Dataset Viewer
Auto-converted to Parquet Duplicate
CVE
stringlengths
13
16
CVSS Score
float64
0
10
CVSS_Vector
nullclasses
257 values
EPSS
float64
0
0.95
Description
stringlengths
28
3.79k
Published
stringdate
1990-08-14 00:00:00
2025-10-05 00:00:00
Source
stringclasses
7 values
CPE
stringlengths
33
51k
CVE-1999-0103
0
null
0.48093
Echo and chargen, or other combinations of UDP services, can be used in tandem to flood the server, a.k.a. UDP bomb or UDP packet storm.
1996-02-08
Metasploit
null
CVE-1999-0170
0
null
0.28135
Remote attackers can mount an NFS file system in Ultrix or OSF, even if it is denied on the access list.
1997-01-01
Metasploit
cpe:2.3:o:digital:ultrix:*:*:*:*:*:*:*:*
CVE-1999-0209
0
null
0.42142
The SunView (SunTools) selection_svc facility allows remote users to read files.
1990-08-14
Metasploit
cpe:2.3:o:sun:sunos:3.5:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.0.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.0.2:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.0:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*
CVE-1999-0256
0
null
0.82403
Buffer overflow in War FTP allows remote execution of commands.
1998-02-01
Metasploit
cpe:2.3:a:jgaa:warftpd:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*
CVE-1999-0502
0
null
0.42282
A Unix account has a default, null, blank, or missing password.
1998-03-01
Metasploit
cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11:*:*:*:*:*:*:*;cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
CVE-1999-0504
0
null
0.47095
A Windows NT local user or administrator account has a default, null, blank, or missing password.
1997-01-01
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*
CVE-1999-0506
0
null
0.08668
A Windows NT domain user or administrator account has a default, null, blank, or missing password.
1998-10-01
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*
CVE-1999-0508
0
null
0.35839
An account on a router, firewall, or other network device has a default, null, blank, or missing password.
1998-06-01
Metasploit
null
CVE-1999-0516
0
null
0.73977
An SNMP community name is guessable.
1998-08-01
Metasploit
null
CVE-1999-0517
0
null
0.92333
An SNMP community name is the default (e.g. public), null, or missing.
1997-01-01
Metasploit
cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*
CVE-1999-0526
0
null
0.79095
An X server's access control is disabled (e.g. through an "xhost +" command) and allows anyone to connect to the server.
1997-07-01
Metasploit
cpe:2.3:a:x.org:x11:7.1_1.1.0:*:*:*:*:*:*:*
CVE-1999-0532
0
null
0.82224
A DNS server allows zone transfers.
1997-07-01
Metasploit
null
CVE-1999-0554
0
null
0.25262
NFS exports system-critical data to the world, e.g. / or a password file.
1999-01-01
Metasploit
null
CVE-1999-0651
0
null
0.50061
The rsh/rlogin service is running.
1999-01-01
Metasploit
null
CVE-1999-0667
0
null
0.37846
The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service.
1997-09-19
Metasploit
cpe:2.3:h:arp_protocol:arp_protocol:*:*:*:*:*:*:*:*
CVE-1999-0874
0
null
0.85831
Buffer overflow in IIS 4.0 allows remote attackers to cause a denial of service via a malformed request for files with .HTR, .IDC, or .STM extensions.
1999-06-16
Metasploit
cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
CVE-1999-1011
0
null
0.79296
The Remote Data Service (RDS) DataFactory component of Microsoft Data Access Components (MDAC) in IIS 3.x and 4.x exposes unsafe methods, which allows remote attackers to execute arbitrary commands.
1999-07-19
Metasploit
cpe:2.3:a:microsoft:data_access_components:1.5:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:index_server:2.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*
CVE-1999-1053
0
null
0.88552
guestbook.pl cleanses user-inserted SSI commands by removing text between "<!--" and "-->" separators, which allows remote attackers to execute arbitrary commands when guestbook.pl is run on Apache 1.3.9 and possibly other versions, since Apache allows other closing sequences besides "-->".
