Ergebnis für URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925 [1]CVE
[2](BUTTON) CVE List▾
[3]CVE List Search [4]Search Tips [5]CVE Request Web Form [6]Web Form Help [7]PGP
Key [8]CVE List Documents & Guidance [9]Terms of Use
[10](BUTTON) CNAs▾
[11]CVE Numbering Authorities (CNAs) [12]Participating CNAs [13]CNA Documents,
Policies & Guidance [14]CNA Rules, Version 3.0 [15]New CNA Onboarding [16]Slides
& Videos [17]How to Become a CNA
[18](BUTTON) WGs▾
[19]CVE Working Groups [20]Automation (AWG) [21]CNA Coordination (CNACWG)
[22]Outreach and Communications (OCWG) [23]CVE Quality (QWG) [24]Strategic
Planning (SPWG) [25]Tactical (TWG)
[26](BUTTON) Board▾
[27]CVE Board [28]Members [29]Email Archives [30]Meeting Archives [31]Board
Charter
[32](BUTTON) About▾
[33]About CVE [34]Professional Code of Conduct [35]CVE & NVD Relationship
[36]History [37]Sponsor [38]Documentation & Guidance [39]FAQs [40]Terminology
[41](BUTTON) News & Blog▾
[42]Latest CVE News [43]Blog [44]Podcast [45]Calendar [46]Archive [47]Follow CVE
[48]Free CVE Newsletter [49]CVEnew Twitter Feed Twitter [50]CVEannounce Twitter
Feed Twitter [51]CVE on Medium Medium [52]CVE on LinkedIn LinkedIn [53]CVEProject
on GitHub GitHub [54]CVE on YouTube YouTube
[55]Search CVE List
[56]Downloads
[57]Data Feeds
[58]Update a CVE Record
[59]Request CVE IDs
TOTAL CVE Records: [60]233151
NOTICE: Transition to the all-new CVE website at [61]WWW.CVE.ORG and [62]CVE
Record Format JSON are underway.
NOTICE: Legacy CVE download formats [63]deprecation is now underway and will end
on June 30, 2024.
New CVE List download format is [64]available now.
[65]Home > [66]CVE > CVE-2006-5925
¿
CVE-ID
CVE-2006-5925
[67]Learn more at National Vulnerability Database (NVD)
o CVSS Severity Rating o Fix Information o Vulnerable Software Versions o SCAP
Mappings o CPE Information
Description
Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed allows
remote attackers to execute arbitrary code via shell metacharacters in an smb://
URI, as demonstrated by using PUT and GET statements.
References
Note: [68]References are provided for the convenience of the reader to help
distinguish between vulnerabilities. The list is not intended to be complete.
* [69]MISC:1017232
* [70]URL:http://securitytracker.com/id?1017232
* [71]MISC:1017233
* [72]URL:http://securitytracker.com/id?1017233
* [73]MISC:20061115 Links smbclient command execution
* [74]URL:http://marc.info/?l=full-disclosure&m=116355556512780&w=2
* [75]MISC:20061115 Links smbclient command execution
* [76]URL:http://www.securityfocus.com/archive/1/451870/100/200/threaded
* [77]MISC:2007-0005
* URL:[DEL: http://www.trustix.org/errata/2007/0005 :DEL] (Obsolete source -
[78]check if archived by the Wayback Machine)
* [79]MISC:21082
* [80]URL:http://www.securityfocus.com/bid/21082
* [81]MISC:22905
* [82]URL:http://secunia.com/advisories/22905
* [83]MISC:22920
* [84]URL:http://secunia.com/advisories/22920
