CVE,CVSS Score,CVSS_Vector,EPSS,Description,Published,Source,CPE CVE-1999-0103,0.0,,0.48093,"Echo and chargen, or other combinations of UDP services, can be used in tandem to flood the server, a.k.a. UDP bomb or UDP packet storm.",1996-02-08,Metasploit, CVE-1999-0170,0.0,,0.28135,"Remote attackers can mount an NFS file system in Ultrix or OSF, even if it is denied on the access list.",1997-01-01,Metasploit,cpe:2.3:o:digital:ultrix:*:*:*:*:*:*:*:* CVE-1999-0209,0.0,,0.42142,The SunView (SunTools) selection_svc facility allows remote users to read files.,1990-08-14,Metasploit,cpe:2.3:o:sun:sunos:3.5:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.0.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.0.2:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.0:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:* CVE-1999-0256,0.0,,0.82403,Buffer overflow in War FTP allows remote execution of commands.,1998-02-01,Metasploit,cpe:2.3:a:jgaa:warftpd:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:* CVE-1999-0502,0.0,,0.42282,"A Unix account has a default, null, blank, or missing password.",1998-03-01,Metasploit,cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11:*:*:*:*:*:*:*;cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:* CVE-1999-0504,0.0,,0.47095,"A Windows NT local user or administrator account has a default, null, blank, or missing password.",1997-01-01,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:* CVE-1999-0506,0.0,,0.08668,"A Windows NT domain user or administrator account has a default, null, blank, or missing password.",1998-10-01,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:* CVE-1999-0508,0.0,,0.35839,"An account on a router, firewall, or other network device has a default, null, blank, or missing password.",1998-06-01,Metasploit, CVE-1999-0516,0.0,,0.73977,An SNMP community name is guessable.,1998-08-01,Metasploit, CVE-1999-0517,0.0,,0.92333,"An SNMP community name is the default (e.g. public), null, or missing.",1997-01-01,Metasploit,cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:* CVE-1999-0526,0.0,,0.79095,"An X server's access control is disabled (e.g. through an ""xhost +"" command) and allows anyone to connect to the server.",1997-07-01,Metasploit,cpe:2.3:a:x.org:x11:7.1_1.1.0:*:*:*:*:*:*:* CVE-1999-0532,0.0,,0.82224,A DNS server allows zone transfers.,1997-07-01,Metasploit, CVE-1999-0554,0.0,,0.25262,"NFS exports system-critical data to the world, e.g. / or a password file.",1999-01-01,Metasploit, CVE-1999-0651,0.0,,0.50061,The rsh/rlogin service is running.,1999-01-01,Metasploit, CVE-1999-0667,0.0,,0.37846,The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service.,1997-09-19,Metasploit,cpe:2.3:h:arp_protocol:arp_protocol:*:*:*:*:*:*:*:* CVE-1999-0874,0.0,,0.85831,"Buffer overflow in IIS 4.0 allows remote attackers to cause a denial of service via a malformed request for files with .HTR, .IDC, or .STM extensions.",1999-06-16,Metasploit,cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:* CVE-1999-1011,0.0,,0.79296,"The Remote Data Service (RDS) DataFactory component of Microsoft Data Access Components (MDAC) in IIS 3.x and 4.x exposes unsafe methods, which allows remote attackers to execute arbitrary commands.",1999-07-19,Metasploit,cpe:2.3:a:microsoft:data_access_components:1.5:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:index_server:2.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:* CVE-1999-1053,0.0,,0.88552,"guestbook.pl cleanses user-inserted SSI commands by removing text between """" separators, which allows remote attackers to execute arbitrary commands when guestbook.pl is run on Apache 1.3.9 and possibly other versions, since Apache allows other closing sequences besides ""-->"".",1999-09-13,Metasploit,cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*;cpe:2.3:a:matt_wright:matt_wright_guestbook:2.3:*:*:*:*:*:*:* CVE-1999-1510,0.0,,0.77641,"Buffer overflows in Bisonware FTP server prior to 4.1 allow remote attackers to cause a denial of service, and possibly execute arbitrary commands, via long (1) USER, (2) LIST, or (3) CWD commands.",1999-05-17,Metasploit,cpe:2.3:a:bisonware:bisonware_ftp_server:*:*:*:*:*:*:*:* CVE-2000-0114,0.0,,0.07682,Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.,2000-02-02,Nuclei,cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:* CVE-2000-0248,0.0,,0.7588,The web GUI for the Linux Virtual Server (LVS) software in the Red Hat Linux Piranha package has a backdoor password that allows remote attackers to execute arbitrary