1999-09-13
Metasploit
cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*;cpe:2.3:a:matt_wright:matt_wright_guestbook:2.3:*:*:*:*:*:*:*
CVE-1999-1510
0
null
0.77641
Buffer overflows in Bisonware FTP server prior to 4.1 allow remote attackers to cause a denial of service, and possibly execute arbitrary commands, via long (1) USER, (2) LIST, or (3) CWD commands.
1999-05-17
Metasploit
cpe:2.3:a:bisonware:bisonware_ftp_server:*:*:*:*:*:*:*:*
CVE-2000-0114
0
null
0.07682
Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
2000-02-02
Nuclei
cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*
CVE-2000-0248
0
null
0.7588
The web GUI for the Linux Virtual Server (LVS) software in the Red Hat Linux Piranha package has a backdoor password that allows remote attackers to execute arbitrary commands.
2000-04-24
Metasploit
cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*;cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*;cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*
CVE-2000-0284
0
null
0.79855
Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
2000-04-16
Metasploit
cpe:2.3:a:university_of_washington:imap:12.264:*:*:*:*:*:*:*
CVE-2000-0322
0
null
0.77767
The passwd.php3 CGI script in the Red Hat Piranha Virtual Server Package allows local users to execute arbitrary commands via shell metacharacters.
2000-04-24
Metasploit
cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*;cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*;cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*
CVE-2000-0380
0
null
0.85118
The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a URL that contains a %% string.
2000-04-26
Metasploit
cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(10\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(10\)bc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(17\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(4\)f1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(8\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(8\)p:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(9\)p:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(9\)xa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3\(1\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3\(1\)ed:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3\(1\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(1\)w:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(1\)xa3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(1\)xb:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(1\)xe:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(2\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(2\)xc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(2\)xd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(2\)xf:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(2\)xg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(3\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(4\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(4\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(4\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(5\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(5\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(6\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(7\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(8\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(9\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*
CVE-2000-0402
0
null
0.78483
The Mixed Mode authentication capability in Microsoft SQL Server 7.0 stores the System Administrator (sa) account in plaintext in a log file which is readable by any user, aka the "SQL Server 7.0 Service Pack Password" vulnerability.
2000-05-30
Metasploit
cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:7.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:7.0:sp2:*:*:*:*:*:*
CVE-2000-0573
0
null
0.91378
The lreply function in wu-ftpd 2.6.0 and earlier does not properly cleanse an untrusted format string, which allows remote attackers to execute arbitrary commands via the SITE EXEC command.
2000-07-07
Metasploit
cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
CVE-2000-0649
0
null
0.63657
IIS 4.0 allows remote attackers to obtain the internal IP address of the server via an HTTP 1.0 request for a web page which is protected by basic authentication and has no realm defined.
2000-07-13
Metasploit
cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_services:2.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*
CVE-2000-0665
0
null
0.7167
GAMSoft TelSrv telnet server 1.5 and earlier allows remote attackers to cause a denial of service via a long username.
2000-07-17
Metasploit
cpe:2.3:a:gamsoft:telsrv:1.4:*:*:*:*:*:*:*;cpe:2.3:a:gamsoft:telsrv:1.5:*:*:*:*:*:*:*
CVE-2000-0760
0
null
0.37735
The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.
2000-10-20
Nuclei
cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*
CVE-2000-0917
0
null
0.86092
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.
2000-12-19
Metasploit
cpe:2.3:a:caldera:openlinux_ebuilder:3.0:*:*:*:*:*:*:*;cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*;cpe:2.3:o:caldera:openlinux_edesktop:2.4:*:*:*:*:*:*:*;cpe:2.3:o:caldera:openlinux_eserver:2.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:trustix:secure_linux:1.0:*:*:*:*:*:*:*;cpe:2.3:o:trustix:secure_linux:1.1:*:*:*:*:*:*:*
CVE-2000-0945
0
null
0.87926
The web configuration interface for Catalyst 3500 XL switches allows remote attackers to execute arbitrary commands without authentication when the enable password is not set, via a URL containing the /exec/ directory.
