var-200608-0033
Vulnerability from variot
The dynamic linker (dyld) in Apple Mac OS X 10.4.7 allows local users to execute arbitrary code via an "improperly handled condition" that leads to use of "dangerous paths," probably related to an untrusted search path vulnerability. These issue affect Mac OS X and various applications including AFP Server, Bluetooth, Bom, DHCP, Image RAW, ImageIO, Launch Services, OpenSSH, and WebKit. A remote attacker may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and disclose potentially sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200608-0033", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 4.8, "vendor": "apple computer", "version": null }, { "model": "mac os x", "scope": "eq", "trust": 2.4, "vendor": "apple", "version": "10.4.7" }, { "model": "mac os x server", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.4.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.4" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.0.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "directory pro", "scope": "eq", "trust": 0.3, "vendor": "cosmicperl", "version": "10.0.3" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.0.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.03" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.3" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" } ], "sources": [ { "db": "CERT/CC", "id": "VU#708340" }, { "db": "CERT/CC", "id": "VU#514740" }, { "db": "CERT/CC", "id": "VU#566132" }, { "db": "CERT/CC", "id": "VU#651844" }, { "db": "CERT/CC", "id": "VU#605908" }, { "db": "CERT/CC", "id": "VU#172244" }, { "db": "BID", "id": "19289" }, { "db": "JVNDB", "id": "JVNDB-2006-001015" }, { "db": "CNNVD", "id": "CNNVD-200608-042" }, { "db": "NVD", "id": "CVE-2006-3500" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-001015" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dino Dai Zovi ddaizovi@atstake.com Tom Ferris tommy@security-protocols.com Neil ArchibaldRob MiddletonGael DelalleauJesse Ruderman jruderman@gmail.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200608-042" } ], "trust": 0.6 }, "cve": "CVE-2006-3500", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2006-3500", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-19608", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2006-3500", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#776628", "trust": 0.8, "value": "0.13" }, { "author": "CARNEGIE MELLON", "id": "VU#514740", "trust": 0.8, "value": "0.48" }, { "author": "CARNEGIE MELLON", "id": "VU#566132", "trust": 0.8, "value": "1.64" }, { "author": "CARNEGIE MELLON", "id": "VU#651844", "trust": 0.8, "value": "7.43" }, { "author": "CARNEGIE MELLON", "id": "VU#605908", "trust": 0.8, "value": "8.78" }, { "author": "CARNEGIE MELLON", "id": "VU#172244", "trust": 0.8, "value": "7.43" }, { "author": "NVD", "id": "CVE-2006-3500", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200608-042", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-19608", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2006-3500", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#776628" }, { "db": "CERT/CC", "id": "VU#514740" }, { "db": "CERT/CC", "id": "VU#566132" }, { "db": "CERT/CC", "id": "VU#651844" }, { "db": "CERT/CC", "id": "VU#605908" }, { "db": "CERT/CC", "id": "VU#172244" }, { "db": "VULHUB", "id": "VHN-19608" }, { "db": "VULMON", "id": "CVE-2006-3500" }, { "db": "JVNDB", "id": "JVNDB-2006-001015" }, { "db": "CNNVD", "id": "CNNVD-200608-042" }, { "db": "NVD", "id": "CVE-2006-3500" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The dynamic linker (dyld) in Apple Mac OS X 10.4.7 allows local users to execute arbitrary code via an \"improperly handled condition\" that leads to use of \"dangerous paths,\" probably related to an untrusted search path vulnerability. \nThese issue affect Mac OS X and various applications including AFP Server, Bluetooth, Bom, DHCP, Image RAW, ImageIO, Launch Services, OpenSSH, and WebKit. A remote attacker may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and disclose potentially sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2006-3500" }, { "db": "CERT/CC", "id": "VU#708340" }, { "db": "CERT/CC", "id": "VU#776628" }, { "db": "CERT/CC", "id": "VU#514740" }, { "db": "CERT/CC", "id": "VU#566132" }, { "db": "CERT/CC", "id": "VU#651844" }, { "db": "CERT/CC", "id": "VU#605908" }, { "db": "CERT/CC", "id": "VU#172244" }, { "db": "JVNDB", "id": "JVNDB-2006-001015" }, { "db": "BID", "id": "19289" }, { "db": "VULHUB", "id": "VHN-19608" }, { "db": "VULMON", "id": "CVE-2006-3500" } ], "trust": 7.11 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "SECUNIA", "id": "21253", "trust": 6.6 }, { "db": "NVD", "id": "CVE-2006-3500", "trust": 2.9 }, { "db": "USCERT", "id": "TA06-214A", "trust": 2.6 }, { "db": "BID", "id": "19289", "trust": 2.1 }, { "db": "OSVDB", "id": "27738", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2006-3101", "trust": 1.8 }, { "db": "CERT/CC", "id": "VU#708340", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#776628", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#514740", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#566132", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#651844", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#605908", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#172244", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2006-001015", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200608-042", "trust": 0.7 }, { "db": "CERT/CC", "id": "TA06-214A", "trust": 0.6 }, { "db": "XF", "id": "28141", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2006-08-01", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-19608", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2006-3500", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#708340" }, { "db": "CERT/CC", "id": "VU#776628" }, { "db": "CERT/CC", "id": "VU#514740" }, { "db": "CERT/CC", "id": "VU#566132" }, { "db": "CERT/CC", "id": "VU#651844" }, { "db": "CERT/CC", "id": "VU#605908" }, { "db": "CERT/CC", "id": "VU#172244" }, { "db": "VULHUB", "id": "VHN-19608" }, { "db": "VULMON", "id": "CVE-2006-3500" }, { "db": "BID", "id": "19289" }, { "db": "JVNDB", "id": "JVNDB-2006-001015" }, { "db": "CNNVD", "id": "CNNVD-200608-042" }, { "db": "NVD", "id": "CVE-2006-3500" } ] }, "id": "VAR-200608-0033", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-19608" } ], "trust": 0.01 }, "last_update_date": "2024-09-19T22:01:36.626000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2006-08-01", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-001015" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-3500" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 4.8, "url": "http://docs.info.apple.com/article.html?artnum=304063" }, { "trust": 4.8, "url": "http://secunia.com/advisories/21253/" }, { "trust": 2.6, "url": "http://www.us-cert.gov/cas/techalerts/ta06-214a.html" }, { "trust": 1.8, "url": "http://lists.apple.com/archives/security-announce/2006//aug/msg00000.html" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/19289" }, { "trust": 1.8, "url": "http://www.osvdb.org/27738" }, { "trust": 1.8, "url": "http://secunia.com/advisories/21253" }, { "trust": 1.2, "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "trust": 1.2, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28141" }, { "trust": 0.8, "url": "http://manuals.info.apple.com/en/macosxsrvr10.3_systemimageadmin.pdf" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3500" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-3500" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/28141" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3101" }, { "trust": 0.3, "url": "http://www.info.apple.com/usen/security/security_updates.html" }, { "trust": 0.3, "url": "http://www.apple.com/macosx/" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/172244" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/514740" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/566132" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/605908" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/651844" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/776628" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/708340" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=11450" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CERT/CC", "id": "VU#708340" }, { "db": "CERT/CC", "id": "VU#776628" }, { "db": "CERT/CC", "id": "VU#514740" }, { "db": "CERT/CC", "id": "VU#566132" }, { "db": "CERT/CC", "id": "VU#651844" }, { "db": "CERT/CC", "id": "VU#605908" }, { "db": "CERT/CC", "id": "VU#172244" }, { "db": "VULHUB", "id": "VHN-19608" }, { "db": "VULMON", "id": "CVE-2006-3500" }, { "db": "BID", "id": "19289" }, { "db": "JVNDB", "id": "JVNDB-2006-001015" }, { "db": "CNNVD", "id": "CNNVD-200608-042" }, { "db": "NVD", "id": "CVE-2006-3500" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#708340" }, { "db": "CERT/CC", "id": "VU#776628" }, { "db": "CERT/CC", "id": "VU#514740" }, { "db": "CERT/CC", "id": "VU#566132" }, { "db": "CERT/CC", "id": "VU#651844" }, { "db": "CERT/CC", "id": "VU#605908" }, { "db": "CERT/CC", "id": "VU#172244" }, { "db": "VULHUB", "id": "VHN-19608" }, { "db": "VULMON", "id": "CVE-2006-3500" }, { "db": "BID", "id": "19289" }, { "db": "JVNDB", "id": "JVNDB-2006-001015" }, { "db": "CNNVD", "id": "CNNVD-200608-042" }, { "db": "NVD", "id": "CVE-2006-3500" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-01-29T00:00:00", "db": "CERT/CC", "id": "VU#708340" }, { "date": "2006-08-02T00:00:00", "db": "CERT/CC", "id": "VU#776628" }, { "date": "2006-08-02T00:00:00", "db": "CERT/CC", "id": "VU#514740" }, { "date": "2006-08-02T00:00:00", "db": "CERT/CC", "id": "VU#566132" }, { "date": "2006-08-02T00:00:00", "db": "CERT/CC", "id": "VU#651844" }, { "date": "2006-08-02T00:00:00", "db": "CERT/CC", "id": "VU#605908" }, { "date": "2006-08-02T00:00:00", "db": "CERT/CC", "id": "VU#172244" }, { "date": "2006-08-03T00:00:00", "db": "VULHUB", "id": "VHN-19608" }, { "date": "2006-08-03T00:00:00", "db": "VULMON", "id": "CVE-2006-3500" }, { "date": "2006-08-01T00:00:00", "db": "BID", "id": "19289" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-001015" }, { "date": "2005-04-21T00:00:00", "db": "CNNVD", "id": "CNNVD-200608-042" }, { "date": "2006-08-03T01:04:00", "db": "NVD", "id": "CVE-2006-3500" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-01-29T00:00:00", "db": "CERT/CC", "id": "VU#708340" }, { "date": "2006-08-03T00:00:00", "db": "CERT/CC", "id": "VU#776628" }, { "date": "2006-08-02T00:00:00", "db": "CERT/CC", "id": "VU#514740" }, { "date": "2006-08-02T00:00:00", "db": "CERT/CC", "id": "VU#566132" }, { "date": "2006-08-14T00:00:00", "db": "CERT/CC", "id": "VU#651844" }, { "date": "2006-08-14T00:00:00", "db": "CERT/CC", "id": "VU#605908" }, { "date": "2006-08-14T00:00:00", "db": "CERT/CC", "id": "VU#172244" }, { "date": "2017-07-20T00:00:00", "db": "VULHUB", "id": "VHN-19608" }, { "date": "2017-07-20T00:00:00", "db": "VULMON", "id": "CVE-2006-3500" }, { "date": "2007-11-15T00:35:00", "db": "BID", "id": "19289" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-001015" }, { "date": "2006-08-26T00:00:00", "db": "CNNVD", "id": "CNNVD-200608-042" }, { "date": "2017-07-20T01:32:21.227000", "db": "NVD", "id": "CVE-2006-3500" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-200608-042" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Mac OS X AFP server may disclose file and folder information in search results", "sources": [ { "db": "CERT/CC", "id": "VU#708340" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-200608-042" } ], "trust": 0.6 } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.