Ergebnis für URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925
   [1]CVE

   [2](BUTTON) CVE List▾
   [3]CVE List Search [4]Search Tips [5]CVE Request Web Form [6]Web Form Help [7]PGP
   Key [8]CVE List Documents & Guidance [9]Terms of Use

   [10](BUTTON) CNAs▾
   [11]CVE Numbering Authorities (CNAs) [12]Participating CNAs [13]CNA Documents,
   Policies & Guidance [14]CNA Rules, Version 3.0 [15]New CNA Onboarding [16]Slides
   & Videos [17]How to Become a CNA

   [18](BUTTON) WGs▾
   [19]CVE Working Groups [20]Automation (AWG) [21]CNA Coordination (CNACWG)
   [22]Outreach and Communications (OCWG) [23]CVE Quality (QWG) [24]Strategic
   Planning (SPWG) [25]Tactical (TWG)

   [26](BUTTON) Board▾
   [27]CVE Board [28]Members [29]Email Archives [30]Meeting Archives [31]Board
   Charter

   [32](BUTTON) About▾
   [33]About CVE [34]Professional Code of Conduct [35]CVE & NVD Relationship
   [36]History [37]Sponsor [38]Documentation & Guidance [39]FAQs [40]Terminology

   [41](BUTTON) News & Blog▾
   [42]Latest CVE News [43]Blog [44]Podcast [45]Calendar [46]Archive [47]Follow CVE
   [48]Free CVE Newsletter [49]CVEnew Twitter Feed Twitter [50]CVEannounce Twitter
   Feed Twitter [51]CVE on Medium Medium [52]CVE on LinkedIn LinkedIn [53]CVEProject
   on GitHub GitHub [54]CVE on YouTube YouTube


   [55]Search CVE List

   [56]Downloads

   [57]Data Feeds

   [58]Update a CVE Record

   [59]Request CVE IDs


   TOTAL CVE Records: [60]233151
   NOTICE: Transition to the all-new CVE website at [61]WWW.CVE.ORG and [62]CVE
   Record Format JSON are underway.
   NOTICE: Legacy CVE download formats [63]deprecation is now underway and will end
   on June 30, 2024.
   New CVE List download format is [64]available now.

   [65]Home > [66]CVE > CVE-2006-5925

   ¿

   CVE-ID

CVE-2006-5925

   [67]Learn more at National Vulnerability Database (NVD)
   o CVSS Severity Rating o Fix Information o Vulnerable Software Versions o SCAP
   Mappings o CPE Information
   Description
   Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed allows
   remote attackers to execute arbitrary code via shell metacharacters in an smb://
   URI, as demonstrated by using PUT and GET statements.
   References
   Note: [68]References are provided for the convenience of the reader to help
   distinguish between vulnerabilities. The list is not intended to be complete.
     * [69]MISC:1017232
     * [70]URL:http://securitytracker.com/id?1017232
     * [71]MISC:1017233
     * [72]URL:http://securitytracker.com/id?1017233
     * [73]MISC:20061115 Links smbclient command execution
     * [74]URL:http://marc.info/?l=full-disclosure&m=116355556512780&w=2
     * [75]MISC:20061115 Links smbclient command execution
     * [76]URL:http://www.securityfocus.com/archive/1/451870/100/200/threaded
     * [77]MISC:2007-0005
     * URL:[DEL: http://www.trustix.org/errata/2007/0005 :DEL] (Obsolete source -
       [78]check if archived by the Wayback Machine)
     * [79]MISC:21082
     * [80]URL:http://www.securityfocus.com/bid/21082
     * [81]MISC:22905
     * [82]URL:http://secunia.com/advisories/22905
     * [83]MISC:22920
     * [84]URL:http://secunia.com/advisories/22920
     * [85]MISC:22923
     * [86]URL:http://secunia.com/advisories/22923
     * [87]MISC:23022
     * [88]URL:http://secunia.com/advisories/23022
     * [89]MISC:23132
     * [90]URL:http://secunia.com/advisories/23132
     * [91]MISC:23188
     * [92]URL:http://secunia.com/advisories/23188
     * [93]MISC:23234
     * [94]URL:http://secunia.com/advisories/23234
     * [95]MISC:23389
     * [96]URL:http://secunia.com/advisories/23389
     * [97]MISC:23467
     * [98]URL:http://secunia.com/advisories/23467
     * [99]MISC:24005
     * [100]URL:http://secunia.com/advisories/24005
     * [101]MISC:24054
     * [102]URL:http://secunia.com/advisories/24054
     * [103]MISC:DSA-1226
     * [104]URL:https://www.debian.org/security/2006/dsa-1226
     * [105]MISC:DSA-1228
     * [106]URL:http://www.debian.org/security/2006/dsa-1228
     * [107]MISC:DSA-1240
     * [108]URL:http://www.debian.org/security/2006/dsa-1240
     * [109]MISC:GLSA-200612-16
     * [110]URL:http://security.gentoo.org/glsa/glsa-200612-16.xml
     * [111]MISC:GLSA-200701-27
     * [112]URL:http://www.gentoo.org/security/en/glsa/glsa-200701-27.xml
     * [113]MISC:MDKSA-2006:216
     * URL:[DEL: http://www.mandriva.com/security/advisories?name=MDKSA-2006:216
       :DEL] (Obsolete source)
     * [114]MISC:RHSA-2006:0742
     * [115]URL:http://www.redhat.com/support/errata/RHSA-2006-0742.html
     * [116]MISC:SUSE-SR:2006:027
     * [117]URL:http://www.novell.com/linux/security/advisories/2006_27_sr.html
     * [118]MISC:http://bugzilla.elinks.cz/show_bug.cgi?id=841
     * [119]URL:http://bugzilla.elinks.cz/show_bug.cgi?id=841
     * [120]MISC:links-smbclient-command-execution(30299)
     * [121]URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30299
     * [122]MISC:oval:org.mitre.oval:def:11213
     * [123]URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.
       mitre.oval%3Adef%3A11213