commands.,2000-04-24,Metasploit,cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*;cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*;cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:* CVE-2000-0284,0.0,,0.79855,Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.,2000-04-16,Metasploit,cpe:2.3:a:university_of_washington:imap:12.264:*:*:*:*:*:*:* CVE-2000-0322,0.0,,0.77767,The passwd.php3 CGI script in the Red Hat Piranha Virtual Server Package allows local users to execute arbitrary commands via shell metacharacters.,2000-04-24,Metasploit,cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*;cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*;cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:* CVE-2000-0380,0.0,,0.85118,The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a URL that contains a %% string.,2000-04-26,Metasploit,cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(10\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(10\)bc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(17\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(4\)f1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(8\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(8\)p:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(9\)p:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(9\)xa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3\(1\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3\(1\)ed:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3\(1\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(1\)w:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(1\)xa3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(1\)xb:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(1\)xe:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(2\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(2\)xc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(2\)xd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(2\)xf:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(2\)xg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(3\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(4\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(4\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(4\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(5\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(5\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(6\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(7\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(8\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(9\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:* CVE-2000-0402,0.0,,0.78483,"The Mixed Mode authentication capability in Microsoft SQL Server 7.0 stores the System Administrator (sa) account in plaintext in a log file which is readable by any user, aka the ""SQL Server 7.0 Service Pack Password"" vulnerability.",2000-05-30,Metasploit,cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:7.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:7.0:sp2:*:*:*:*:*:* CVE-2000-0573,0.0,,0.91378,"The lreply function in wu-ftpd 2.6.0 and earlier does not properly cleanse an untrusted format string, which allows remote attackers to execute arbitrary commands via the SITE EXEC command.",2000-07-07,Metasploit,cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:* CVE-2000-0649,0.0,,0.63657,IIS 4.0 allows remote attackers to obtain the internal IP address of the server via an HTTP 1.0 request for a web page which is protected by basic authentication and has no realm defined.,2000-07-13,Metasploit,cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_services:2.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:* CVE-2000-0665,0.0,,0.7167,GAMSoft TelSrv telnet server 1.5 and earlier allows remote attackers to cause a denial of service via a long username.,2000-07-17,Metasploit,cpe:2.3:a:gamsoft:telsrv:1.4:*:*:*:*:*:*:*;cpe:2.3:a:gamsoft:telsrv:1.5:*:*:*:*:*:*:* CVE-2000-0760,0.0,,0.37735,The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.,2000-10-20,Nuclei,cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:* CVE-2000-0917,0.0,,0.86092,Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.,2000-12-19,Metasploit,cpe:2.3:a:caldera:openlinux_ebuilder:3.0:*:*:*:*:*:*:*;cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*;cpe:2.3:o:caldera:openlinux_edesktop:2.4:*:*:*:*:*:*:*;cpe:2.3:o:caldera:openlinux_eserver:2.