jvndb-2008-000015
Vulnerability from jvndb
Published
2008-05-21 00:00
Modified
2008-05-21 11:32
Summary
BFup ActiveX Control buffer overflow vulnerability
Details
BFup ActiveX Control contains a buffer overflow vulnerability.
BFup ActiveX Control is developed by an individual that provides file upload and download functionality. BFup ActiveX Control contains a buffer overflow vulnerability.
According to the developer of BFup ActiveX Control, this vulnerability only exists in BFup ActiveX Control developed by the individual developer, not in its commercial version, BFup Pro ActiveX Control, provided by B21Soft, Inc. For more information, refer to the developer's website.
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000015.html",
"dc:date": "2008-05-21T11:32+09:00",
"dcterms:issued": "2008-05-21T00:00+09:00",
"dcterms:modified": "2008-05-21T11:32+09:00",
"description": "BFup ActiveX Control contains a buffer overflow vulnerability.\r\n\r\nBFup ActiveX Control is developed by an individual that provides file upload and download functionality. BFup ActiveX Control contains a buffer overflow vulnerability.\r\n\r\nAccording to the developer of BFup ActiveX Control, this vulnerability only exists in BFup ActiveX Control developed by the individual developer, not in its commercial version, BFup Pro ActiveX Control, provided by B21Soft, Inc. For more information, refer to the developer\u0027s website.",
"link": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000015.html",
"sec:cpe": {
"#text": "cpe:/a:b21soft:bfup",
"@product": "BFup ActiveX Control",
"@vendor": "Tatsuo Baba",
"@version": "2.2"
},
"sec:cvss": {
"@score": "6.8",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2008-000015",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN10606373/index.html",
"@id": "JVN#10606373",
"@source": "JVN"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1282",
"@id": "CVE-2008-1282",
"@source": "CVE"
},
{
"#text": "http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1282",
"@id": "CVE-2008-1282",
"@source": "NVD"
},
{
"#text": "http://secunia.com/advisories/29260",
"@id": "SA29260",
"@source": "SECUNIA"
},
{
"#text": "http://www.securityfocus.com/bid/28131",
"@id": "28131",
"@source": "BID"
},
{
"#text": "http://xforce.iss.net/xforce/xfdb/41050",
"@id": "41050",
"@source": "XF"
},
{
"#text": "http://www.frsirt.com/english/advisories/2008/0797",
"@id": "FrSIRT/ADV-2008-0797",
"@source": "FRSIRT"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-119",
"@title": "Buffer Errors(CWE-119)"
}
],
"title": "BFup ActiveX Control buffer overflow vulnerability"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…