2000-12-19
Metasploit
cpe:2.3:h:cisco:catalyst_3500_xl:*:*:*:*:*:*:*:*
CVE-2000-1089
0
null
0.73777
Buffer overflow in Microsoft Phone Book Service allows local users to execute arbitrary commands, aka the "Phone Book Service Buffer Overflow" vulnerability.
2001-01-09
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
CVE-2000-1209
0
null
0.89725
The "sa" account is installed with a default null password on (1) Microsoft SQL Server 2000, (2) SQL Server 7.0, and (3) Data Engine (MSDE) 1.0, including third party packages that use these products such as (4) Tumbleweed Secure Mail (MMS) (5) Compaq Insight Manager, and (6) Visio 2000, which allows remote attackers to gain privileges, as exploited by worms such as Voyager Alpha Force and Spida.
2002-08-12
Metasploit
cpe:2.3:a:compaq:insight_manager:7.0:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager:7.0:sp1:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:1.1:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:1.21:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:2.1:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:2.1b:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:2.1c:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:2.2:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_engine:1.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:msde:2000:*:*:*:*:*:*:*
CVE-2001-0152
0
null
0.08356
The password protection option for the Compressed Folders feature in Plus! for Windows 98 and Windows Me writes password information to a file, which allows local users to recover the passwords and read the compressed folders.
2001-05-03
Metasploit
cpe:2.3:a:microsoft:plus:*:*:*:*:*:*:*:*
CVE-2001-0167
0
null
0.65403
Buffer overflow in AT&T WinVNC (Virtual Network Computing) client 3.3.3r7 and earlier allows remote attackers to execute arbitrary commands via a long rfbConnFailed packet with a long reason string.
2001-05-03
Metasploit
cpe:2.3:a:att:winvnc:*:*:*:*:*:*:*:*
CVE-2001-0168
0
null
0.67361
Buffer overflow in AT&T WinVNC (Virtual Network Computing) server 3.3.3r7 and earlier allows remote attackers to execute arbitrary commands via a long HTTP GET request when the DebugLevel registry key is greater than 0.
2001-05-03
Metasploit
cpe:2.3:a:att:winvnc:*:*:*:*:*:*:*:*
CVE-2001-0241
0
null
0.87613
Buffer overflow in Internet Printing ISAPI extension in Windows 2000 allows remote attackers to gain root privileges via a long print request that is passed to the extension through IIS 5.0.
2001-06-27
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
CVE-2001-0311
0
null
0.45881
Vulnerability in OmniBackII A.03.50 in HP 11.x and earlier allows attackers to gain unauthorized access to an OmniBack client.
2001-06-02
Metasploit
cpe:2.3:a:hp:omniback_ii:a.03.50:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*
CVE-2001-0333
0
null
0.8447
Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.
2001-06-27
Metasploit
cpe:2.3:a:microsoft:internet_information_server:*:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*
CVE-2001-0414
0
null
0.87296
Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long readvar argument.
2001-06-18
Metasploit
cpe:2.3:a:dave_mills:ntpd:*:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99a:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99b:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99c:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99d:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99e:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99f:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99g:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99h:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99i:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99j:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93a:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93b:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93c:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93d:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93e:*:*:*:*:*:*:*
CVE-2001-0499
0
null
0.74942
Buffer overflow in Transparent Network Substrate (TNS) Listener in Oracle 8i 8.1.7 and earlier allows remote attackers to gain privileges via a long argument to the commands (1) STATUS, (2) PING, (3) SERVICES, (4) TRC_FILE, (5) SAVE_CONFIG, or (6) RELOAD.