   Assigning CNA
   Red Hat, Inc.
   Date Record Created
   20061115 Disclaimer: The [124]record creation date may reflect when the CVE ID
   was allocated or reserved, and does not necessarily indicate when this
   vulnerability was discovered, shared with the affected vendor, publicly
   disclosed, or updated in CVE.
   Phase (Legacy)
   Assigned (20061115)
   Votes (Legacy)
   Comments (Legacy)

   Proposed (Legacy)
   N/A
   This is an record on the [125]CVE List, which provides common identifiers for
   publicly known cybersecurity vulnerabilities.
   Search CVE Using Keywords:   ____________________ Submit
   You can also search by reference using the [126]CVE Reference Maps.
   For More Information:  [127]CVE Request Web Form (select "Other" from dropdown)
   [128]Back to top

   [129]Site Map | [130]Terms of Use | [131]Privacy Policy | [132]Contact Us |
   Follow CVE  [133]Twitter [134]LinkedIn [135]GitHub [136]YouTube [137]Medium
   [138]Search CVE Website

   Use of the CVE® List and the associated references from this website are subject
   to the [139]terms of use. CVE is sponsored by the [140]U.S. Department of
   Homeland Security (DHS) [141]Cybersecurity and Infrastructure Security Agency
   (CISA). Copyright © 1999-2024, [142]The MITRE Corporation. CVE and the CVE logo
   are registered trademarks of The MITRE Corporation.

