Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2006-3326 | First vendor Publication | 2006-06-30 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 2.6 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Directory traversal vulnerability in QuickZip 3.06.3 allows remote user-assisted attackers to overwrite arbitrary files or directories via .. (dot dot) sequences in filenames within (1) TAR,(2) GZ, and (3) JAR archives. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3326 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
26908 | QuickZip Multiple Archive Traversal Arbitrary File Write QuickZip contains a flaw that allows a remote attacker to place malicious files to arbitrary locations outside of the specified directory. The issue is due to the program not properly sanitizing user input when extracting TAR, GZ and JAR archives, specifically directory traversal style attacks (../../). |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:20:05 |
|
2024-11-28 12:09:22 |
|
2021-05-04 12:04:15 |
|
2021-04-22 01:04:52 |
|
2020-05-23 00:18:01 |
|
2017-07-20 09:23:43 |
|
2016-06-28 15:51:25 |
|
2016-04-26 14:48:36 |
|
2013-05-11 11:01:48 |
|