2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-0533" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-05-02T04:00:00.000" ,
2024-11-21 23:11:37 +00:00
"lastModified" : "2024-11-20T23:55:21.023" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
2024-11-21 23:11:37 +00:00
"baseScore" : 7.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-21 23:11:37 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : true ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:client-server-messaging_suite_smb:gold:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "8C9AAAD5-E973-41CB-B7FD-85D1EA04F6D7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:client-server_suite_smb:gold:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "664CD81D-30AD-450B-A9FF-7C0FC61C938A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:control_manager:gold:*:as_400:*:*:*:*:*" ,
"matchCriteriaId" : "CEEC709C-CE2F-435D-8595-3B7462F5D58A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:control_manager:gold:*:s_390:*:*:*:*:*" ,
"matchCriteriaId" : "416653F7-D8D5-4947-A097-8E1298DD0FEE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:control_manager:gold:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "0416D605-20FC-4C87-8009-C240530A1B13"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:control_manager:gold:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "4FFD939A-C783-4A02-9859-B823A57F8A5E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:control_manager:gold:*:windows_nt:*:*:*:*:*" ,
"matchCriteriaId" : "723E2C95-124F-422F-A241-AECA1D5E0D0F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:control_manager:netware:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A63C770-365B-4EAF-AF4B-1B379F943DF2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_emanager:3.5:*:hp:*:*:*:*:*" ,
"matchCriteriaId" : "9D2CAA96-4C71-482B-A033-E4AD0814C638"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_emanager:3.5.2:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "0DEAD496-BB59-464D-9BBA-29158CF65C35"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_emanager:3.6:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "8767F042-4333-404A-B7D7-6830B6959890"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_emanager:3.6:*:sun:*:*:*:*:*" ,
"matchCriteriaId" : "C02396DD-CFBF-4019-8AC7-9C41821AF8E2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_emanager:3.51:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8DF73278-A5E9-4975-9C0B-DD9413A33FA4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_emanager:3.51_j:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A7F86817-D352-452E-B80F-1402C8A76372"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_messaging_security_suite:3.81:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4086086F-4F57-4E73-B473-FFF33CD23F6E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_messaging_security_suite:5.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F1E2358-2868-4D95-A783-0D7A591A691C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "7E8ADD8C-2E58-4671-BECF-B02A5DE04A1E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "4CD5D110-5FA3-4F6C-A727-06A73676EC9A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "CD824873-B625-4755-ADC9-C6657CD63208"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "E4B9603D-79FE-4E7C-A9F9-E9A24FBBDF3E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:*:unix:*:*:*:*:*" ,
"matchCriteriaId" : "475CED59-77F7-4E6B-8DB6-EFFC7F8D5929"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:3.4:*:windows_nt:*:*:*:*:*" ,
"matchCriteriaId" : "75734296-9435-4A96-B30C-572BF1BBAD14"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:3.5:*:windows_nt:*:*:*:*:*" ,
"matchCriteriaId" : "61C0968D-D8F1-450C-B4E9-94535B4CF637"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:hp_ux:*:*:*:*:*" ,
"matchCriteriaId" : "106EB780-7455-41F7-ADB0-67C541F6C53F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "A9EB55C4-00FB-4D2F-993D-27269F09CF08"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:unix:*:*:*:*:*" ,
"matchCriteriaId" : "1D8580C2-B757-4C4C-A9B6-960905101E10"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:windows_nt:*:*:*:*:*" ,
"matchCriteriaId" : "D9AE5039-8467-48C2-8417-E7B18A48F0D9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:3.6.5:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "82425C25-4464-4C69-A7C9-6B7369661E3B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:3.51:*:windows_nt:*:*:*:*:*" ,
"matchCriteriaId" : "15B05F1A-7AA1-46E5-947B-C422F9618F9F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:3.52:*:windows_nt:*:*:*:*:*" ,
"matchCriteriaId" : "EB4F32FC-8391-4B3B-AA42-07E392053A96"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:3.52_build1466:*:windows_nt:*:*:*:*:*" ,
"matchCriteriaId" : "1BF5CF24-83B8-4AC3-A849-C56979CB38DE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:5.1:*:windows_nt:*:*:*:*:*" ,
"matchCriteriaId" : "25D7EFC1-4053-46E9-9081-3BBAB0300C1B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:aix:*:*:*:*:*" ,
"matchCriteriaId" : "8B678239-DD77-488C-82FE-27D6FC47B94A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:linux_for_smb:*:*:*:*:*" ,
"matchCriteriaId" : "071EDC78-C902-4D79-8CDF-F5DD30BF7027"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:smb:*:*:*:*:*" ,
"matchCriteriaId" : "55C6BD67-FE95-43A7-91F7-608DEC79C24A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "29EDFC0F-687B-4B56-8910-67C6E3907483"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:windows_nt_for_smb:*:*:*:*:*" ,
"matchCriteriaId" : "5A694256-BD24-4EED-9833-B15DCA874F15"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "1DCB7541-8145-47CA-9F4E-4A600CA454EA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:*:solaris:*:*:*:*:*" ,
"matchCriteriaId" : "DB8B2F17-7C2B-4782-9492-D967A2AD8B3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "D1E65854-8869-41F7-BAFE-B7545FC98BAC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_webmanager:1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B1C33920-9BC7-41BC-BB66-723D0BAF2839"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_webmanager:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A73B43D9-A721-4D48-A2D6-48A77355965F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_webmanager:2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F1F3645D-2B7D-44ED-83DE-ABF9016CD0D3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:interscan_webprotect:gold:*:isa:*:*:*:*:*" ,
