Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://secunia.com/secunia_research/2005-66/advisory/", "name": "http://secunia.com/secunia_research/2005-66/advisory/", "tags": ["Vendor Advisory"], "refsource": "MISC"}, {"url": "http://secunia.com/secunia_research/2005-32/advisory/", "name": "http://secunia.com/secunia_research/2005-32/advisory/", "tags": ["Vendor Advisory"], "refsource": "MISC"}, {"url": "http://secunia.com/secunia_research/2005-34/advisory/", "name": "http://secunia.com/secunia_research/2005-34/advisory/", "tags": ["Vendor Advisory"], "refsource": "MISC"}, {"url": "http://secunia.com/secunia_research/2005-36/advisory/", "name": "http://secunia.com/secunia_research/2005-36/advisory/", "tags": ["Vendor Advisory"], "refsource": "MISC"}, {"url": "http://secunia.com/secunia_research/2005-37/advisory/", "name": "http://secunia.com/secunia_research/2005-37/advisory/", "tags": ["Vendor Advisory"], "refsource": "MISC"}, {"url": "http://secunia.com/advisories/16100", "name": "16100", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/16280", "name": "16280", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.kb.cert.org/vuls/id/884076", "name": "VU#884076", "tags": ["Third Party Advisory", "US Government Resource"], "refsource": "CERT-VN"}, {"url": "http://www.osvdb.org/23064", "name": "23064", "tags": ["Patch"], "refsource": "OSVDB"}, {"url": "http://www.osvdb.org/23065", "name": "23065", "tags": ["Patch"], "refsource": "OSVDB"}, {"url": "http://www.osvdb.org/23066", "name": "23066", "tags": ["Patch"], "refsource": "OSVDB"}, {"url": "http://www.osvdb.org/23067", "name": "23067", "tags": ["Patch"], "refsource": "OSVDB"}, {"url": "http://www.osvdb.org/23068", "name": "23068", "tags": ["Patch"], "refsource": "OSVDB"}, {"url": "http://securitytracker.com/id?1015657", "name": "1015657", "tags": ["Patch"], "refsource": "SECTRACK"}, {"url": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918", "name": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918", "tags": ["Patch"], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/16576", "name": "16576", "tags": [], "refsource": "BID"}, {"url": "http://www.vupen.com/english/advisories/2006/0500", "name": "ADV-2006-0500", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2006/0501", "name": "ADV-2006-0501", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24639", "name": "lotus-htmsr-link-bo(24639)", "tags": [], "refsource": "XF"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24638", "name": "lotus-tarrdr-filename-bo(24638)", "tags": [], "refsource": "XF"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24636", "name": "lotus-uudrdr-uue-bo(24636)", "tags": [], "refsource": "XF"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24635", "name": "lotus-kvarcve-filename-bo(24635)", "tags": [], "refsource": "XF"}, {"url": "http://www.securityfocus.com/archive/1/424692/100/0/threaded", "name": "20060210 Secunia Research: Lotus Notes HTML Speed Reader Link BufferOverflows", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.securityfocus.com/archive/1/424689/100/0/threaded", "name": "20060210 Secunia Research: Lotus Notes UUE File Handling Buffer Overflow", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.securityfocus.com/archive/1/424666/100/0/threaded", "name": "20060210 Secunia Research: Lotus Notes TAR Reader File Extraction BufferOverflow", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.securityfocus.com/archive/1/424626/100/0/threaded", "name": "20060210 Secunia Research: Lotus Notes ZIP File Handling Buffer Overflow", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allow remote attackers to execute arbitrary code via (1) a UUE file containing an encoded file with a long filename handled by uudrdr.dll, (2) a compressed ZIP file with a long filename handled by kvarcve.dll, (3) a TAR archive with a long filename that is extracted to a directory with a long path handled by the TAR reader (tarrdr.dll), (4) an email that contains a long HTTP, FTP, or // link handled by the HTML speed reader (htmsr.dll) or (5) an email containing a crafted long link handled by the HTML speed reader (htmsr.dll)."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-119"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2005-2618", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": true, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}}, "publishedDate": "2005-12-31T05:00Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:6.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-19T15:33Z"}