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:trustix:secure_linux:1.0:*:*:*:*:*:*:*;cpe:2.3:o:trustix:secure_linux:1.1:*:*:*:*:*:*:* CVE-2000-0945,0.0,,0.87926,"The web configuration interface for Catalyst 3500 XL switches allows remote attackers to execute arbitrary commands without authentication when the enable password is not set, via a URL containing the /exec/ directory.",2000-12-19,Metasploit,cpe:2.3:h:cisco:catalyst_3500_xl:*:*:*:*:*:*:*:* CVE-2000-1089,0.0,,0.73777,"Buffer overflow in Microsoft Phone Book Service allows local users to execute arbitrary commands, aka the ""Phone Book Service Buffer Overflow"" vulnerability.",2001-01-09,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:* CVE-2000-1209,0.0,,0.89725,"The ""sa"" account is installed with a default null password on (1) Microsoft SQL Server 2000, (2) SQL Server 7.0, and (3) Data Engine (MSDE) 1.0, including third party packages that use these products such as (4) Tumbleweed Secure Mail (MMS) (5) Compaq Insight Manager, and (6) Visio 2000, which allows remote attackers to gain privileges, as exploited by worms such as Voyager Alpha Force and Spida.",2002-08-12,Metasploit,cpe:2.3:a:compaq:insight_manager:7.0:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager:7.0:sp1:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:1.1:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:1.21:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:2.1:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:2.1b:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:2.1c:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:2.2:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_engine:1.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:msde:2000:*:*:*:*:*:*:* CVE-2001-0152,0.0,,0.08356,"The password protection option for the Compressed Folders feature in Plus! for Windows 98 and Windows Me writes password information to a file, which allows local users to recover the passwords and read the compressed folders.",2001-05-03,Metasploit,cpe:2.3:a:microsoft:plus:*:*:*:*:*:*:*:* CVE-2001-0167,0.0,,0.65403,Buffer overflow in AT&T WinVNC (Virtual Network Computing) client 3.3.3r7 and earlier allows remote attackers to execute arbitrary commands via a long rfbConnFailed packet with a long reason string.,2001-05-03,Metasploit,cpe:2.3:a:att:winvnc:*:*:*:*:*:*:*:* CVE-2001-0168,0.0,,0.67361,Buffer overflow in AT&T WinVNC (Virtual Network Computing) server 3.3.3r7 and earlier allows remote attackers to execute arbitrary commands via a long HTTP GET request when the DebugLevel registry key is greater than 0.,2001-05-03,Metasploit,cpe:2.3:a:att:winvnc:*:*:*:*:*:*:*:* CVE-2001-0241,0.0,,0.87613,Buffer overflow in Internet Printing ISAPI extension in Windows 2000 allows remote attackers to gain root privileges via a long print request that is passed to the extension through IIS 5.0.,2001-06-27,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:* CVE-2001-0311,0.0,,0.45881,Vulnerability in OmniBackII A.03.50 in HP 11.x and earlier allows attackers to gain unauthorized access to an OmniBack client.,2001-06-02,Metasploit,cpe:2.3:a:hp:omniback_ii:a.03.50:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:* CVE-2001-0333,0.0,,0.8447,"Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and ""\"" characters twice.",2001-06-27,Metasploit,cpe:2.3:a:microsoft:internet_information_server:*:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:* CVE-2001-0414,0.0,,0.87296,Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long readvar argument.,2001-06-18,Metasploit,cpe:2.3:a:dave_mills:ntpd:*:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99a:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99b:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99c:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99d:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99e:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99f:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99g:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99h:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99i:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99j:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93a:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93b:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93c:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93d:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93e:*:*:*:*:*:*:* CVE-2001-0499,0.0,,0.74942,"Buffer overflow in Transparent Network Substrate (TNS) Listener in Oracle 8i 8.1.7 and earlier allows remote attackers to gain privileges via a long argument to the commands (1) STATUS, (2) PING, (3) SERVICES, (4) TRC_FILE, (5) SAVE_CONFIG, or (6) RELOAD.",2001-07-21,Metasploit,cpe:2.3:a:oracle:oracle8i:*:*:*:*:*:*:*:* CVE-2001-0500,0.0,,0.90865,"Buffer overflow in ISAPI extension (idq.dll) in Index Server 2.0 and Indexing Service 2000 in IIS 6.0 beta and earlier allows remote attackers to execute arbitrary commands via a long argument to Internet Data Administration (.ida) and Internet Data Query (.idq) files such as default.ida, as commonly exploited by Code Red.",2001-07-21,Metasploit,cpe:2.3:a:microsoft:index_server:2.