CVE-2005-2856 (GCVE-0-2005-2856)
Vulnerability from cvelistv5
Published
2005-09-08 04:00
Modified
2024-08-07 22:53
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=112621008228458&w=2
cve@mitre.orghttp://secunia.com/advisories/16479Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19454Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19458Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19581Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19596
cve@mitre.orghttp://secunia.com/advisories/19612
cve@mitre.orghttp://secunia.com/advisories/19834Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19890Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19931
cve@mitre.orghttp://secunia.com/advisories/19938Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19939
cve@mitre.orghttp://secunia.com/advisories/19967Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19975Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19977Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/20009Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/20270
cve@mitre.orghttp://secunia.com/secunia_research/2005-41/advisory/
cve@mitre.orghttp://secunia.com/secunia_research/2006-24/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-25/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-27/Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-28/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-29/advisory/Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-30/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-32/advisory/
cve@mitre.orghttp://secunia.com/secunia_research/2006-33/advisory/Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-36/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-38/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-46/advisory/
cve@mitre.orghttp://secunia.com/secunia_research/2006-50/advisory/
cve@mitre.orghttp://securityreason.com/securityalert/49
cve@mitre.orghttp://securitytracker.com/id?1014863
cve@mitre.orghttp://securitytracker.com/id?1015852
cve@mitre.orghttp://securitytracker.com/id?1016011
cve@mitre.orghttp://securitytracker.com/id?1016012
cve@mitre.orghttp://securitytracker.com/id?1016065
cve@mitre.orghttp://securitytracker.com/id?1016066
cve@mitre.orghttp://securitytracker.com/id?1016088
cve@mitre.orghttp://securitytracker.com/id?1016114
cve@mitre.orghttp://securitytracker.com/id?1016115
cve@mitre.orghttp://securitytracker.com/id?1016177
cve@mitre.orghttp://securitytracker.com/id?1016257
cve@mitre.orghttp://securitytracker.com/id?1016512
cve@mitre.orghttp://www.osvdb.org/25129
cve@mitre.orghttp://www.securityfocus.com/archive/1/432357/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/432579/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/433258/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/433352/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/433693/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/434011/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/434234/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/434279/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/436639/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/440303/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/14759
cve@mitre.orghttp://www.securityfocus.com/bid/19884
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1565
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1577
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1611
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1681
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1694
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1725
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1775
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1797
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1835
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1836
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2047
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2184
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2824
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3495
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26116
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26142
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26168
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26272
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26302
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26315
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26385
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26447
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26479
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26480
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26736
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26982
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/27763
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/28787
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=112621008228458&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/16479Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19454Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19458Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19581Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19596
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19612
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19834Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19890Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19931
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19938Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19939
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19967Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19975Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19977Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20009Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20270
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2005-41/advisory/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-24/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-25/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-27/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-28/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-29/advisory/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-30/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-32/advisory/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-33/advisory/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-36/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-38/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-46/advisory/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-50/advisory/
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/49
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1014863
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015852
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016011
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016012
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016065
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016066
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016088
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016114
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016115
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016177
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016257
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016512
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/25129
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/432357/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/432579/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/433258/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/433352/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/433693/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/434011/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/434234/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/434279/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/436639/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/440303/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/14759
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19884
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1565
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1577
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1611
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1681
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1694
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1725
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1775
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1797
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1835
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1836
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2047
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2184
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2824
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3495
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26116
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26142
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26168
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26272
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26302
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26315
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26385
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26447
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26479
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26480
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26736
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26982