* [85]MISC:22923
* [86]URL:http://secunia.com/advisories/22923
* [87]MISC:23022
* [88]URL:http://secunia.com/advisories/23022
* [89]MISC:23132
* [90]URL:http://secunia.com/advisories/23132
* [91]MISC:23188
* [92]URL:http://secunia.com/advisories/23188
* [93]MISC:23234
* [94]URL:http://secunia.com/advisories/23234
* [95]MISC:23389
* [96]URL:http://secunia.com/advisories/23389
* [97]MISC:23467
* [98]URL:http://secunia.com/advisories/23467
* [99]MISC:24005
* [100]URL:http://secunia.com/advisories/24005
* [101]MISC:24054
* [102]URL:http://secunia.com/advisories/24054
* [103]MISC:DSA-1226
* [104]URL:https://www.debian.org/security/2006/dsa-1226
* [105]MISC:DSA-1228
* [106]URL:http://www.debian.org/security/2006/dsa-1228
* [107]MISC:DSA-1240
* [108]URL:http://www.debian.org/security/2006/dsa-1240
* [109]MISC:GLSA-200612-16
* [110]URL:http://security.gentoo.org/glsa/glsa-200612-16.xml
* [111]MISC:GLSA-200701-27
* [112]URL:http://www.gentoo.org/security/en/glsa/glsa-200701-27.xml
* [113]MISC:MDKSA-2006:216
* URL:[DEL: http://www.mandriva.com/security/advisories?name=MDKSA-2006:216
:DEL] (Obsolete source)
* [114]MISC:RHSA-2006:0742
* [115]URL:http://www.redhat.com/support/errata/RHSA-2006-0742.html
* [116]MISC:SUSE-SR:2006:027
* [117]URL:http://www.novell.com/linux/security/advisories/2006_27_sr.html
* [118]MISC:http://bugzilla.elinks.cz/show_bug.cgi?id=841
* [119]URL:http://bugzilla.elinks.cz/show_bug.cgi?id=841
* [120]MISC:links-smbclient-command-execution(30299)
* [121]URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30299
* [122]MISC:oval:org.mitre.oval:def:11213
* [123]URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.
mitre.oval%3Adef%3A11213
Assigning CNA
Red Hat, Inc.
Date Record Created
20061115 Disclaimer: The [124]record creation date may reflect when the CVE ID
was allocated or reserved, and does not necessarily indicate when this
vulnerability was discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE.
Phase (Legacy)
Assigned (20061115)
Votes (Legacy)
Comments (Legacy)
Proposed (Legacy)
N/A
This is an record on the [125]CVE List, which provides common identifiers for
publicly known cybersecurity vulnerabilities.
Search CVE Using Keywords: ____________________ Submit
You can also search by reference using the [126]CVE Reference Maps.
For More Information: [127]CVE Request Web Form (select "Other" from dropdown)
[128]Back to top
[129]Site Map | [130]Terms of Use | [131]Privacy Policy | [132]Contact Us |
Follow CVE [133]Twitter [134]LinkedIn [135]GitHub [136]YouTube [137]Medium
[138]Search CVE Website
Use of the CVE® List and the associated references from this website are subject
to the [139]terms of use. CVE is sponsored by the [140]U.S. Department of
Homeland Security (DHS) [141]Cybersecurity and Infrastructure Security Agency
(CISA). Copyright © 1999-2024, [142]The MITRE Corporation. CVE and the CVE logo
are registered trademarks of The MITRE Corporation.