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:indexing_service:*:*:windows_2000:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:*:beta:*:*:*:*:*:* CVE-2001-0537,0.0,,0.93696,"HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.",2001-07-21,Metasploit/Nuclei,cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3da:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3db:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3ha:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3ma:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3na:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3xa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(10\)w5\(18g\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(14\)w5\(20\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(5\)xk:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(7\)xk:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:* CVE-2001-0797,0.0,,0.88681,Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.,2001-12-12,Metasploit,cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.1:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.3:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.6a:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:3.2:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:3.3.1:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:3.3.2:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:3.3.3:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:3.3:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:* CVE-2001-0800,0.0,,0.77497,lpsched in IRIX 6.5.13f and earlier allows remote attackers to execute arbitrary commands via shell metacharacters.,2001-12-06,Metasploit,cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:* CVE-2001-0803,0.0,,0.58736,Buffer overflow in the client connection routine of libDtSvc.so.1 in CDE Subprocess Control Service (dtspcd) allows remote attackers to execute arbitrary commands.,2001-12-06,Metasploit,cpe:2.3:a:open_group:cde_common_desktop_environment:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:open_group:cde_common_desktop_environment:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:open_group:cde_common_desktop_environment:1.1:*:*:*:*:*:*:*;cpe:2.3:a:open_group:cde_common_desktop_environment:1.2:*:*:*:*:*:*:*;cpe:2.3:a:open_group:cde_common_desktop_environment:2.0:*:*:*:*:*:*:*;cpe:2.3:a:open_group:cde_common_desktop_environment:2.1:*:*:*:*:*:*:* CVE-2001-1013,0.0,,0.68119,"Apache on Red Hat Linux with with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the server.",2001-09-12,Metasploit,cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:* CVE-2001-1320,0.0,,0.66694,"Network Associates PGP Keyserver 7.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via exceptional BER encodings (possibly buffer overflows), as demonstrated by the PROTOS LDAPv3 test suite.",2001-07-16,Metasploit,cpe:2.3:a:pgp:keyserver:7.0:*:*:*:*:*:*:* CVE-2001-1473,0.0,,0.04878,"The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the attacker to compute the corresponding private key and use the target's Session ID with the compromised key pair to masquerade as the target.",2001-01-18,Nuclei,cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:* CVE-2001-1583,0.0,,0.51992,lpd daemon (in.lpd) in Solaris 8 and earlier allows remote attackers to execute arbitrary commands via a job request with a crafted control file that is not properly handled when lpd invokes a mail program. NOTE: this might be the same vulnerability as CVE-2000-1220.,2001-12-31,Metasploit,cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:* CVE-2002-0367,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.01827,"smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.",2002-06-25,CISA,cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:terminal_server:*:*:* CVE-2002-0392,0.0,,0.59304,"Apache 1.3 through 1.3.24, and Apache 2.0 through 2.0.36, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a chunk-encoded HTTP request that causes Apache to use an incorrect size.",2002-07-03,Metasploit,cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:* CVE-2002-0422,0.0,,0.65016,"IIS 5 and 5.1 supporting WebDAV methods allows remote attackers to determine the internal IP address of the system (which may be obscured by NAT) via (1) a PROPFIND HTTP request with a blank Host header, which leaks the address in an HREF property in a 207 Multi-Status response, or (2) via