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/27763
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/28787
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:53:28.858Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "automate-unacev2-bo(26982)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"
          },
          {
            "name": "1016512",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016512"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-24/advisory"
          },
          {
            "name": "ADV-2006-2824",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2824"
          },
          {
            "name": "49",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/49"
          },
          {
            "name": "19884",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19884"
          },
          {
            "name": "eazel-ztvunacev2-bo(26479)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"
          },
          {
            "name": "ADV-2006-1797",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1797"
          },
          {
            "name": "20060517 Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded"
          },
          {
            "name": "1014863",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014863"
          },
          {
            "name": "1016011",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016011"
          },
          {
            "name": "1016115",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016115"
          },
          {
            "name": "19939",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19939"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-46/advisory/"
          },
          {
            "name": "1016065",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016065"
          },
          {
            "name": "ADV-2006-1835",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1835"
          },
          {
            "name": "1016088",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016088"
          },
          {
            "name": "ADV-2006-3495",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3495"
          },
          {
            "name": "19967",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19967"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-27/"
          },
          {
            "name": "1016177",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016177"
          },
          {
            "name": "1016114",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016114"
          },
          {
            "name": "powerarchiver-unacev2-ace-bo(26272)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-50/advisory/"
          },
          {
            "name": "20060501 Secunia Research: WinHKI unacev2.dll Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded"
          },
          {
            "name": "19931",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19931"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-36/advisory"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-28/advisory"
          },
          {
            "name": "filzip-unacev2-bo(26447)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"
          },
          {
            "name": "19975",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19975"
          },
          {
            "name": "ADV-2006-1775",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1775"
          },
          {
            "name": "16479",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16479"
          },
          {
            "name": "ultimatezip-unacev2-bo(26385)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"
          },
          {
            "name": "servant-salamander-unacev2-bo(26116)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"
          },
          {
            "name": "20060609 Secunia Research: AutoMate unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded"
          },
          {
            "name": "ADV-2006-1611",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1611"
          },
          {
            "name": "ADV-2006-1681",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1681"
          },
          {
            "name": "20060511 Secunia Research: UltimateZip unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded"
          },
          {
            "name": "ADV-2006-2184",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2184"
          },
          {
            "name": "ADV-2006-1577",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1577"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-33/advisory/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-29/advisory/"
          },
          {
            "name": "20060517 Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded"
          },
          {
            "name": "19938",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19938"
          },
          {
            "name": "19581",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19581"
          },
          {
            "name": "antitrojan-unacev2-bo(26302)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"
          },
          {
            "name": "ADV-2006-1694",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1694"
          },
          {
            "name": "20270",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20270"
          },
          {
            "name": "19890",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19890"
          },
          {
            "name": "19977",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19977"
          },
          {
            "name": "winhki-unacev2-bo(26142)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-38/advisory"
          },
          {
            "name": "19596",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19596"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2005-41/advisory/"
          },
          {
            "name": "1016066",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016066"
          },
          {
            "name": "20060717 Secunia Research: BitZipper unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded"
          },
          {
            "name": "19458",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19458"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-25/advisory"
          },
          {
            "name": "1016012",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016012"
          },
          {
            "name": "risingantivirus-unacev2-bo(26736)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-32/advisory/"
          },
          {
            "name": "19454",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19454"
          },
          {
            "name": "20060508 Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-30/advisory"
          },
          {
            "name": "whereisit-unacev2-bo(26315)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"
          },
          {
            "name": "20060428 Secunia Research: Servant Salamander unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded"
          },
          {
            "name": "25129",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/25129"
          },
          {
            "name": "bitzipper-unacev2-bo(27763)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"
          },
          {
            "name": "19834",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19834"
          },
          {
            "name": "20060515 Secunia Research: FilZip unacev2.dll Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded"
          },
          {
            "name": "tziptv-unacev2-bo(28787)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"
          },
          {
            "name": "20060509 Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded"
          },
          {
            "name": "20009",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20009"
          },
          {
            "name": "izarc-unacev2-bo(26480)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"
          },
          {
            "name": "ADV-2006-2047",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2047"
          },
          {
            "name": "extractnow-unacev2-ace-bo(26168)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"
          },
          {
            "name": "14759",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14759"
          },
          {
            "name": "ADV-2006-1836",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1836"
          },
          {
            "name": "1016257",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016257"
          },
          {
            "name": "19612",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19612"
          },
          {
            "name": "ADV-2006-1565",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1565"
          },
          {
            "name": "ADV-2006-1725",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1725"
          },
          {
            "name": "1015852",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015852"
          },
          {
            "name": "20050908 Secunia Research: ALZip ACE Archive Handling Buffer Overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-09-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "automate-unacev2-bo(26982)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"
        },
        {
          "name": "1016512",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016512"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-24/advisory"
        },
        {
          "name": "ADV-2006-2824",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2824"
