19T21:00:00",
"dateReserved": "2006-05-11T00:00:00",
"dateUpdated": "2024-08-07T17:43:29.102Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-1778 (GCVE-0-2004-1778)
Vulnerability from cvelistv5
- n/a
| ▼ | URL | Tags |
|---|---|---|
| http://marc.info/?l=bugtraq&m=110868557905786&w=2 | mailing-list, x_refsource_BUGTRAQ | |
| http://marc.info/?l=bugtraq&m=110374568916303&w=2 | mailing-list, x_refsource_BUGTRAQ | |
| http://www.securityfocus.com/bid/12081 | vdb-entry, x_refsource_BID | |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/18644 | vdb-entry, x_refsource_XF |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:00:37.329Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20050216 Re: Permission problem in Skype BETA for linux",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=110868557905786\u0026w=2"
},
{
"name": "20041222 Permission problem in Skype BETA for linux",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=110374568916303\u0026w=2"
},
{
"name": "12081",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/12081"
},
{
"name": "skype-lang-insecure-permissions(18644)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18644"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-12-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Skype 0.92.0.12 and 1.0.0.1 for Linux, and possibly other versions, creates the /usr/share/skype/lang directory with world-writable permissions, which allows local users to modify language files and possibly conduct social engineering or other attacks."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20050216 Re: Permission problem in Skype BETA for linux",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=110868557905786\u0026w=2"
},
{
"name": "20041222 Permission problem in Skype BETA for linux",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=110374568916303\u0026w=2"
},
{
"name": "12081",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/12081"
},
{
"name": "skype-lang-insecure-permissions(18644)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18644"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-1778",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Skype 0.92.0.12 and 1.0.0.1 for Linux, and possibly other versions, creates the /usr/share/skype/lang directory with world-writable permissions, which allows local users to modify language files and possibly conduct social engineering or other attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20050216 Re: Permission problem in Skype BETA for linux",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=110868557905786\u0026w=2"
},
{
"name": "20041222 Permission problem in Skype BETA for linux",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=110374568916303\u0026w=2"
},
{
"name": "12081",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12081"
},
{
"name": "skype-lang-insecure-permissions(18644)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18644"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-1778",
"datePublished": "2005-05-03T04:00:00",
"dateReserved": "2005-05-03T00:00:00",
"dateUpdated": "2024-08-08T01:00:37.329Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-4741 (GCVE-0-2009-4741)
Vulnerability from cvelistv5
- n/a
| ▼ | URL | Tags |
|---|---|---|
| http://secunia.com/advisories/37012 | third-party-advisory, x_refsource_SECUNIA | |
| https://developer.skype.com/WindowsSkype/ReleaseNotes#head-21c1b2583e7cc405f994ca162d574fb15a6e986b | x_refsource_CONFIRM | |
| http://www.securityfocus.com/bid/36459 | vdb-entry, x_refsource_BID |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:17:25.704Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "37012",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37012"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://developer.skype.com/WindowsSkype/ReleaseNotes#head-21c1b2583e7cc405f994ca162d574fb15a6e986b"
},
{
"name": "36459",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/36459"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Extras Manager before 2.0.0.67 in Skype before 4.1.0.179 on Windows has unknown impact and attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-03-26T20:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "37012",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37012"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://developer.skype.com/WindowsSkype/ReleaseNotes#head-21c1b2583e7cc405f994ca162d574fb15a6e986b"
},
{
"name": "36459",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/36459"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4741",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the Extras Manager before 2.0.0.67 in Skype before 4.1.0.179 on Windows has unknown impact and attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "37012",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37012"
},
{
"name": "https://developer.skype.com/WindowsSkype/ReleaseNotes#head-21c1b2583e7cc405f994ca162d574fb15a6e986b",
"refsource": "CONFIRM",
"url": "https://developer.skype.com/WindowsSkype/ReleaseNotes#head-21c1b2583e7cc405f994ca162d574fb15a6e986b"
},
{
"name": "36459",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36459"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-4741",
"datePublished": "2010-03-26T20:00:00Z",
"dateReserved": "2010-03-26T00:00:00Z",
"dateUpdated": "2024-09-17T00:21:01.212Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-3136 (GCVE-0-2010-3136)
Vulnerability from cvelistv5
- n/a
| ▼ | URL | Tags |
|---|---|---|
| https://exchange.xforce.ibmcloud.com/vulnerabilities/64577 | vdb-entry, x_refsource_XF | |
| http://www.exploit-db.com/exploits/14766 | exploit, x_refsource_EXPLOIT-DB | |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11833 | vdb-entry, signature, x_refsource_OVAL |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:55:46.784Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "skype-dll-code-execution(64577)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64577"