References

   Visible links:
   1. https://cve.mitre.org/index.html
   2. https://www.cve.org/
   3. https://cve.mitre.org/cve/search_cve_list.html
   4. https://cve.mitre.org/find/search_tips.html
   5. https://cveform.mitre.org/
   6. https://www.cve.org/ResourcesSupport/FAQs#pc_cve_request_web_form
   7. https://www.cve.org/ResourcesSupport/FAQs#pc_cve_request_web_formweb_form_encrypt_requests
   8. https://www.cve.org/ResourcesSupport/Resources
   9. https://www.cve.org/Legal/TermsOfUse
  10. https://www.cve.org/ProgramOrganization/CNAs
  11. https://www.cve.org/ProgramOrganization/CNAs
  12. https://www.cve.org/PartnerInformation/ListofPartners
  13. https://www.cve.org/ResourcesSupport/Resources#CVENumberingAuthorities
  14. https://www.cve.org/ResourcesSupport/AllResources/CNARules
  15. https://www.cve.org/PartnerInformation/Partner#CNA
  16. https://www.cve.org/ResourcesSupport/Resources#cnaOnboarding
  17. https://www.cve.org/PartnerInformation/Partner#HowToBecomeAPartner
  18. https://www.cve.org/ProgramOrganization/WorkingGroups
  19. https://www.cve.org/ProgramOrganization/WorkingGroups
  20. https://www.cve.org/ProgramOrganization/WorkingGroups#AutomationWorkingGroupAWG
  21. https://www.cve.org/ProgramOrganization/WorkingGroups#CNACoordinationWorkingGroupCNACWG
  22. https://www.cve.org/ProgramOrganization/WorkingGroups#OutreachandCommunicationsWorkingGroupOCWG
  23. https://www.cve.org/ProgramOrganization/WorkingGroups#QualityWorkingGroupQWG
  24. https://www.cve.org/ProgramOrganization/WorkingGroups#StrategicPlanningWorkingGroupSPWG
  25. https://www.cve.org/ProgramOrganization/WorkingGroups#TacticalWorkingGroup
  26. https://www.cve.org/ProgramOrganization/Board
  27. https://www.cve.org/ProgramOrganization/Board
  28. https://www.cve.org/ProgramOrganization/Board#Members
  29. https://cve.mitre.org/community/board/archive.html#board_mail_list_archive
  30. https://cve.mitre.org/community/board/archive.html#meeting_summaries
  31. https://www.cve.org/ProgramOrganization/Board#Resources
  32. https://www.cve.org/About/Overview
  33. https://www.cve.org/About/Overview
  34. https://www.cve.org/ResourcesSupport/AllResources/ProfessionalCodeOfConduct
  35. https://www.cve.org/ResourcesSupport/FAQs#pc_introcve_nvd_relationship
  36. https://www.cve.org/About/History
  37. https://www.cve.org/ResourcesSupport/FAQs#pc_introwho_owns_cve
  38. https://www.cve.org/ResourcesSupport/Resources
  39. https://www.cve.org/ResourcesSupport/FAQs
  40. https://www.cve.org/ResourcesSupport/Glossary
  41. https://www.cve.org/Media/News/AllNews
  42. https://www.cve.org/Media/News/AllNews
  43. https://www.cve.org/Media/News/Blogs
  44. https://www.cve.org/Media/News/Podcasts
  45. https://www.cve.org/Media/Events
  46. https://cve.mitre.org/news/archives/index.html
  47. https://cve.mitre.org/cve/data_feeds.html
  48. https://www.cve.org/Media/News/NewsletterSignup
  49. https://twitter.com/CVEnew/
  50. https://twitter.com/CVEannounce/
  51. https://medium.com/@CVE_Program
  52. https://www.linkedin.com/company/cve-program
  53. https://github.com/CVEProject
  54. https://www.youtube.com/channel/UCUHd2XFDsKH8kjMZQaSKpDQ/
  55. https://cve.mitre.org/cve/search_cve_list.html
  56. https://www.cve.org/Downloads
  57. https://www.cve.org/ResourcesSupport/FAQs#pc_cve_list_basicscve_list_data_feeds
  58. https://www.cve.org/ReportRequest/ReportRequestForNonCNAs#UpdateCVERecord
  59. https://www.cve.org/ReportRequest/ReportRequestForNonCNAs#RequestCVEID
  60. https://www.cve.org/
  61. https://www.cve.org/
  62. https://www.cve.org/Media/News/item/blog/2022/10/06/CVE-Records-Are-Now-Displayed
  63. https://medium.com/@cve_program/phase-3-of-legacy-cve-download-formats-deprecation-now-underway-15c27faa4456
  64. https://www.cve.org/Media/News/item/blog/2023/03/29/CVE-Downloads-in-JSON-5-Format
  65. https://cve.mitre.org/