        },
        {
          "name": "49",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/49"
        },
        {
          "name": "19884",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19884"
        },
        {
          "name": "eazel-ztvunacev2-bo(26479)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"
        },
        {
          "name": "ADV-2006-1797",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1797"
        },
        {
          "name": "20060517 Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded"
        },
        {
          "name": "1014863",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014863"
        },
        {
          "name": "1016011",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016011"
        },
        {
          "name": "1016115",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016115"
        },
        {
          "name": "19939",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19939"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-46/advisory/"
        },
        {
          "name": "1016065",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016065"
        },
        {
          "name": "ADV-2006-1835",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1835"
        },
        {
          "name": "1016088",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016088"
        },
        {
          "name": "ADV-2006-3495",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3495"
        },
        {
          "name": "19967",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19967"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-27/"
        },
        {
          "name": "1016177",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016177"
        },
        {
          "name": "1016114",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016114"
        },
        {
          "name": "powerarchiver-unacev2-ace-bo(26272)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-50/advisory/"
        },
        {
          "name": "20060501 Secunia Research: WinHKI unacev2.dll Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded"
        },
        {
          "name": "19931",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19931"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-36/advisory"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-28/advisory"
        },
        {
          "name": "filzip-unacev2-bo(26447)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"
        },
        {
          "name": "19975",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19975"
        },
        {
          "name": "ADV-2006-1775",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1775"
        },
        {
          "name": "16479",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16479"
        },
        {
          "name": "ultimatezip-unacev2-bo(26385)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"
        },
        {
          "name": "servant-salamander-unacev2-bo(26116)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"
        },
        {
          "name": "20060609 Secunia Research: AutoMate unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded"
        },
        {
          "name": "ADV-2006-1611",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1611"
        },
        {
          "name": "ADV-2006-1681",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1681"
        },
        {
          "name": "20060511 Secunia Research: UltimateZip unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded"
        },
        {
          "name": "ADV-2006-2184",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2184"
        },
        {
          "name": "ADV-2006-1577",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1577"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-33/advisory/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-29/advisory/"
        },
        {
          "name": "20060517 Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded"
        },
        {
          "name": "19938",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19938"
        },
        {
          "name": "19581",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19581"
        },
        {
          "name": "antitrojan-unacev2-bo(26302)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"
        },
        {
          "name": "ADV-2006-1694",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1694"
        },
        {
          "name": "20270",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20270"
        },
        {
          "name": "19890",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19890"
        },
        {
          "name": "19977",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19977"
        },
        {
          "name": "winhki-unacev2-bo(26142)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-38/advisory"
        },
        {
          "name": "19596",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19596"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2005-41/advisory/"
        },
        {
          "name": "1016066",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016066"
        },
        {
          "name": "20060717 Secunia Research: BitZipper unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded"
        },
        {
          "name": "19458",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19458"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-25/advisory"
        },
        {
          "name": "1016012",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016012"
        },
        {
          "name": "risingantivirus-unacev2-bo(26736)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-32/advisory/"
        },
        {
          "name": "19454",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19454"
        },
        {
          "name": "20060508 Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-30/advisory"
        },
        {
          "name": "whereisit-unacev2-bo(26315)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"
        },
        {
          "name": "20060428 Secunia Research: Servant Salamander unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded"
        },
        {
          "name": "25129",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/25129"
        },
        {
          "name": "bitzipper-unacev2-bo(27763)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"
        },
        {
          "name": "19834",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19834"
        },
        {
          "name": "20060515 Secunia Research: FilZip unacev2.dll Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded"
        },
        {
          "name": "tziptv-unacev2-bo(28787)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"
        },
        {
          "name": "20060509 Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded"
        },
        {
          "name": "20009",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20009"
        },
        {
          "name": "izarc-unacev2-bo(26480)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"
        },
        {
          "name": "ADV-2006-2047",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2047"
        },
        {
          "name": "extractnow-unacev2-ace-bo(26168)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"
        },
        {
          "name": "14759",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14759"
        },
        {
          "name": "ADV-2006-1836",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1836"
        },
        {
          "name": "1016257",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016257"
        },
        {
          "name": "19612",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19612"
        },
        {
          "name": "ADV-2006-1565",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1565"
        },
        {
          "name": "ADV-2006-1725",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1725"
        },
        {
          "name": "1015852",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015852"
        },
        {
          "name": "20050908 Secunia Research: ALZip ACE Archive Handling Buffer Overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2856",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "automate-unacev2-bo(26982)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"
            },
            {
              "name": "1016512",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016512"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-24/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-24/advisory"
            },
            {
              "name": "ADV-2006-2824",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2824"
            },
            {
              "name": "49",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/49"
            },
            {
              "name": "19884",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19884"
            },
            {
              "name": "eazel-ztvunacev2-bo(26479)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"
            },
            {
              "name": "ADV-2006-1797",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1797"
            },
            {
              "name": "20060517 Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded"
            },
            {
              "name": "1014863",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014863"
            },
            {
              "name": "1016011",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016011"
            },
            {
