FKIE_CVE-2003-0510

Vulnerability from fkie_nvd - Published: 2003-08-07 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in ezbounce 1.0 through 1.50 allows remote attackers to execute arbitrary code via the "sessions" command.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "516D2E61-B60E-4221-894C-68B9F8D2A5F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D961F7-00E5-4330-A135-1AF1FB287792",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9BEA62B-1C45-415D-8B19-2D045E6D2939",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "406F00FF-5213-4988-9285-641B973E7CD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "14B02BED-354E-4C6A-8C0F-F334E4FBB127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE058C2-76F5-4A94-B824-B144E35024E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CBA3189-2DEF-450B-B227-07E0A470486A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AC1A181-FDB7-4A77-A1A7-0FBFA15F4118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6798DC67-74D5-4FEE-BCE6-5E40F5EC7841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3539A733-A85B-4295-A272-3EE6DF959414",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "86BB9AC1-7137-4A42-A07A-7AEC30E0CE30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3401E8D-DE6B-4EE4-A66C-AC1397BEE9D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C81D947-BF4F-4FA8-B318-A724B5974003",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C9D2CD6-A7AD-4CDA-A954-AC132C68A125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4503D024-BC94-40D2-9940-FDAE0AE9D7E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "18810B21-1B62-4E49-BF5D-B44EED92B70E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "14C2D44F-720E-45D5-BA5E-9EA22507DDA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "17F922A7-CAB8-4540-A165-08B5417264DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A455589-158B-4D9F-8114-02FA55DBFDCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2C862C-1DDD-4632-86FC-8DFF07A5B12B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A6C291-5816-4B52-8FE2-288FFE85FA20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "F22C001F-74A7-468B-9247-8BEAAD3E78BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EE023A-DD98-4CA0-972A-3120C07F71F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAEDA3E3-6A02-4441-B231-4E83A2DBC1F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "12FD4DC4-3700-4AC6-8312-87C859D3BF7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "4072D5B2-C787-44BB-AA7C-D300A09BBAF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EA2253A-6B22-42AA-BD6F-ED2B9EF20F58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "215FA6F1-7E83-4137-8C1B-D1538218E178",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "82A7A152-043C-40C5-9A81-412D3B72B999",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBD16A1F-2E1D-4933-9385-DC5536527377",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B03C45F-079D-46F0-96E3-637677A3CC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "38695636-B90E-4EA3-AA22-0F317AB95F1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "F91FD3A5-3722-4867-BF85-D2337CDC7B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AAD910C-E938-4476-A83C-E477BD4970B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "323A9E9C-DE2A-49CB-AEE2-08A3366368D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BD2B79D-6C7A-4ABC-B54A-B65481DF81E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "19E33E53-7FDF-4C15-BED7-25BE5E6A588E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC82494D-EDC3-480A-8AD1-71545BB5FBF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCA7AF9B-CED2-4822-B98C-450ED99AD624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A6325B6-CAC3-43C8-8A65-3056574908D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5B98DA-DD5B-4304-A724-F181646DD73D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CEF3B28-C8A6-4222-AF29-FB90F65EFEA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "69EF64A5-812D-41DB-AD3E-D9DCD0E92A76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "758E6736-9694-4533-8795-B24C9D4287E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "76D31CAF-BC92-4AAA-9A31-39C90C376254",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "3006826C-A7B0-48E1-B4F2-1B34EE5C89B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "0996E11B-3B64-4C3A-9AFD-C870B6A9CAD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "06B6FF62-E95D-46EE-BFE5-888080B65B08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "924F39F0-FB8F-43D0-93A0-1D5E9FD07DA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "701E8CB2-9B9C-45E2-AA09-9A5D86E4ADE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbounce:ezbounce:1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F668838-CC11-41AD-BAD6-A1BE27D890FF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in ezbounce 1.0 through 1.50 allows remote attackers to execute arbitrary code via the \"sessions\" command."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de cadena de formatoen ezbounce 1.0 a 1.50 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante el comando \"sessions\"."
    }
  ],
  "id": "CVE-2003-0510",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2003-08-07T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://druglord.freelsd.org/ezbounce/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=105709355110281\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://druglord.freelsd.org/ezbounce/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=105709355110281\u0026w=2"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…