Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2009-0323

EPSS 73.54% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2009-0323

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 and 11.0 allow remote attackers to execute arbitrary code via (1) a long type parameter in an input tag, which is not properly handled by the EndOfXmlAttributeValue function; (2) an "HTML GI" in a start tag, which is not properly handled by the ProcessStartGI function; and unspecified vectors in (3) html2thot.c and (4) xml2thot.c, related to the msgBuffer variable. NOTE: these are different vectors than CVE-2008-6005.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
w3 amaya 缓冲区溢出漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
W3C Amaya Web浏览器10.0和11.0版本存在多个栈缓冲区溢出漏洞。远程攻击者可以借助(1)输入标签中的一个长类型参数(未被EndOfXmlAttributeValue函数进行正确的处理);(2)开始标签中的一个"HTML GI"(未被ProcessStartGI函数进行正确的处理);(3)html2thot.c和(4)xml2thot.c中的未明向量,执行任意代码。这些漏洞与msgBuffer变量有关。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2009-0323

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2009-0323

登录查看更多情报信息。

Same Patch Batch · n/a · 2009-01-28 · 37 CVEs total

CVE-2009-0314gedit 代码问题漏洞
CVE-2008-6001ADN Forum Cookie 身份认证绕过漏洞
CVE-2008-6002web-cp 'sendfile.php' 绝对路径遍历漏洞
CVE-2008-6003AJ Auction Pro Platinum 'sellers_othersitem.php' SQL注入漏洞
CVE-2008-6004AJ Auction Pro Platinum 'search.php'跨站脚本攻击漏洞
CVE-2008-5984Dia Python插件使用不安全搜索路径漏洞
CVE-2008-5985Gnome Epiphany PySys_SetArgv函数命令执行漏洞
CVE-2008-5986Csound 多个代码执行漏洞
CVE-2008-5987Gnome Eye of GNOME Python界面远程代码执行漏洞
CVE-2008-6000gdata totalcare_2008 资源管理错误漏洞
CVE-2009-0315XChat安全漏洞
CVE-2009-0316Vim 安全漏洞
CVE-2009-0317Gnome Nautilus Python language binding 不可信的搜索路径漏洞
CVE-2009-0318Gnome Gnumeric不可信的搜索路径漏洞
CVE-2008-5983Python 代码问题漏洞
CVE-2009-0313winetricks 'x_showmenu.txt'不安全临时文件创建漏洞
CVE-2009-0042Computer Associates Anti-Virus Engine 安全漏洞
CVE-2009-0312MoinMoin 'antispam.py' 跨站脚本攻击漏洞
CVE-2008-5991MailWatch 'docs.php' 目录遍历漏洞
CVE-2008-3358SAP NetWeaver portal Web Dynpro跨站脚本攻击漏洞

Showing top 20 of 37 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2009-0323

No comments yet


Leave a comment