              "name": "1016115",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016115"
            },
            {
              "name": "19939",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19939"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-46/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-46/advisory/"
            },
            {
              "name": "1016065",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016065"
            },
            {
              "name": "ADV-2006-1835",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1835"
            },
            {
              "name": "1016088",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016088"
            },
            {
              "name": "ADV-2006-3495",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3495"
            },
            {
              "name": "19967",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19967"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-27/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-27/"
            },
            {
              "name": "1016177",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016177"
            },
            {
              "name": "1016114",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016114"
            },
            {
              "name": "powerarchiver-unacev2-ace-bo(26272)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-50/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-50/advisory/"
            },
            {
              "name": "20060501 Secunia Research: WinHKI unacev2.dll Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded"
            },
            {
              "name": "19931",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19931"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-36/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-36/advisory"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-28/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-28/advisory"
            },
            {
              "name": "filzip-unacev2-bo(26447)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"
            },
            {
              "name": "19975",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19975"
            },
            {
              "name": "ADV-2006-1775",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1775"
            },
            {
              "name": "16479",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16479"
            },
            {
              "name": "ultimatezip-unacev2-bo(26385)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"
            },
            {
              "name": "servant-salamander-unacev2-bo(26116)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"
            },
            {
              "name": "20060609 Secunia Research: AutoMate unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded"
            },
            {
              "name": "ADV-2006-1611",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1611"
            },
            {
              "name": "ADV-2006-1681",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1681"
            },
            {
              "name": "20060511 Secunia Research: UltimateZip unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded"
            },
            {
              "name": "ADV-2006-2184",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2184"
            },
            {
              "name": "ADV-2006-1577",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1577"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-33/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-33/advisory/"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-29/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-29/advisory/"
            },
            {
              "name": "20060517 Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded"
            },
            {
              "name": "19938",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19938"
            },
            {
              "name": "19581",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19581"
            },
            {
              "name": "antitrojan-unacev2-bo(26302)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"
            },
            {
              "name": "ADV-2006-1694",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1694"
            },
            {
              "name": "20270",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20270"
            },
            {
              "name": "19890",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19890"
            },
            {
              "name": "19977",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19977"
            },
            {
              "name": "winhki-unacev2-bo(26142)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-38/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-38/advisory"
            },
            {
              "name": "19596",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19596"
            },
            {
              "name": "http://secunia.com/secunia_research/2005-41/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2005-41/advisory/"
            },
            {
              "name": "1016066",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016066"
            },
            {
              "name": "20060717 Secunia Research: BitZipper unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded"
            },
            {
              "name": "19458",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19458"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-25/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-25/advisory"
            },
            {
              "name": "1016012",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016012"
            },
            {
              "name": "risingantivirus-unacev2-bo(26736)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-32/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-32/advisory/"
            },
            {
              "name": "19454",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19454"
            },
            {
              "name": "20060508 Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-30/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-30/advisory"
            },
            {
              "name": "whereisit-unacev2-bo(26315)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"
            },
            {
              "name": "20060428 Secunia Research: Servant Salamander unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded"
            },
            {
              "name": "25129",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/25129"
            },
            {
              "name": "bitzipper-unacev2-bo(27763)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"
            },
            {
              "name": "19834",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19834"
            },
            {
              "name": "20060515 Secunia Research: FilZip unacev2.dll Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded"
            },
            {
              "name": "tziptv-unacev2-bo(28787)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"
            },
            {
              "name": "20060509 Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded"
            },
            {
              "name": "20009",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20009"
            },
            {
              "name": "izarc-unacev2-bo(26480)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"
            },
            {
              "name": "ADV-2006-2047",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2047"
            },
            {
              "name": "extractnow-unacev2-ace-bo(26168)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"
            },
            {
              "name": "14759",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14759"
            },
            {
              "name": "ADV-2006-1836",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1836"
            },
            {
              "name": "1016257",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016257"
            },
            {
              "name": "19612",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19612"
            },
            {
              "name": "ADV-2006-1565",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1565"
            },
            {
              "name": "ADV-2006-1725",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1725"
            },
            {
              "name": "1015852",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015852"
            },
            {
              "name": "20050908 Secunia Research: ALZip ACE Archive Handling Buffer Overflow",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2856",
    "datePublished": "2005-09-08T04:00:00",
    "dateReserved": "2005-09-08T00:00:00",
