Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
2 vulnerabilities found for wodsshserver by weonlydo
CVE-2006-2407 (GCVE-0-2006-2407)
Vulnerability from nvd – Published: 2006-05-16 10:00 – Updated: 2024-08-07 17:51
VLAI?
Summary
Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
Date Public ?
2006-05-12 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T17:51:04.671Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "19846",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19846"
},
{
"name": "25569",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/25569"
},
{
"name": "20060514 POC exploit for freeSSHd version 1.0.9",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/434007/100/0/threaded"
},
{
"name": "20060517 POC exploit for freeFTPd 1.0.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/434402/100/0/threaded"
},
{
"name": "ADV-2006-1786",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/1786"
},
{
"name": "901",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/901"
},
{
"name": "freesshd-key-exchange-bo(26442)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26442"
},
{
"name": "20060517 BUGTRAQ:20060517 Re:POC exploit for freeFTPd 1.0.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/434415/100/0/threaded"
},
{
"name": "19845",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19845"
},
{
"name": "VU#477960",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/477960"
},
{
"name": "20060517 Re:POC exploit for freeFTPd 1.0.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/434415/30/4920/threaded"
},
{
"name": "25463",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/25463"
},
{
"name": "20060514 POC exploit for freeSSHd version 1.0.9",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=114764338702488\u0026w=2"
},
{
"name": "20136",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/20136"
},
{
"name": "ADV-2006-1842",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/1842"
},
{
"name": "ADV-2006-1785",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/1785"
},
{
"name": "17958",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/17958"
},
{
"name": "20060515 Re: [Full-disclosure] POC exploit for freeSSHd version 1.0.9",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/434038/100/0/threaded"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-05-12T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-18T14:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "19846",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19846"
},
{
"name": "25569",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/25569"
},
{
"name": "20060514 POC exploit for freeSSHd version 1.0.9",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/434007/100/0/threaded"
},
{
"name": "20060517 POC exploit for freeFTPd 1.0.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/434402/100/0/threaded"
},
{
"name": "ADV-2006-1786",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/1786"
},
{
"name": "901",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/901"
},
{
"name": "freesshd-key-exchange-bo(26442)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26442"
},
{
"name": "20060517 BUGTRAQ:20060517 Re:POC exploit for freeFTPd 1.0.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/434415/100/0/threaded"
},
{
"name": "19845",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19845"
},
{
"name": "VU#477960",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/477960"
},
{
"name": "20060517 Re:POC exploit for freeFTPd 1.0.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/434415/30/4920/threaded"
},
{
"name": "25463",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/25463"
},
{
"name": "20060514 POC exploit for freeSSHd version 1.0.9",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=114764338702488\u0026w=2"
},
{
"name": "20136",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/20136"
},
{
"name": "ADV-2006-1842",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/1842"
},
{
"name": "ADV-2006-1785",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/1785"
},
{
"name": "17958",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/17958"
},
{
"name": "20060515 Re: [Full-disclosure] POC exploit for freeSSHd version 1.0.9",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/434038/100/0/threaded"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-2407",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "19846",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19846"
},
{
"name": "25569",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25569"
},
{
"name": "20060514 POC exploit for freeSSHd version 1.0.9",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/434007/100/0/threaded"
},
{
"name": "20060517 POC exploit for freeFTPd 1.0.10",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/434402/100/0/threaded"
},
{
"name": "ADV-2006-1786",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1786"
},
{
"name": "901",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/901"
},
{
"name": "freesshd-key-exchange-bo(26442)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26442"
},
{
"name": "20060517 BUGTRAQ:20060517 Re:POC exploit for freeFTPd 1.0.10",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/434415/100/0/threaded"
},
{
"name": "19845",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19845"
},
{
"name": "VU#477960",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/477960"
},
{
"name": "20060517 Re:POC exploit for freeFTPd 1.0.10",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/434415/30/4920/threaded"
},
{
"name": "25463",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25463"
},
{
"name": "20060514 POC exploit for freeSSHd version 1.0.9",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure\u0026m=114764338702488\u0026w=2"
},
{
"name": "20136",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20136"
},
{
"name": "ADV-2006-1842",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1842"
},
{
"name": "ADV-2006-1785",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1785"
},
{
"name": "17958",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17958"
},
{
"name": "20060515 Re: [Full-disclosure] POC exploit for freeSSHd version 1.0.9",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/434038/100/0/threaded"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-2407",
"datePublished": "2006-05-16T10:00:00.000Z",
"dateReserved": "2006-05-15T00:00:00.000Z",
"dateUpdated": "2024-08-07T17:51:04.671Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-2407 (GCVE-0-2006-2407)
Vulnerability from cvelistv5 – Published: 2006-05-16 10:00 – Updated: 2024-08-07 17:51
VLAI?
