Imendio Planner 0.13 memory corruption

entryeditHistoryDiffjsonxmlCTI

A vulnerability was found in Imendio Planner 0.13. It has been classified as critical. Affected is some unknown functionality. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Field03/12/2015 03:51 PM09/25/2017 11:29 AM
nameImendio PlannerImendio Planner
version0.130.13
risk22
cvss2_vuldb_basescore5.15.1
cvss2_vuldb_tempscore5.15.1
cvss2_vuldb_avNN
cvss2_vuldb_acHH
cvss2_vuldb_auNN
cvss2_vuldb_ciPP
cvss2_vuldb_iiPP
cvss2_vuldb_aiPP
cvss2_nvd_avNN
cvss2_nvd_acHH
cvss2_nvd_auNN
cvss2_nvd_ciPP
cvss2_nvd_iiPP
cvss2_nvd_aiPP
cvss3_meta_basescore7.37.3
cvss3_meta_tempscore7.37.3
cvss3_vuldb_basescore7.37.3
cvss3_vuldb_tempscore7.37.3
date1155081600 (08/09/2006)1155081600 (08/09/2006)
locationBugtraqBugtraq
typePostingPosting
urlhttp://www.securityfocus.com/archive/1/archive/1/442439/100/0/threadedhttp://www.securityfocus.com/archive/1/archive/1/442439/100/0/threaded
price_0day$0-$5k$0-$5k
cveCVE-2006-4070CVE-2006-4070
cve_nvd_published11550816001155081600
cve_nvd_summaryFormat string vulnerability in Imendio Planner 0.13 allows user-assisted attackers to execute arbitrary code via format string specifiers in a filename.Format string vulnerability in Imendio Planner 0.13 allows user-assisted attackers to execute arbitrary code via format string specifiers in a filename.
securityfocus1930719307
securityfocus_titleImendio Planner Filename Remote Format String VulnerabilityImendio Planner Filename Remote Format String Vulnerability
cwe119 (memory corruption)119 (memory corruption)
cvss3_vuldb_acLL
cvss3_vuldb_uiNN
cvss2_vuldb_eNDND
cvss2_vuldb_rlNDND
cvss2_vuldb_rcNDND
cvss3_vuldb_eXX
cvss3_vuldb_rlXX
cvss3_vuldb_rcXX
cvss3_vuldb_avNN
cvss3_vuldb_prNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iLL
cvss3_vuldb_aLL
cve_assigned1155081600
securityfocus_date1154476800 (08/02/2006)
securityfocus_classInput Validation Error

Might our Artificial Intelligence support you?

Check our Alexa App!