the WRITE or MKCOL method, which leaks the IP in the Location server header.",2002-08-12,Metasploit,cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:* CVE-2002-0649,0.0,,0.86644,"Multiple buffer overflows in the Resolution Service for Microsoft SQL Server 2000 and Microsoft Desktop Engine 2000 (MSDE) allow remote attackers to cause a denial of service or execute arbitrary code via UDP packets to port 1434 in which (1) a 0x04 byte that causes the SQL Monitor thread to generate a long registry key name, or (2) a 0x08 byte with a long string causes heap corruption, as exploited by the Slammer/Sapphire worm.",2002-08-12,Metasploit,cpe:2.3:a:microsoft:data_engine:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:sp2:*:*:*:*:*:* CVE-2002-0965,0.0,,0.77669,"Buffer overflow in TNS Listener for Oracle 9i Database Server on Windows systems, and Oracle 8 on VM, allows local users to execute arbitrary code via a long SERVICE_NAME parameter, which is not properly handled when writing an error message to a log file.",2002-10-04,Metasploit,cpe:2.3:a:oracle:oracle9i:9.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle9i:9.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle9i:9.0:*:*:*:*:*:*:* CVE-2002-1059,0.0,,0.73111,"Buffer overflow in Van Dyke SecureCRT SSH client before 3.4.6, and 4.x before 4.0 beta 3, allows an SSH server to execute arbitrary code via a long SSH1 protocol version string.",2002-10-04,Metasploit,cpe:2.3:a:van_dyke_technologies:securecrt:2.4:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.0:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.2:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.3:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4.2:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4.3:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4.4:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4.5:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:4.0_beta_1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:4.0_beta_2:*:*:*:*:*:*:* CVE-2002-1120,0.0,,0.72553,Buffer overflow in Savant Web Server 3.1 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request.,2002-09-24,Metasploit,cpe:2.3:a:savant:savant_web_server:*:*:*:*:*:*:*:* CVE-2002-1123,0.0,,0.89144,"Buffer overflow in the authentication function for Microsoft SQL Server 2000 and Microsoft Desktop Engine (MSDE) 2000 allows remote attackers to execute arbitrary code via a long request to TCP port 1433, aka the ""Hello"" overflow.",2002-09-24,Metasploit,cpe:2.3:a:microsoft:data_engine:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:sp2:*:*:*:*:*:* CVE-2002-1131,0.0,,0.03877,"Cross-site scripting vulnerabilities in SquirrelMail 1.2.7 and earlier allows remote attackers to execute script as other web users via (1) addressbook.php, (2) options.php, (3) search.php, or (4) help.php.",2002-10-04,Nuclei,cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:* CVE-2002-1142,0.0,,0.83043,"Heap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub.",2002-11-29,Metasploit,cpe:2.3:a:microsoft:data_access_components:2.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.5:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:* CVE-2002-1214,0.0,,0.78344,Buffer overflow in Microsoft PPTP Service on Windows XP and Windows 2000 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a certain PPTP packet with malformed control data.,2002-10-28,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:* CVE-2002-1318,0.0,,0.73412,Buffer overflow in samba 2.2.2 through 2.2.6 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-endian UCS2 unicode string.,2002-12-11,Metasploit,cpe:2.3:a:hp:cifs-9000_server:a.01.08.01:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.08:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.09:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.17:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.18:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:* CVE-2002-1359,0.0,,0.86998,"Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite.",2002-12-23,Metasploit,cpe:2.3:a:fissh:ssh_client:1.0a_for_windows:*:*:*:*:*:*:*;cpe:2.3:a:intersoft:securenetterm:5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:netcomposite:shellguard_ssh:3.4.6:*:*:*:*:*:*:*;cpe:2.3:a:pragma_systems:secureshell:2.0:*:*:*:*:*:*:*;cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:*;cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:*;cpe:2.3:a:putty:putty:0.53:*:*:*:*:*:*:*;cpe:2.3:a:winscp:winscp:2.0.