2001-07-21
Metasploit
cpe:2.3:a:oracle:oracle8i:*:*:*:*:*:*:*:*
CVE-2001-0500
0
null
0.90865
Buffer overflow in ISAPI extension (idq.dll) in Index Server 2.0 and Indexing Service 2000 in IIS 6.0 beta and earlier allows remote attackers to execute arbitrary commands via a long argument to Internet Data Administration (.ida) and Internet Data Query (.idq) files such as default.ida, as commonly exploited by Code Red.
2001-07-21
Metasploit
cpe:2.3:a:microsoft:index_server:2.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:indexing_service:*:*:windows_2000:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:*:beta:*:*:*:*:*:*
CVE-2001-0537
0
null
0.93696
HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.
2001-07-21
Metasploit/Nuclei
cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3da:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3db:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3ha:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3ma:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3na:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3xa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(10\)w5\(18g\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(14\)w5\(20\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(5\)xk:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(7\)xk:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*
CVE-2001-0797
0
null
0.88681
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
2001-12-12
Metasploit
cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.1:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.3:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.6a:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:3.2:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:3.3.1:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:3.3.2:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:3.3.3:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:3.3:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
CVE-2001-0800
0
null
0.77497
lpsched in IRIX 6.5.13f and earlier allows remote attackers to execute arbitrary commands via shell metacharacters.
2001-12-06
Metasploit
cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*
CVE-2001-0803
0
null
0.58736
Buffer overflow in the client connection routine of libDtSvc.so.1 in CDE Subprocess Control Service (dtspcd) allows remote attackers to execute arbitrary commands.
2001-12-06
Metasploit
cpe:2.3:a:open_group:cde_common_desktop_environment:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:open_group:cde_common_desktop_environment:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:open_group:cde_common_desktop_environment:1.1:*:*:*:*:*:*:*;cpe:2.3:a:open_group:cde_common_desktop_environment:1.2:*:*:*:*:*:*:*;cpe:2.3:a:open_group:cde_common_desktop_environment:2.0:*:*:*:*:*:*:*;cpe:2.3:a:open_group:cde_common_desktop_environment:2.1:*:*:*:*:*:*:*
CVE-2001-1013
0
null
0.68119
Apache on Red Hat Linux with with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the server.
2001-09-12
Metasploit
cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*
CVE-2001-1320
0
null
0.66694
Network Associates PGP Keyserver 7.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via exceptional BER encodings (possibly buffer overflows), as demonstrated by the PROTOS LDAPv3 test suite.
2001-07-16
Metasploit
cpe:2.3:a:pgp:keyserver:7.0:*:*:*:*:*:*:*
CVE-2001-1473
0
null
0.04878
The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the attacker to compute the corresponding private key and use the target's Session ID with the compromised key pair to masquerade as the target.
2001-01-18
Nuclei
cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*
CVE-2001-1583
0
null
0.51992
lpd daemon (in.lpd) in Solaris 8 and earlier allows remote attackers to execute arbitrary commands via a job request with a crafted control file that is not properly handled when lpd invokes a mail program. NOTE: this might be the same vulnerability as CVE-2000-1220.
2001-12-31
Metasploit
cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*
CVE-2002-0367
7.8
null
0.01827
smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.
2002-06-25
CISA
cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:terminal_server:*:*:*
CVE-2002-0392
0
null
0.59304
Apache 1.3 through 1.3.24, and Apache 2.0 through 2.0.36, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a chunk-encoded HTTP request that causes Apache to use an incorrect size.
2002-07-03
Metasploit
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*
CVE-2002-0422
0
null
0.65016
IIS 5 and 5.1 supporting WebDAV methods allows remote attackers to determine the internal IP address of the system (which may be obscured by NAT) via (1) a PROPFIND HTTP request with a blank Host header, which leaks the address in an HREF property in a 207 Multi-Status response, or (2) via the WRITE or MKCOL method, which leaks the IP in the Location server header.