    "dateUpdated": "2024-08-07T22:53:28.858Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2005-2856\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-09-08T10:03:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:winace:winace:2.6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64D2B1B2-B49D-4F22-B4C6-CE0FAF0FDF35\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/16479\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19454\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19458\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19581\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19596\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/19612\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/19834\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19890\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19931\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/19938\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19939\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/19967\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19975\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19977\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/20009\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/20270\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/secunia_research/2005-41/advisory/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/secunia_research/2006-24/advisory\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-25/advisory\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-27/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-28/advisory\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-29/advisory/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-30/advisory\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-32/advisory/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/secunia_research/2006-33/advisory/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-36/advisory\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-38/advisory\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-46/advisory/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/secunia_research/2006-50/advisory/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/49\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1014863\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1015852\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016011\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016012\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016065\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016066\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016088\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016114\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016115\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016177\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016257\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016512\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/25129\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/432357/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/432579/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/433258/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/433352/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/433693/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/434011/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/434234/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/434279/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/436639/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/440303/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/14759\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/19884\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1565\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1577\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1611\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1681\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1694\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1725\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1775\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1797\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1835\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1836\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/2047\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/2184\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/2824\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3495\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26116\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26142\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26168\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26272\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26302\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26315\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26385\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26447\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26479\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26480\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26736\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26982\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27763\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/28787\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/16479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19454\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19458\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19581\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19596\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/19612\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/19834\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19890\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19931\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/19938\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19939\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/19967\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19975\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19977\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/20009\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/20270\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/secunia_research/2005-41/advisory/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/secunia_research/2006-24/advisory\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-25/advisory\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-27/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-28/advisory\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-29/advisory/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-30/advisory\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-32/advisory/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/secunia_research/2006-33/advisory/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-36/advisory\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-38/advisory\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2006-46/advisory/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/secunia_research/2006-50/advisory/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/49\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1014863\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1015852\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016011\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016012\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016065\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016066\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016088\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016114\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016115\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016177\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016257\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016512\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/25129\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/432357/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/432579/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/433258/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/433352/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/433693/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/434011/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/434234/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/434279/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/436639/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/440303/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/14759\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/19884\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1565\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1577\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1611\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1681\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1694\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1725\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1775\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1797\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1835\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/1836\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/2047\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/2184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/2824\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3495\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26116\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26142\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26168\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26272\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26302\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26315\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26385\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26447\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26480\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26736\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26982\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27763\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/28787\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…