Summary
Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Date Public ?
2006-05-12 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T17:51:04.671Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "19846",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19846"
},
{
"name": "25569",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/25569"
},
{
"name": "20060514 POC exploit for freeSSHd version 1.0.9",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/434007/100/0/threaded"
},
{
"name": "20060517 POC exploit for freeFTPd 1.0.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/434402/100/0/threaded"
},
{
"name": "ADV-2006-1786",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/1786"
},
{
"name": "901",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/901"
},
{
"name": "freesshd-key-exchange-bo(26442)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26442"
},
{
"name": "20060517 BUGTRAQ:20060517 Re:POC exploit for freeFTPd 1.0.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/434415/100/0/threaded"
},
{
"name": "19845",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19845"
},
{
"name": "VU#477960",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/477960"
},
{
"name": "20060517 Re:POC exploit for freeFTPd 1.0.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/434415/30/4920/threaded"
},
{
"name": "25463",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/25463"
},
{
"name": "20060514 POC exploit for freeSSHd version 1.0.9",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=114764338702488\u0026w=2"
},
{
"name": "20136",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/20136"
},
{
"name": "ADV-2006-1842",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/1842"
},
{
"name": "ADV-2006-1785",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/1785"
},
{
"name": "17958",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/17958"
},
{
"name": "20060515 Re: [Full-disclosure] POC exploit for freeSSHd version 1.0.9",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/434038/100/0/threaded"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-05-12T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-18T14:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "19846",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19846"
},
{
"name": "25569",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/25569"
},
{
"name": "20060514 POC exploit for freeSSHd version 1.0.9",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/434007/100/0/threaded"
},
{
"name": "20060517 POC exploit for freeFTPd 1.0.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/434402/100/0/threaded"
},
{
"name": "ADV-2006-1786",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/1786"
},
{
"name": "901",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/901"
},
{
"name": "freesshd-key-exchange-bo(26442)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26442"
},
{
"name": "20060517 BUGTRAQ:20060517 Re:POC exploit for freeFTPd 1.0.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/434415/100/0/threaded"
},
{
"name": "19845",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19845"
},
{
"name": "VU#477960",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/477960"
},
{
"name": "20060517 Re:POC exploit for freeFTPd 1.0.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/434415/30/4920/threaded"
},
{
"name": "25463",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/25463"
},
{
"name": "20060514 POC exploit for freeSSHd version 1.0.9",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=114764338702488\u0026w=2"
},
{
"name": "20136",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/20136"
},
{
"name": "ADV-2006-1842",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/1842"
},
{
"name": "ADV-2006-1785",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/1785"
},
{
"name": "17958",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/17958"
},
{
"name": "20060515 Re: [Full-disclosure] POC exploit for freeSSHd version 1.0.9",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/434038/100/0/threaded"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-2407",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "19846",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19846"
},
{
"name": "25569",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25569"
},
{
"name": "20060514 POC exploit for freeSSHd version 1.0.9",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/434007/100/0/threaded"
},
{
"name": "20060517 POC exploit for freeFTPd 1.0.10",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/434402/100/0/threaded"
},
{
"name": "ADV-2006-1786",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1786"
},
{
"name": "901",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/901"
},
{
"name": "freesshd-key-exchange-bo(26442)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26442"
},
{
"name": "20060517 BUGTRAQ:20060517 Re:POC exploit for freeFTPd 1.0.10",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/434415/100/0/threaded"
},
{
"name": "19845",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19845"
},
{
"name": "VU#477960",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/477960"
},
{
"name": "20060517 Re:POC exploit for freeFTPd 1.0.10",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/434415/30/4920/threaded"
},
{
"name": "25463",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25463"
},
{
"name": "20060514 POC exploit for freeSSHd version 1.0.9",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure\u0026m=114764338702488\u0026w=2"
},
{
"name": "20136",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20136"
},
{
"name": "ADV-2006-1842",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1842"
},
{
"name": "ADV-2006-1785",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1785"
},
{
"name": "17958",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17958"
},
{
"name": "20060515 Re: [Full-disclosure] POC exploit for freeSSHd version 1.0.9",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/434038/100/0/threaded"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-2407",
"datePublished": "2006-05-16T10:00:00.000Z",
"dateReserved": "2006-05-15T00:00:00.000Z",
"dateUpdated": "2024-08-07T17:51:04.671Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}