2002-08-12
Metasploit
cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*
CVE-2002-0649
0
null
0.86644
Multiple buffer overflows in the Resolution Service for Microsoft SQL Server 2000 and Microsoft Desktop Engine 2000 (MSDE) allow remote attackers to cause a denial of service or execute arbitrary code via UDP packets to port 1434 in which (1) a 0x04 byte that causes the SQL Monitor thread to generate a long registry key name, or (2) a 0x08 byte with a long string causes heap corruption, as exploited by the Slammer/Sapphire worm.
2002-08-12
Metasploit
cpe:2.3:a:microsoft:data_engine:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:sp2:*:*:*:*:*:*
CVE-2002-0965
0
null
0.77669
Buffer overflow in TNS Listener for Oracle 9i Database Server on Windows systems, and Oracle 8 on VM, allows local users to execute arbitrary code via a long SERVICE_NAME parameter, which is not properly handled when writing an error message to a log file.
2002-10-04
Metasploit
cpe:2.3:a:oracle:oracle9i:9.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle9i:9.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle9i:9.0:*:*:*:*:*:*:*
CVE-2002-1059
0
null
0.73111
Buffer overflow in Van Dyke SecureCRT SSH client before 3.4.6, and 4.x before 4.0 beta 3, allows an SSH server to execute arbitrary code via a long SSH1 protocol version string.
2002-10-04
Metasploit
cpe:2.3:a:van_dyke_technologies:securecrt:2.4:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.0:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.2:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.3:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4.2:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4.3:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4.4:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4.5:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:4.0_beta_1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:4.0_beta_2:*:*:*:*:*:*:*
CVE-2002-1120
0
null
0.72553
Buffer overflow in Savant Web Server 3.1 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request.
2002-09-24
Metasploit
cpe:2.3:a:savant:savant_web_server:*:*:*:*:*:*:*:*
CVE-2002-1123
0
null
0.89144
Buffer overflow in the authentication function for Microsoft SQL Server 2000 and Microsoft Desktop Engine (MSDE) 2000 allows remote attackers to execute arbitrary code via a long request to TCP port 1433, aka the "Hello" overflow.
2002-09-24
Metasploit
cpe:2.3:a:microsoft:data_engine:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:sp2:*:*:*:*:*:*
CVE-2002-1131
0
null
0.03877
Cross-site scripting vulnerabilities in SquirrelMail 1.2.7 and earlier allows remote attackers to execute script as other web users via (1) addressbook.php, (2) options.php, (3) search.php, or (4) help.php.
2002-10-04
Nuclei
cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
CVE-2002-1142
0
null
0.83043
Heap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub.
2002-11-29
Metasploit
cpe:2.3:a:microsoft:data_access_components:2.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.5:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*
CVE-2002-1214
0
null
0.78344
Buffer overflow in Microsoft PPTP Service on Windows XP and Windows 2000 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a certain PPTP packet with malformed control data.
2002-10-28
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
CVE-2002-1318
0
null
0.73412
Buffer overflow in samba 2.2.2 through 2.2.6 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-endian UCS2 unicode string.
2002-12-11
Metasploit
cpe:2.3:a:hp:cifs-9000_server:a.01.08.01:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.08:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.09:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.17:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.18:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
CVE-2002-1359
0
null
0.86998
Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite.
2002-12-23
Metasploit
cpe:2.3:a:fissh:ssh_client:1.0a_for_windows:*:*:*:*:*:*:*;cpe:2.3:a:intersoft:securenetterm:5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:netcomposite:shellguard_ssh:3.4.6:*:*:*:*:*:*:*;cpe:2.3:a:pragma_systems:secureshell:2.0:*:*:*:*:*:*:*;cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:*;cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:*;cpe:2.3:a:putty:putty:0.53:*:*:*:*:*:*:*;cpe:2.3:a:winscp:winscp:2.0.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*
CVE-2002-1473
0
null
0.09365
Multiple buffer overflows in lp subsystem for HP-UX 10.20 through 11.11 (11i) allow local users to cause a denial of service and possibly execute arbitrary code.