References
Visible links:
1. https://cve.mitre.org/index.html
2. https://www.cve.org/
3. https://cve.mitre.org/cve/search_cve_list.html
4. https://cve.mitre.org/find/search_tips.html
5. https://cveform.mitre.org/
6. https://www.cve.org/ResourcesSupport/FAQs#pc_cve_request_web_form
7. https://www.cve.org/ResourcesSupport/FAQs#pc_cve_request_web_formweb_form_encrypt_requests
8. https://www.cve.org/ResourcesSupport/Resources
9. https://www.cve.org/Legal/TermsOfUse
10. https://www.cve.org/ProgramOrganization/CNAs
11. https://www.cve.org/ProgramOrganization/CNAs
12. https://www.cve.org/PartnerInformation/ListofPartners
13. https://www.cve.org/ResourcesSupport/Resources#CVENumberingAuthorities
14. https://www.cve.org/ResourcesSupport/AllResources/CNARules
15. https://www.cve.org/PartnerInformation/Partner#CNA
16. https://www.cve.org/ResourcesSupport/Resources#cnaOnboarding
17. https://www.cve.org/PartnerInformation/Partner#HowToBecomeAPartner
18. https://www.cve.org/ProgramOrganization/WorkingGroups
19. https://www.cve.org/ProgramOrganization/WorkingGroups
20. https://www.cve.org/ProgramOrganization/WorkingGroups#AutomationWorkingGroupAWG
21. https://www.cve.org/ProgramOrganization/WorkingGroups#CNACoordinationWorkingGroupCNACWG
22. https://www.cve.org/ProgramOrganization/WorkingGroups#OutreachandCommunicationsWorkingGroupOCWG
23. https://www.cve.org/ProgramOrganization/WorkingGroups#QualityWorkingGroupQWG
24. https://www.cve.org/ProgramOrganization/WorkingGroups#StrategicPlanningWorkingGroupSPWG
25. https://www.cve.org/ProgramOrganization/WorkingGroups#TacticalWorkingGroup
26. https://www.cve.org/ProgramOrganization/Board
27. https://www.cve.org/ProgramOrganization/Board
28. https://www.cve.org/ProgramOrganization/Board#Members
29. https://cve.mitre.org/community/board/archive.html#board_mail_list_archive
30. https://cve.mitre.org/community/board/archive.html#meeting_summaries
31. https://www.cve.org/ProgramOrganization/Board#Resources
32. https://www.cve.org/About/Overview
33. https://www.cve.org/About/Overview
34. https://www.cve.org/ResourcesSupport/AllResources/ProfessionalCodeOfConduct
35. https://www.cve.org/ResourcesSupport/FAQs#pc_introcve_nvd_relationship
36. https://www.cve.org/About/History
37. https://www.cve.org/ResourcesSupport/FAQs#pc_introwho_owns_cve
38. https://www.cve.org/ResourcesSupport/Resources
39. https://www.cve.org/ResourcesSupport/FAQs
40. https://www.cve.org/ResourcesSupport/Glossary
41. https://www.cve.org/Media/News/AllNews
42. https://www.cve.org/Media/News/AllNews
43. https://www.cve.org/Media/News/Blogs
44. https://www.cve.org/Media/News/Podcasts
45. https://www.cve.org/Media/Events
46. https://cve.mitre.org/news/archives/index.html
47. https://cve.mitre.org/cve/data_feeds.html
48. https://www.cve.org/Media/News/NewsletterSignup
49. https://twitter.com/CVEnew/
50. https://twitter.com/CVEannounce/
51. https://medium.com/@CVE_Program
52. https://www.linkedin.com/company/cve-program
53. https://github.com/CVEProject
54. https://www.youtube.com/channel/UCUHd2XFDsKH8kjMZQaSKpDQ/
55. https://cve.mitre.org/cve/search_cve_list.html
56. https://www.cve.org/Downloads
57. https://www.cve.org/ResourcesSupport/FAQs#pc_cve_list_basicscve_list_data_feeds
58. https://www.cve.org/ReportRequest/ReportRequestForNonCNAs#UpdateCVERecord
59. https://www.cve.org/ReportRequest/ReportRequestForNonCNAs#RequestCVEID
60. https://www.cve.org/
61. https://www.cve.org/
62. https://www.cve.org/Media/News/item/blog/2022/10/06/CVE-Records-Are-Now-Displayed
63. https://medium.com/@cve_program/phase-3-of-legacy-cve-download-formats-deprecation-now-underway-15c27faa4456
64. https://www.cve.org/Media/News/item/blog/2023/03/29/CVE-Downloads-in-JSON-5-Format
65. https://cve.mitre.org/
66. https://cve.mitre.org/cve/