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:* CVE-2002-1473,0.0,,0.09365,Multiple buffer overflows in lp subsystem for HP-UX 10.20 through 11.11 (11i) allow local users to cause a denial of service and possibly execute arbitrary code.,2003-04-22,Metasploit,cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:* CVE-2002-1643,0.0,,0.81942,"Multiple buffer overflows in RealNetworks Helix Universal Server 9.0 (9.0.2.768) allow remote attackers to execute arbitrary code via (1) a long Transport field in a SETUP RTSP request, (2) a DESCRIBE RTSP request with a long URL argument, or (3) two simultaneous HTTP GET requests with long arguments.",2002-12-19,Metasploit,cpe:2.3:a:realnetworks:helix_universal_server:9.0.2.768:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:helix_universal_server:9.0:*:*:*:*:*:*:* CVE-2002-1864,0.0,,0.59336,"Directory traversal vulnerability in Simple Web Server (SWS) 0.0.4 through 0.1.0 allows remote attackers to read arbitrary files via a "".."" (dot dot) in an HTTP request.",2002-12-31,Metasploit,cpe:2.3:a:sws:sws_simple_web_server:0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:sws:sws_simple_web_server:0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:sws:sws_simple_web_server:0.1.0:*:*:*:*:*:*:*;cpe:2.3:a:sws:sws_simple_web_server:0.1.1:*:*:*:*:*:*:* CVE-2002-2226,0.0,,0.7461,Buffer overflow in tftpd of TFTP32 2.21 and earlier allows remote attackers to execute arbitrary code via a long filename argument.,2002-12-31,Metasploit,cpe:2.3:a:tftpd32:tftpd32:*:*:*:*:*:*:*:* CVE-2002-2268,0.0,,0.74538,Buffer overflow in Webster HTTP Server allows remote attackers to execute arbitrary code via a long URL.,2002-12-31,Metasploit,cpe:2.3:a:netdave:webster_http_server:*:*:*:*:*:*:*:* CVE-2003-0027,0.0,,0.65152,Directory traversal vulnerability in Sun Kodak Color Management System (KCMS) library service daemon (kcms_server) allows remote attackers to read arbitrary files via the KCS_OPEN_PROFILE procedure.,2003-02-07,Metasploit,cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:* CVE-2003-0050,0.0,,0.87791,parse_xml.cgi in Apple Darwin Streaming Administration Server 4.1.2 and QuickTime Streaming Server 4.1.1 allows remote attackers to execute arbitrary code via shell metacharacters.,2003-03-07,Metasploit,cpe:2.3:a:apple:darwin_streaming_server:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime_streaming_server:4.1.1:*:*:*:*:*:*:* CVE-2003-0109,0.0,,0.88713,"Buffer overflow in ntdll.dll on Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote attackers to execute arbitrary code, as demonstrated via a WebDAV request to IIS 5.0.",2003-03-31,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp3:*:*:*:*:*:* CVE-2003-0190,0.0,,0.1361,"OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.",2003-05-12,Metasploit,cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*;cpe:2.3:a:openbsd:openssh:3.6.1:p1:*:*:*:*:*:*;cpe:2.3:a:openpkg:openpkg:1.2:*:*:*:*:*:*:*;cpe:2.3:a:openpkg:openpkg:1.3:*:*:*:*:*:*:*;cpe:2.3:h:siemens:scalance_x204rna:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:scalance_x204rna_ecc:-:*:*:*:*:*:*:*;cpe:2.3:o:siemens:scalance_x204rna_ecc_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:scalance_x204rna_firmware:*:*:*:*:*:*:*:* CVE-2003-0201,0.0,,0.80508,"Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code.",2003-05-05,Metasploit,cpe:2.3:a:hp:cifs-9000_server:a.01.05:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.06:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.07:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.08.01:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.08:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.09.01:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.09.02:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.09:*:*:*:*:*:*:*;cpe:2.3:a:samba-tng:samba-tng:0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:samba-tng:samba-tng:0.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0b:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0d:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0d_pk9_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f_pk6_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f_pk7_bl18:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0g_pk3_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0_pk4_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0_pk4_bl18:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0a:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0a_pk3_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0f:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1b:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1b_pk1_bl1:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:* CVE-2003-0213,0.0,,0.74735,"ctrlpacket.c in PoPToP PPTP server before 1.1.4-b3 