  66. https://cve.mitre.org/cve/
  67. https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-5925
  68. https://cve.mitre.org/data/refs/index.html
  69. https://cve.mitre.org/cgi-bin/1017232
  70. http://securitytracker.com/id?1017232
  71. https://cve.mitre.org/cgi-bin/1017233
  72. http://securitytracker.com/id?1017233
  73. https://cve.mitre.org/cgi-bin/20061115%20Links%20smbclient%20command%20execution
  74. http://marc.info/?l=full-disclosure&m=116355556512780&w=2
  75. https://cve.mitre.org/cgi-bin/20061115%20Links%20smbclient%20command%20execution
  76. http://www.securityfocus.com/archive/1/451870/100/200/threaded
  77. https://cve.mitre.org/cgi-bin/2007-0005
  78. https://web.archive.org/web/*/http://www.trustix.org/errata/2007/0005
  79. https://cve.mitre.org/cgi-bin/21082
  80. http://www.securityfocus.com/bid/21082
  81. https://cve.mitre.org/cgi-bin/22905
  82. http://secunia.com/advisories/22905
  83. https://cve.mitre.org/cgi-bin/22920
  84. http://secunia.com/advisories/22920
  85. https://cve.mitre.org/cgi-bin/22923
  86. http://secunia.com/advisories/22923
  87. https://cve.mitre.org/cgi-bin/23022
  88. http://secunia.com/advisories/23022
  89. https://cve.mitre.org/cgi-bin/23132
  90. http://secunia.com/advisories/23132
  91. https://cve.mitre.org/cgi-bin/23188
  92. http://secunia.com/advisories/23188
  93. https://cve.mitre.org/cgi-bin/23234
  94. http://secunia.com/advisories/23234
  95. https://cve.mitre.org/cgi-bin/23389
  96. http://secunia.com/advisories/23389
  97. https://cve.mitre.org/cgi-bin/23467
  98. http://secunia.com/advisories/23467
  99. https://cve.mitre.org/cgi-bin/24005
 100. http://secunia.com/advisories/24005
 101. https://cve.mitre.org/cgi-bin/24054
 102. http://secunia.com/advisories/24054
 103. https://cve.mitre.org/cgi-bin/DSA-1226
 104. https://www.debian.org/security/2006/dsa-1226
 105. https://cve.mitre.org/cgi-bin/DSA-1228
 106. http://www.debian.org/security/2006/dsa-1228
 107. https://cve.mitre.org/cgi-bin/DSA-1240
 108. http://www.debian.org/security/2006/dsa-1240
 109. https://cve.mitre.org/cgi-bin/GLSA-200612-16
 110. http://security.gentoo.org/glsa/glsa-200612-16.xml
 111. https://cve.mitre.org/cgi-bin/GLSA-200701-27
 112. http://www.gentoo.org/security/en/glsa/glsa-200701-27.xml
 113. MDKSA-2006:216
 114. RHSA-2006:0742
 115. http://www.redhat.com/support/errata/RHSA-2006-0742.html
 116. SUSE-SR:2006:027
 117. http://www.novell.com/linux/security/advisories/2006_27_sr.html
 118. http://bugzilla.elinks.cz/show_bug.cgi?id=841
 119. http://bugzilla.elinks.cz/show_bug.cgi?id=841
 120. https://cve.mitre.org/cgi-bin/links-smbclient-command-execution(30299)
 121. https://exchange.xforce.ibmcloud.com/vulnerabilities/30299
 122. oval:org.mitre.oval:def:11213
 123. https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11213
 124. https://cve.mitre.org/about/faqs.html#date_record_created_in_cve_record
 125. https://cve.mitre.org/cve/
 126. https://cve.mitre.org/data/refs/index.html
 127. https://cveform.mitre.org/
 128. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925#top
 129. https://cve.mitre.org/sitemap.html
 130. https://www.cve.org/Legal/TermsOfUse
 131. https://www.cve.org/Legal/PrivacyPolicy
 132. https://cveform.mitre.org/
 133. https://twitter.com/CVEnew/
 134. https://www.linkedin.com/company/cve-program
 135. https://github.com/CVEProject
 136. https://www.youtube.com/channel/UCUHd2XFDsKH8kjMZQaSKpDQ/
 137. https://medium.com/@cve_program
 138. https://cve.mitre.org/find/index.html
 139. https://cve.mitre.org/about/termsofuse.html
 140. https://www.dhs.gov/
 141. https://www.dhs.gov/cisa/cybersecurity-division/
 142. https://www.mitre.org/

   Hidden links:
 144. https://cve.mitre.org/index.html


Usage: http://www.kk-software.de/kklynxview/get/URL
e.g. http://www.kk-software.de/kklynxview/get/http://www.kk-software.de
Errormessages are in German, sorry ;-)