67. https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-5925
68. https://cve.mitre.org/data/refs/index.html
69. https://cve.mitre.org/cgi-bin/1017232
70. http://securitytracker.com/id?1017232
71. https://cve.mitre.org/cgi-bin/1017233
72. http://securitytracker.com/id?1017233
73. https://cve.mitre.org/cgi-bin/20061115%20Links%20smbclient%20command%20execution
74. http://marc.info/?l=full-disclosure&m=116355556512780&w=2
75. https://cve.mitre.org/cgi-bin/20061115%20Links%20smbclient%20command%20execution
76. http://www.securityfocus.com/archive/1/451870/100/200/threaded
77. https://cve.mitre.org/cgi-bin/2007-0005
78. https://web.archive.org/web/*/http://www.trustix.org/errata/2007/0005
79. https://cve.mitre.org/cgi-bin/21082
80. http://www.securityfocus.com/bid/21082
81. https://cve.mitre.org/cgi-bin/22905
82. http://secunia.com/advisories/22905
83. https://cve.mitre.org/cgi-bin/22920
84. http://secunia.com/advisories/22920
85. https://cve.mitre.org/cgi-bin/22923
86. http://secunia.com/advisories/22923
87. https://cve.mitre.org/cgi-bin/23022
88. http://secunia.com/advisories/23022
89. https://cve.mitre.org/cgi-bin/23132
90. http://secunia.com/advisories/23132
91. https://cve.mitre.org/cgi-bin/23188
92. http://secunia.com/advisories/23188
93. https://cve.mitre.org/cgi-bin/23234
94. http://secunia.com/advisories/23234
95. https://cve.mitre.org/cgi-bin/23389
96. http://secunia.com/advisories/23389
97. https://cve.mitre.org/cgi-bin/23467
98. http://secunia.com/advisories/23467
99. https://cve.mitre.org/cgi-bin/24005
100. http://secunia.com/advisories/24005
101. https://cve.mitre.org/cgi-bin/24054
102. http://secunia.com/advisories/24054
103. https://cve.mitre.org/cgi-bin/DSA-1226
104. https://www.debian.org/security/2006/dsa-1226
105. https://cve.mitre.org/cgi-bin/DSA-1228
106. http://www.debian.org/security/2006/dsa-1228
107. https://cve.mitre.org/cgi-bin/DSA-1240
108. http://www.debian.org/security/2006/dsa-1240
109. https://cve.mitre.org/cgi-bin/GLSA-200612-16
110. http://security.gentoo.org/glsa/glsa-200612-16.xml
111. https://cve.mitre.org/cgi-bin/GLSA-200701-27
112. http://www.gentoo.org/security/en/glsa/glsa-200701-27.xml
113. MDKSA-2006:216
114. RHSA-2006:0742
115. http://www.redhat.com/support/errata/RHSA-2006-0742.html
116. SUSE-SR:2006:027
117. http://www.novell.com/linux/security/advisories/2006_27_sr.html
118. http://bugzilla.elinks.cz/show_bug.cgi?id=841
119. http://bugzilla.elinks.cz/show_bug.cgi?id=841
120. https://cve.mitre.org/cgi-bin/links-smbclient-command-execution(30299)
121. https://exchange.xforce.ibmcloud.com/vulnerabilities/30299
122. oval:org.mitre.oval:def:11213
123. https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11213
124. https://cve.mitre.org/about/faqs.html#date_record_created_in_cve_record
125. https://cve.mitre.org/cve/
126. https://cve.mitre.org/data/refs/index.html
127. https://cveform.mitre.org/
128. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925#top
129. https://cve.mitre.org/sitemap.html
130. https://www.cve.org/Legal/TermsOfUse
131. https://www.cve.org/Legal/PrivacyPolicy
132. https://cveform.mitre.org/
133. https://twitter.com/CVEnew/
134. https://www.linkedin.com/company/cve-program
135. https://github.com/CVEProject
136. https://www.youtube.com/channel/UCUHd2XFDsKH8kjMZQaSKpDQ/
137. https://medium.com/@cve_program
138. https://cve.mitre.org/find/index.html
139. https://cve.mitre.org/about/termsofuse.html
140. https://www.dhs.gov/
141. https://www.dhs.gov/cisa/cybersecurity-division/
142. https://www.mitre.org/
Hidden links:
144. https://cve.mitre.org/index.html
Usage: http://www.kk-software.de/kklynxview/get/URL
e.g. http://www.kk-software.de/kklynxview/get/http://www.kk-software.de
Errormessages are in German, sorry ;-)