Vulnerabilities > CVE-2006-1900 - Unspecified vulnerability in W3C Amaya 9.4
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Multiple buffer overflows in World Wide Web Consortium (W3C) Amaya 9.4, and possibly other versions including 8.x before 8.8.5, allow remote attackers to execute arbitrary code via a long value in (1) the COMPACT attribute of the COLGROUP element, (2) the ROWS attribute of the TEXTAREA element, and (3) the COLOR attribute of the LEGEND element; and via other unspecified attack vectors consisting of "dozens of possible snippets."
Exploit-Db
description W3C Amaya 9.4 textarea rows Attribute Value Overflow. CVE-2006-1900. Dos exploits for multiple platform id EDB-ID:27639 last seen 2016-02-03 modified 2006-04-13 published 2006-04-13 reporter Thomas Waldegger source https://www.exploit-db.com/download/27639/ title W3C Amaya 9.4 textarea rows Attribute Value Overflow description W3C Amaya 9.4 legend color Attribute Value Overflow. CVE-2006-1900. Dos exploits for multiple platform id EDB-ID:27640 last seen 2016-02-03 modified 2006-04-13 published 2006-04-13 reporter Thomas Waldegger source https://www.exploit-db.com/download/27640/ title W3C Amaya 9.4 legend color Attribute Value Overflow
Nessus
NASL family | FreeBSD Local Security Checks |
NASL id | FREEBSD_PKG_DC930435D59F11DA809800123FFE8333.NASL |
description | Secunia reports : Amaya have two vulnerabilities, which can be exploited by malicious people to compromise a user |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21520 |
published | 2006-05-13 |
reporter | This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/21520 |
title | FreeBSD : amaya -- Attribute Value Buffer Overflow Vulnerabilities (dc930435-d59f-11da-8098-00123ffe8333) |
code |
|
References
- http://morph3us.org/advisories/20060412-amaya-94.txt
- http://morph3us.org/advisories/20060412-amaya-94.txt
- http://morph3us.org/advisories/20060412-amaya-94-2.txt
- http://morph3us.org/advisories/20060412-amaya-94-2.txt
- http://secunia.com/advisories/19670
- http://secunia.com/advisories/19670
- http://www.osvdb.org/24623
- http://www.osvdb.org/24623
- http://www.osvdb.org/24624
- http://www.osvdb.org/24624
- http://www.securityfocus.com/archive/1/430877/100/0/threaded
- http://www.securityfocus.com/archive/1/430877/100/0/threaded
- http://www.securityfocus.com/archive/1/430879/100/0/threaded
- http://www.securityfocus.com/archive/1/430879/100/0/threaded
- http://www.securityfocus.com/bid/17507
- http://www.securityfocus.com/bid/17507
- http://www.vupen.com/english/advisories/2006/1351
- http://www.vupen.com/english/advisories/2006/1351
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25791
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25791