2003-04-22
Metasploit
cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
CVE-2002-1643
0
null
0.81942
Multiple buffer overflows in RealNetworks Helix Universal Server 9.0 (9.0.2.768) allow remote attackers to execute arbitrary code via (1) a long Transport field in a SETUP RTSP request, (2) a DESCRIBE RTSP request with a long URL argument, or (3) two simultaneous HTTP GET requests with long arguments.
2002-12-19
Metasploit
cpe:2.3:a:realnetworks:helix_universal_server:9.0.2.768:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:helix_universal_server:9.0:*:*:*:*:*:*:*
CVE-2002-1864
0
null
0.59336
Directory traversal vulnerability in Simple Web Server (SWS) 0.0.4 through 0.1.0 allows remote attackers to read arbitrary files via a ".." (dot dot) in an HTTP request.
2002-12-31
Metasploit
cpe:2.3:a:sws:sws_simple_web_server:0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:sws:sws_simple_web_server:0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:sws:sws_simple_web_server:0.1.0:*:*:*:*:*:*:*;cpe:2.3:a:sws:sws_simple_web_server:0.1.1:*:*:*:*:*:*:*
CVE-2002-2226
0
null
0.7461
Buffer overflow in tftpd of TFTP32 2.21 and earlier allows remote attackers to execute arbitrary code via a long filename argument.
2002-12-31
Metasploit
cpe:2.3:a:tftpd32:tftpd32:*:*:*:*:*:*:*:*
CVE-2002-2268
0
null
0.74538
Buffer overflow in Webster HTTP Server allows remote attackers to execute arbitrary code via a long URL.
2002-12-31
Metasploit
cpe:2.3:a:netdave:webster_http_server:*:*:*:*:*:*:*:*
CVE-2003-0027
0
null
0.65152
Directory traversal vulnerability in Sun Kodak Color Management System (KCMS) library service daemon (kcms_server) allows remote attackers to read arbitrary files via the KCS_OPEN_PROFILE procedure.
2003-02-07
Metasploit
cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
CVE-2003-0050
0
null
0.87791
parse_xml.cgi in Apple Darwin Streaming Administration Server 4.1.2 and QuickTime Streaming Server 4.1.1 allows remote attackers to execute arbitrary code via shell metacharacters.
2003-03-07
Metasploit
cpe:2.3:a:apple:darwin_streaming_server:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime_streaming_server:4.1.1:*:*:*:*:*:*:*
CVE-2003-0109
0
null
0.88713
Buffer overflow in ntdll.dll on Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote attackers to execute arbitrary code, as demonstrated via a WebDAV request to IIS 5.0.
2003-03-31
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp3:*:*:*:*:*:*
CVE-2003-0190
0
null
0.1361
OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.
2003-05-12
Metasploit
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*;cpe:2.3:a:openbsd:openssh:3.6.1:p1:*:*:*:*:*:*;cpe:2.3:a:openpkg:openpkg:1.2:*:*:*:*:*:*:*;cpe:2.3:a:openpkg:openpkg:1.3:*:*:*:*:*:*:*;cpe:2.3:h:siemens:scalance_x204rna:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:scalance_x204rna_ecc:-:*:*:*:*:*:*:*;cpe:2.3:o:siemens:scalance_x204rna_ecc_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:scalance_x204rna_firmware:*:*:*:*:*:*:*:*
CVE-2003-0201
0
null
0.80508
Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code.
2003-05-05
Metasploit
cpe:2.3:a:hp:cifs-9000_server:a.01.05:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.06:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.07:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.08.01:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.08:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.09.01:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.09.02:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.09:*:*:*:*:*:*:*;cpe:2.3:a:samba-tng:samba-tng:0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:samba-tng:samba-tng:0.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0b:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0d:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0d_pk9_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f_pk6_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f_pk7_bl18:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0g_pk3_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0_pk4_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0_pk4_bl18:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0a:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0a_pk3_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0f:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1b:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1b_pk1_bl1:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
CVE-2003-0213
0
null
0.74735
ctrlpacket.c in PoPToP PPTP server before 1.1.4-b3 allows remote attackers to cause a denial of service via a length field of 0 or 1, which causes a negative value to be fed into a read operation, leading to a buffer overflow.