"matchCriteriaId" : "921B617D-F37E-4D10-A627-09F9678790B4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:officescan:3.0:*:corporate:*:*:*:*:*" ,
"matchCriteriaId" : "4013BF7E-DE8F-4941-BF15-D17C8C88DB78"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:officescan:corporate_3.0:*:windows_nt_server:*:*:*:*:*" ,
"matchCriteriaId" : "093EED07-F4C1-47B2-9D08-3DE0D57D5CA5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:officescan:corporate_3.1.1:*:windows_nt_server:*:*:*:*:*" ,
"matchCriteriaId" : "CBA9F2BA-1274-465C-B723-ABB54CA17FE9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:officescan:corporate_3.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BE60F5D9-35D0-4D0E-85D1-EE71E533622F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:officescan:corporate_3.5:*:windows_nt_server:*:*:*:*:*" ,
"matchCriteriaId" : "6F37307A-7847-4D5A-99D8-8A4BE424CD21"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:officescan:corporate_3.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BF74A292-2B1B-43FC-AA82-CFB04D7644E3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:officescan:corporate_3.11:*:windows_nt_server:*:*:*:*:*" ,
"matchCriteriaId" : "925DA405-9719-452C-8369-D4A60CC916C2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:officescan:corporate_3.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "46575AE8-8718-44D8-AF5C-14F7981B3238"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:officescan:corporate_3.13:*:windows_nt_server:*:*:*:*:*" ,
"matchCriteriaId" : "F893D171-7AB3-4422-BA86-021B0211EE36"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:officescan:corporate_3.54:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A79FBAAA-D6B8-4A05-B8E1-D7549207EA5B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:officescan:corporate_5.02:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D6CE3BB4-54BA-48DE-9CFC-C2241D99DA67"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:officescan:corporate_5.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E6F25D89-826B-4FA0-AA8F-CD729F00F9BE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:officescan:corporate_5.58:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BEE87037-D7CC-480B-BBD2-F1802294D4F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:officescan:corporate_6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3DB43A95-60F8-425A-8434-C07EC799DC68"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:pc-cillin:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ABBAA86F-8DE4-4BC8-B295-89CF981C28D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:pc-cillin:2000:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9994E64C-0E8C-4A9C-A321-6A73A16E33AF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:pc-cillin:2002:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A65282E0-2332-4CAA-9BA9-3794C2CDE960"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:pc-cillin:2003:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E56D571B-649D-41E2-A502-6C1EBAB73F62"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:portalprotect:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C991F564-93D1-4E63-8B71-B0C9CD9BECA4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:scanmail:2.6:*:domino:*:*:*:*:*" ,
"matchCriteriaId" : "195D657C-4A4B-4832-B1A6-056FB990401E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:scanmail:2.51:*:domino:*:*:*:*:*" ,
"matchCriteriaId" : "929BCF43-AC3A-43D0-8819-7673996D216D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:scanmail:3.8:*:microsoft_exchange:*:*:*:*:*" ,
"matchCriteriaId" : "3BFF861D-F544-4902-A958-BE566FB85738"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:scanmail:3.81:*:microsoft_exchange:*:*:*:*:*" ,
"matchCriteriaId" : "3B282BE2-8116-48A7-B6D6-544983FF72C6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:scanmail:6.1:*:microsoft_exchange:*:*:*:*:*" ,
"matchCriteriaId" : "C81AFD13-0883-48F5-BD6B-707CFFE07262"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_aix:*:*:*:*:*" ,
"matchCriteriaId" : "B4963C96-FA13-4E54-8EE3-8E169CACBF4F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_as_400:*:*:*:*:*" ,
"matchCriteriaId" : "C3E0300A-27F7-47C1-B725-55FF0BE92FF9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_s_390:*:*:*:*:*" ,
"matchCriteriaId" : "FF365F03-F95C-4047-BBA4-42EBD02E823B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_solaris:*:*:*:*:*" ,
"matchCriteriaId" : "A2042D38-CF77-4149-9289-B3380F59D794"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_windows:*:*:*:*:*" ,
"matchCriteriaId" : "D275C0DB-E942-4EB9-B6AA-3112C1A697DA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:scanmail_emanager:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E4CE79B6-B9E8-4775-B7BF-90C2758EECE0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:serverprotect:1.3:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "FB28FE16-F163-4287-9A4E-843C2E67792E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:serverprotect:1.25_2007-02-16:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "6E8704FA-AA3C-4664-A5AA-50F60AE77642"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:serverprotect:2.5:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "BEDB64E2-6157-47C1-842E-26A40A885ECD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:trend_micro:serverprotect:5.3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "38695C1D-DC51-45EB-9EEB-6E04490AFE6F"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/14396" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securitytracker.com/id?1013289" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://securitytracker.com/id?1013290" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/12643" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+VSAPI+ARJ+parsing+could+allow+Remote+Code+execution" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://xforce.iss.net/xforce/alerts/id/189" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2024-11-21 23:11:37 +00:00
} ,
{
"url" : "http://secunia.com/advisories/14396" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://securitytracker.com/id?1013289" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://securitytracker.com/id?1013290" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/12643" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+VSAPI+ARJ+parsing+could+allow+Remote+Code+execution" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://xforce.iss.net/xforce/alerts/id/189" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}