allows remote attackers to cause a denial of service via a length field of 0 or 1, which causes a negative value to be fed into a read operation, leading to a buffer overflow.",2003-05-12,Metasploit,cpe:2.3:a:poptop:pptp_server:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:poptop:pptp_server:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:poptop:pptp_server:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:poptop:pptp_server:1.1.3_2002-10-09:*:*:*:*:*:*:*;cpe:2.3:a:poptop:pptp_server:1.1.4b1:*:*:*:*:*:*:*;cpe:2.3:a:poptop:pptp_server:1.1.4b2:*:*:*:*:*:*:* CVE-2003-0220,0.0,,0.85491,Buffer overflow in the administrator authentication process for Kerio Personal Firewall (KPF) 2.1.4 and earlier allows remote attackers to execute arbitrary code via a handshake packet.,2003-05-12,Metasploit,cpe:2.3:a:kerio:personal_firewall_2:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:kerio:personal_firewall_2:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:kerio:personal_firewall_2:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:kerio:personal_firewall_2:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:kerio:personal_firewall_2:2.1:*:*:*:*:*:*:* CVE-2003-0264,0.0,,0.6681,"Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server.",2003-05-27,Metasploit,cpe:2.3:a:seattle_lab_software:slmail:5.1.0.4420:*:*:*:*:*:*:* CVE-2003-0270,0.0,,0.22098,"The administration capability for Apple AirPort 802.11 wireless access point devices uses weak encryption (XOR with a fixed key) for protecting authentication credentials, which could allow remote attackers to obtain administrative access via sniffing when the capability is available via Ethernet or non-WEP connections.",2003-06-16,Metasploit,cpe:2.3:h:apple:802.11n:7.3.1:*:*:*:*:*:*:* CVE-2003-0344,0.0,,0.79213,"Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.",2003-06-16,Metasploit,cpe:2.3:a:microsoft:ie:6.0:*:windows_server_2003:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:* CVE-2003-0349,0.0,,0.87981,"Buffer overflow in the streaming media component for logging multicast requests in the ISAPI for the logging capability of Microsoft Windows Media Services (nsiislog.dll), as installed in IIS 5.0, allows remote attackers to execute arbitrary code via a large POST request to nsiislog.dll.",2003-07-24,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:* CVE-2003-0352,0.0,,0.90169,"Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.",2003-08-18,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:* CVE-2003-0471,0.0,,0.68925,Buffer overflow in WebAdmin.exe for WebAdmin allows remote attackers to execute arbitrary code via an HTTP request to WebAdmin.dll with a long USER argument.,2003-08-07,Metasploit,cpe:2.3:a:alt-n:webadmin:*:*:*:*:*:*:*:* CVE-2003-0533,0.0,,0.88406,"Stack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file, as exploited by the Sasser worm.",2004-06-01,Metasploit,cpe:2.3:a:microsoft:netmeeting:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:* CVE-2003-0558,0.0,,0.7578,Buffer overflow in LeapFTP 2.7.3.600 allows remote FTP servers to execute arbitrary code via a long IP address response to a PASV request.,2003-08-18,Metasploit,cpe:2.3:a:leapware:leapftp:2.7.3.600:*:*:*:*:*:*:* CVE-2003-0694,0.0,,0.7608,"The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.",2003-10-06,Metasploit,cpe:2.3:a:sendmail:advanced_message_server:1.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:advanced_message_server:1.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:2.6.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:2.6:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:3.0:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_pro:8.9.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_pro:8.9.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f_pk6_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f_pk7_bl18:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f_pk8_bl22:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0g_pk3_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0g_pk4_bl22:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1b:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1b_pk1_bl1:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:3.0:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.20f:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.20m:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_advanced_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_server:6.5:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:* CVE-2003-0714,0.0,,0.67793,"The Internet Mail Service in Exchange Server 5.5 and Exchange 2000 allows remote