2003-05-12
Metasploit
cpe:2.3:a:poptop:pptp_server:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:poptop:pptp_server:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:poptop:pptp_server:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:poptop:pptp_server:1.1.3_2002-10-09:*:*:*:*:*:*:*;cpe:2.3:a:poptop:pptp_server:1.1.4b1:*:*:*:*:*:*:*;cpe:2.3:a:poptop:pptp_server:1.1.4b2:*:*:*:*:*:*:*
CVE-2003-0220
0
null
0.85491
Buffer overflow in the administrator authentication process for Kerio Personal Firewall (KPF) 2.1.4 and earlier allows remote attackers to execute arbitrary code via a handshake packet.
2003-05-12
Metasploit
cpe:2.3:a:kerio:personal_firewall_2:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:kerio:personal_firewall_2:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:kerio:personal_firewall_2:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:kerio:personal_firewall_2:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:kerio:personal_firewall_2:2.1:*:*:*:*:*:*:*
CVE-2003-0264
0
null
0.6681
Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server.
2003-05-27
Metasploit
cpe:2.3:a:seattle_lab_software:slmail:5.1.0.4420:*:*:*:*:*:*:*
CVE-2003-0270
0
null
0.22098
The administration capability for Apple AirPort 802.11 wireless access point devices uses weak encryption (XOR with a fixed key) for protecting authentication credentials, which could allow remote attackers to obtain administrative access via sniffing when the capability is available via Ethernet or non-WEP connections.
2003-06-16
Metasploit
cpe:2.3:h:apple:802.11n:7.3.1:*:*:*:*:*:*:*
CVE-2003-0344
0
null
0.79213
Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.
2003-06-16
Metasploit
cpe:2.3:a:microsoft:ie:6.0:*:windows_server_2003:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*
CVE-2003-0349
0
null
0.87981
Buffer overflow in the streaming media component for logging multicast requests in the ISAPI for the logging capability of Microsoft Windows Media Services (nsiislog.dll), as installed in IIS 5.0, allows remote attackers to execute arbitrary code via a large POST request to nsiislog.dll.
2003-07-24
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
CVE-2003-0352
0
null
0.90169
Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.
2003-08-18
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
CVE-2003-0471
0
null
0.68925
Buffer overflow in WebAdmin.exe for WebAdmin allows remote attackers to execute arbitrary code via an HTTP request to WebAdmin.dll with a long USER argument.
2003-08-07
Metasploit
cpe:2.3:a:alt-n:webadmin:*:*:*:*:*:*:*:*
CVE-2003-0533
0
null
0.88406
Stack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file, as exploited by the Sasser worm.
2004-06-01
Metasploit
cpe:2.3:a:microsoft:netmeeting:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
CVE-2003-0558
0
null
0.7578
Buffer overflow in LeapFTP 2.7.3.600 allows remote FTP servers to execute arbitrary code via a long IP address response to a PASV request.
2003-08-18
Metasploit
cpe:2.3:a:leapware:leapftp:2.7.3.600:*:*:*:*:*:*:*
CVE-2003-0694
0
null
0.7608
The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
2003-10-06
Metasploit
cpe:2.3:a:sendmail:advanced_message_server:1.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:advanced_message_server:1.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:2.6.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:2.6:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:3.0:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_pro:8.9.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_pro:8.9.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f_pk6_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f_pk7_bl18:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f_pk8_bl22:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0g_pk3_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0g_pk4_bl22:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1b:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1b_pk1_bl1:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:3.0:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.20f:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.20m:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_advanced_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_server:6.5:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
CVE-2003-0714
0
null
0.67793
The Internet Mail Service in Exchange Server 5.5 and Exchange 2000 allows remote attackers to cause a denial of service (memory exhaustion) by directly connecting to the SMTP service and sending a certain extended verb request, possibly triggering a buffer overflow in Exchange 2000.
