{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T00:55:33.451","vulnerabilities":[{"cve":{"id":"CVE-2003-0081","sourceIdentifier":"cve@mitre.org","published":"2003-03-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Format string vulnerability in packet-socks.c of the SOCKS dissector for Ethereal 0.8.7 through 0.9.9 allows remote attackers to execute arbitrary code via SOCKS packets containing format string specifiers."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*","matchCriteriaId":"9DC35478-9276-4732-9F0D-13CA958C617C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.9.0:*:*:*:*:*:*:*","matchCriteriaId":"73117E69-715B-4779-A5D8-218E15122A66"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*","matchCriteriaId":"CB461B6B-B731-4732-AAD0-191BE50189D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*","matchCriteriaId":"19961880-D38A-4785-A7C5-879A061119BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*","matchCriteriaId":"831705D2-C4DE-475F-B908-8859064AFB38"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*","matchCriteriaId":"A4622585-20E2-46E9-B773-74729FF22EEB"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*","matchCriteriaId":"E86ADCB6-0940-4CB9-85F1-A7694210FB66"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*","matchCriteriaId":"042B6289-D2E2-4369-BB40-EA6EE7025D23"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*","matchCriteriaId":"C93D7B7E-F5F9-44A2-A87B-4A16634DEDAD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*","matchCriteriaId":"F0A48938-30B8-4403-B08A-177FFCB9054B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*","matchCriteriaId":"C9A33AA4-CABF-4B6B-8688-8C1BD36D6649"}]}]}],"references":[{"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000627","source":"cve@mitre.org"},{"url":"http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:051","source":"cve@mitre.org"},{"url":"http://seclists.org/lists/fulldisclosure/2003/Mar/0080.html","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/2003/dsa-258","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.ethereal.com/appnotes/enpa-sa-00008.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory","URL Repurposed"]},{"url":"http://www.guninski.com/etherre.html","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.linuxsecurity.com/advisories/gentoo_advisory-2949.html","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/2003_019_ethereal.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2003-076.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2003-077.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/7049","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/11497","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A54","source":"cve@mitre.org"},{"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000627","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:051","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/lists/fulldisclosure/2003/Mar/0080.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2003/dsa-258","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.ethereal.com/appnotes/enpa-sa-00008.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory","URL Repurposed"]},{"url":"http://www.guninski.com/etherre.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.linuxsecurity.com/advisories/gentoo_advisory-2949.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.novell.com/linux/security/advisories/2003_019_ethereal.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2003-076.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2003-077.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/7049","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/11497","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A54","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}