Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2006-6476

EPSS 0.10% · P27
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2006-6476

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
FRAgent.exe in Mandiant First Response (MFR) before 1.1.1, when run in daemon mode and when the agent is bound to 0.0.0.0 (all interfaces), opens sockets in non-exclusive mode, which allows local users to hijack the socket, and capture data or cause a denial of service (loss of daemon operation).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Mandiant First Response FRAgent守护程序劫持代理漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Mandiant First Response是一款事件响应工具,用于收集所运行进程、系统服务之类的系统信息。 Mandiant First Response中存在多个安全漏洞,具体如下:通过代理劫持导致HTTP或SSL代理拒绝服务 FRAgent守护程序允许其他进程绑定到正在监听的同一套接字地址。如果FRAgent被绑定到了0.0.0.0通配符地址(所有接口)的话,恶意进程就可以通过绑定到特定IP地址的同一端口上拦截客户端连接。通过使用不响应的监听程序劫持代理,攻击者就可以阻止所有合法的客户端连接。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2006-6476

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2006-6476

登录查看更多情报信息。

Same Patch Batch · n/a · 2006-12-20 · 46 CVEs total

CVE-2006-6659Microsoft Outlook ActiveX控件远程Internet Explorer拒绝服务漏洞
CVE-2006-6499Mozilla Firefox/SeaMonkey/Thunderbird s_dtoa()函数内存破坏漏洞
CVE-2006-6501Mozilla Firefox/SeaMonkey/Thunderbird watch() JavaScript函数任意代码执行漏洞
CVE-2006-6504Mozilla Firefox/SeaMonkey/Thunderbird SVG标注对象拒绝服务漏洞
CVE-2006-6505Mozilla Firefox/SeaMonkey/Thunderbird 多个堆溢出漏洞
CVE-2006-6506Mozilla Firefox/SeaMonkey/Thunderbird Feed Preview功能安全泄露漏洞
CVE-2006-6507Mozilla Firefox 原型回退功能跨站脚本攻击漏洞
CVE-2006-6641CA CleverPath Portal和其他嵌入了Portal 环境会话劫持漏洞
CVE-2006-6503Mozilla Firefox/SeaMonkey/Thunderbird IMG元素的src属性跨站脚本漏洞
CVE-2006-6497Mozilla Firefox/SeaMonkey/Thunderbird 未明拒绝服务漏洞
CVE-2006-6498Mozilla Firefox/SeaMonkey/Thunderbird JavaScript引擎错误内存破坏漏洞
CVE-2006-6658Inktomi Search 参数缺失直接请求路径泄露漏洞
CVE-2006-6657NetBSD-current if_clone_list函数敏感信息泄露漏洞
CVE-2006-6656NetBSD-current ptrace未明信息泄露漏洞
CVE-2006-6655NetBSD-curren procfs文件系统拒绝服务攻击漏洞
CVE-2006-6654NetBSD-current sendmsg函数拒绝服务攻击漏洞
CVE-2006-6653NetBSD-current accept函数拒绝服务攻击漏洞
CVE-2006-6652NetBSD-current 'glob.c'缓冲区溢出漏洞
CVE-2006-6651Intel 2200BG 'W29N51.SYS'驱动信标帧远程执行代码漏洞
CVE-2006-6650MXBB Charts 模块 'charts_constants.php' Module_Root_Path远程文件包含漏洞

Showing top 20 of 46 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2006-6476

No comments yet


Leave a comment