2003-11-17
Metasploit
cpe:2.3:a:microsoft:exchange_server:2000:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2000:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2000:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:5.5:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:5.5:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:5.5:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:5.5:sp4:*:*:*:*:*:*
CVE-2003-0719
0
null
0.78359
Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.
2004-06-01
Metasploit
cpe:2.3:a:microsoft:netmeeting:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
CVE-2003-0722
0
null
0.87095
The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.
2003-09-22
Metasploit
cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*
CVE-2003-0727
0
null
0.85761
Multiple buffer overflows in the XML Database (XDB) functionality for Oracle 9i Database Release 2 allow local users to cause a denial of service or hijack user sessions.
2003-10-20
Metasploit
cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*
CVE-2003-0812
0
null
0.83586
Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote attackers to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the NetAddAlternateComputerName API.
2003-12-15
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
CVE-2003-0818
0
null
0.90191
Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings.
2004-03-03
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
CVE-2003-0822
0
null
0.90176
Buffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.
2003-12-15
Metasploit
cpe:2.3:a:microsoft:frontpage_server_extensions:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:frontpage_server_extensions:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_team_services:2002:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
CVE-2003-0990
0
null
0.78049
The parseAddress code in (1) SquirrelMail 1.4.0 and (2) GPG Plugin 1.1 allows remote attackers to execute commands via shell metacharacters in the "To:" field.
2004-01-20
Metasploit
cpe:2.3:a:squirrelmail:gpg_plugin:1.1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*
CVE-2003-1141
0
null
0.78728
Buffer overflow in NIPrint 4.10 allows remote attackers to execute arbitrary code via a long string to TCP port 515.
2003-11-04
Metasploit
cpe:2.3:h:network_instruments:niprint_lpd-lpr_print_server:4.10:*:*:*:*:*:*:*
CVE-2003-1192
0
null
0.82653
Stack-based buffer overflow in IA WebMail Server 3.1.0 allows remote attackers to execute arbitrary code via a long GET request.
2003-11-03
Metasploit
cpe:2.3:a:truenorth_software:ia_webmail_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:truenorth_software:ia_webmail_server:3.1:*:*:*:*:*:*:*
CVE-2003-1200
0
null
0.5989
Stack-based buffer overflow in FORM2RAW.exe in Alt-N MDaemon 6.5.2 through 6.8.5 allows remote attackers to execute arbitrary code via a long From parameter to Form2Raw.cgi.
2003-12-29
Metasploit
cpe:2.3:a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*
CVE-2003-1336
0
null
0.66546
Buffer overflow in mIRC before 6.11 allows remote attackers to execute arbitrary code via a long irc:// URL.
2003-12-31
Metasploit
cpe:2.3:a:mirc:mirc:*:*:*:*:*:*:*:*
CVE-2004-0206
0
null
0.81052
Network Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow.
2004-11-03
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*
CVE-2004-0210
7.8
null
0.05637
The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.
2004-08-06
CISA
cpe:2.3:a:microsoft:interix:2.2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:server:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:terminal_server:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:workstation:*:*:*
CVE-2004-0297
0
null
0.56961
Buffer overflow in the Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) in Ipswitch IMail Server 8.03 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via an LDAP message with a large tag length.
2004-11-23
Metasploit
cpe:2.3:a:ipswitch:imail:8.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ipswitch:imail:8.0.5:*:*:*:*:*:*:*
CVE-2004-0313
0
null
0.77835
Buffer overflow in PSOProxy 0.91 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long HTTP request, as demonstrated using a long (1) GET argument or (2) method name.
2004-11-23
Metasploit
cpe:2.3:a:psoproxy:psoproxy_server:0.91:*:*:*:*:*:*:*
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
18