},
{
"name": "14766",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "http://www.exploit-db.com/exploits/14766"
},
{
"name": "oval:org.mitre.oval:def:11833",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11833"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-08-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in Skype 4.2.0.169 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wab32.dll that is located in the same folder as a .skype file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "skype-dll-code-execution(64577)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64577"
},
{
"name": "14766",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "http://www.exploit-db.com/exploits/14766"
},
{
"name": "oval:org.mitre.oval:def:11833",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11833"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-3136",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Untrusted search path vulnerability in Skype 4.2.0.169 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wab32.dll that is located in the same folder as a .skype file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "skype-dll-code-execution(64577)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64577"
},
{
"name": "14766",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14766"
},
{
"name": "oval:org.mitre.oval:def:11833",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11833"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-3136",
"datePublished": "2010-08-26T18:00:00",
"dateReserved": "2010-08-26T00:00:00",
"dateUpdated": "2024-08-07T02:55:46.784Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
var-201105-0133
Vulnerability from variot
Unspecified vulnerability in the client in Skype 5.x before 5.1.0.922 on Mac OS X allows remote authenticated users to execute arbitrary code or cause a denial of service (application crash) via a crafted message. Skype for Mac is prone to an unspecified remote code-execution vulnerability. Attackers may exploit this issue to compromise the affected computer. Very few details are available regarding this issue. We will update this BID as more information emerges. Skype for Android is a set of free voice communication software based on the Android platform of Microsoft Corporation. The software supports functions such as video messaging, voice mail, Bluetooth headsets, and conference calls. ----------------------------------------------------------------------
Secunia is hiring!
http://secunia.com/company/jobs/
TITLE: Skype for Mac Message Processing Code Execution Vulnerability
SECUNIA ADVISORY ID: SA44522
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44522/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44522
RELEASE DATE: 2011-05-10
DISCUSS ADVISORY: http://secunia.com/advisories/44522/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/44522/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44522
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in Skype for Mac, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to an unspecified error when processing messages from a contact.
Successful exploitation may allow execution of arbitrary code but requires that a contact is already added to the victim's Contact List.
SOLUTION: Update to version 5.1.0.922.
PROVIDED AND/OR DISCOVERED BY: Gordon Maddern, Pure Hacking.
ORIGINAL ADVISORY: Skype: http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html
Pure Hacking: http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201105-0133",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "skype",
"scope": "eq",
"trust": 1.6,
"vendor": "skype",
"version": "5.0.0.152"
},
{
"model": "skype",
"scope": "eq",
"trust": 1.6,
"vendor": "skype",
"version": "5.1.0.112"
},
{
"model": "skype",
"scope": "eq",
"trust": 1.6,
"vendor": "skype",
"version": "5.0.0.123"
},
{
"model": "skype",
"scope": "eq",
"trust": 1.6,
"vendor": "skype",
"version": "5.1.0.104"
},
{
"model": "skype",
"scope": "eq",
"trust": 1.6,
"vendor": "skype",
"version": "5.0.0.105"
},
{
"model": "skype",
"scope": "eq",
"trust": 1.6,
"vendor": "skype",
"version": "5.0.0.156"
},
{
"model": "skype",
"scope": "eq",
"trust": 0.8,
"vendor": "skype s a",
"version": "mac os edition 5.1.0.922"
},
{
"model": "skype",
"scope": "lt",
"trust": 0.8,
"vendor": "skype s a",
"version": "5.x"
},
{
"model": "(mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "skype",
"version": "x)5"
},
{
"model": "skype",
"scope": null,
"trust": 0.3,
"vendor": "skype",
"version": null
},
{
"model": "(mac os",
"scope": "ne",
"trust": 0.3,
"vendor": "skype",
"version": "x)5.1.0.922"
}
],
"sources": [
{
"db": "BID",
"id": "47747"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-004621"
},
{
"db": "CNNVD",
"id": "CNNVD-201105-138"
},
{
"db": "NVD",
"id": "CVE-2011-2074"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:skype:skype",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-004621"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Pure Hacking",
"sources": [
{
"db": "BID",
"id": "47747"
}
],
"trust": 0.3
},
"cve": "CVE-2011-2074",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 6.8,
"id": "CVE-2011-2074",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 6.8,
"id": "VHN-50019",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:S/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2011-2074",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2011-2074",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201105-138",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-50019",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-50019"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-004621"
},
{
"db": "CNNVD",
"id": "CNNVD-201105-138"
},
{
"db": "NVD",
"id": "CVE-2011-2074"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unspecified vulnerability in the client in Skype 5.x before 5.1.0.922 on Mac OS X allows remote authenticated users to execute arbitrary code or cause a denial of service (application crash) via a crafted message. Skype for Mac is prone to an unspecified remote code-execution vulnerability. \nAttackers may exploit this issue to compromise the affected computer. \nVery few details are available regarding this issue. We will update this BID as more information emerges. Skype for Android is a set of free voice communication software based on the Android platform of Microsoft Corporation. The software supports functions such as video messaging, voice mail, Bluetooth headsets, and conference calls. ----------------------------------------------------------------------\n\n\nSecunia is hiring!\n\nhttp://secunia.com/company/jobs/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nSkype for Mac Message Processing Code Execution Vulnerability\n\nSECUNIA ADVISORY ID:\nSA44522\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/44522/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44522\n\nRELEASE DATE:\n2011-05-10\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/44522/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/44522/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44522\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in Skype for Mac, which can be\nexploited by malicious people to compromise a user\u0027s system. \n\nThe vulnerability is caused due to an unspecified error when\nprocessing messages from a contact. \n\nSuccessful exploitation may allow execution of arbitrary code but\nrequires that a contact is already added to the victim\u0027s Contact\nList. \n\nSOLUTION:\nUpdate to version 5.1.0.922. \n\nPROVIDED AND/OR DISCOVERED BY:\nGordon Maddern, Pure Hacking. \n\nORIGINAL ADVISORY:\nSkype:\nhttp://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html\n\nPure Hacking:\nhttp://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2011-2074"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-004621"
},
{
"db": "BID",
"id": "47747"
},
{
"db": "VULHUB",
"id": "VHN-50019"
},
{
"db": "PACKETSTORM",
"id": "101255"
}
],
"trust": 2.07
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2011-2074",
"trust": 2.8
},
{
"db": "BID",
"id": "47747",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "44522",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2011-1192",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2011-004621",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201105-138",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-50019",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "101255",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-50019"
},
{
"db": "BID",
"id": "47747"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-004621"
},
{
"db": "PACKETSTORM",
"id": "101255"
},
{
"db": "CNNVD",
"id": "CNNVD-201105-138"
},
{
"db": "NVD",
"id": "CVE-2011-2074"
}
]
},
"id": "VAR-201105-0133",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-50019"
}
],
"trust": 0.01
},
"last_update_date": "2024-11-23T23:03:00.853000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Security Vulnerability in Mac",
"trust": 0.8,
"url": "http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-004621"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2011-2074"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.1,
"url": "http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html"
},
{
"trust": 2.1,
"url": "http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/47747"
},
{
"trust": 1.7,
"url": "http://isc.sans.edu/diary.html?storyid=10837"
},
{
"trust": 1.7,
"url": "http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44522"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2011/1192"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2074"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2074"
},
{
"trust": 0.3,
"url": "http://www.skype.com/"
},
{
"trust": 0.1,
"url": "http://secunia.com/products/corporate/evm/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/44522/"
},
{
"trust": 0.1,
"url": "http://secunia.com/company/jobs/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44522"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/personal/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/44522/#comments"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-50019"
},
{
"db": "BID",
"id": "47747"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-004621"
},
{
"db": "PACKETSTORM",
"id": "101255"
},
{
"db": "CNNVD",
"id": "CNNVD-201105-138"
},
{
"db": "NVD",
"id": "CVE-2011-2074"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-50019"
},
{
"db": "BID",
"id": "47747"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-004621"
},
{
"db": "PACKETSTORM",
"id": "101255"
},
{
"db": "CNNVD",
"id": "CNNVD-201105-138"
},
{
"db": "NVD",
"id": "CVE-2011-2074"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-05-10T00:00:00",
"db": "VULHUB",
"id": "VHN-50019"
},
{
"date": "2011-05-06T00:00:00",
"db": "BID",
"id": "47747"
},
{
"date": "2012-03-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-004621"
},
{
"date": "2011-05-09T04:44:17",
"db": "PACKETSTORM",
"id": "101255"
},
{
"date": "2011-05-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201105-138"
},
{
"date": "2011-05-10T18:55:02.590000",
"db": "NVD",
"id": "CVE-2011-2074"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-05-26T00:00:00",
"db": "VULHUB",
"id": "VHN-50019"
},
{
"date": "2015-04-13T21:01:00",
"db": "BID",
"id": "47747"
},
{
"date": "2012-03-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-004621"
},
{
"date": "2011-05-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201105-138"
},
{
"date": "2024-11-21T01:27:31.757000",
"db": "NVD",
"id": "CVE-2011-2074"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201105-138"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Skype Service disruption in Japanese clients (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-004621"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201105-138"
}
],
"trust": 0.6
}
}