attackers to cause a denial of service (memory exhaustion) by directly connecting to the SMTP service and sending a certain extended verb request, possibly triggering a buffer overflow in Exchange 2000.",2003-11-17,Metasploit,cpe:2.3:a:microsoft:exchange_server:2000:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2000:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2000:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:5.5:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:5.5:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:5.5:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:5.5:sp4:*:*:*:*:*:* CVE-2003-0719,0.0,,0.78359,"Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.",2004-06-01,Metasploit,cpe:2.3:a:microsoft:netmeeting:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:* CVE-2003-0722,0.0,,0.87095,"The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.",2003-09-22,Metasploit,cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:* CVE-2003-0727,0.0,,0.85761,Multiple buffer overflows in the XML Database (XDB) functionality for Oracle 9i Database Release 2 allow local users to cause a denial of service or hijack user sessions.,2003-10-20,Metasploit,cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:* CVE-2003-0812,0.0,,0.83586,"Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote attackers to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file (""NetSetup.LOG""), as demonstrated using the NetAddAlternateComputerName API.",2003-12-15,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:* CVE-2003-0818,0.0,,0.90191,"Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings.",2004-03-03,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:* CVE-2003-0822,0.0,,0.90176,Buffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.,2003-12-15,Metasploit,cpe:2.3:a:microsoft:frontpage_server_extensions:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:frontpage_server_extensions:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_team_services:2002:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:* CVE-2003-0990,0.0,,0.78049,"The parseAddress code in (1) SquirrelMail 1.4.0 and (2) GPG Plugin 1.1 allows remote attackers to execute commands via shell metacharacters in the ""To:"" field.",2004-01-20,Metasploit,cpe:2.3:a:squirrelmail:gpg_plugin:1.1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:* CVE-2003-1141,0.0,,0.78728,Buffer overflow in NIPrint 4.10 allows remote attackers to execute arbitrary code via a long string to TCP port 515.,2003-11-04,Metasploit,cpe:2.3:h:network_instruments:niprint_lpd-lpr_print_server:4.10:*:*:*:*:*:*:* CVE-2003-1192,0.0,,0.82653,Stack-based buffer overflow in IA WebMail Server 3.1.0 allows remote attackers to execute arbitrary code via a long GET request.,2003-11-03,Metasploit,cpe:2.3:a:truenorth_software:ia_webmail_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:truenorth_software:ia_webmail_server:3.1:*:*:*:*:*:*:* CVE-2003-1200,0.0,,0.5989,Stack-based buffer overflow in FORM2RAW.exe in Alt-N MDaemon 6.5.2 through 6.8.5 allows remote attackers to execute arbitrary code via a long From parameter to Form2Raw.cgi.,2003-12-29,Metasploit,cpe:2.3:a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:* CVE-2003-1336,0.0,,0.66546,Buffer overflow in mIRC before 6.11 allows remote attackers to execute arbitrary code via a long irc:// URL.,2003-12-31,Metasploit,cpe:2.3:a:mirc:mirc:*:*:*:*:*:*:*:* CVE-2004-0206,0.0,,0.81052,"Network Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an ""unchecked buffer,"" possibly a buffer overflow.",2004-11-03,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:* CVE-2004-0210,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.05637,"The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.",2004-08-06,CISA,cpe:2.3:a:microsoft:interix:2.2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:server:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:terminal_server:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:workstation:*:*:* CVE-2004-0297,0.0,,0.56961,Buffer overflow in the Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) in Ipswitch IMail Server 8.03 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via an LDAP message with a large tag length.,2004-11-23,Metasploit,cpe:2.3:a:ipswitch:imail:8.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ipswitch:imail:8.0.5:*:*:*:*:*:*:* CVE-2004-0313,0.0,,0.77835,"Buffer overflow in PSOProxy 0.91 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long HTTP request, as demonstrated using a long (1) GET argument or (2) method name.",2004-11-23,Metasploit,cpe:2.3:a:psoproxy:psoproxy_server:0.91:*:*:*:*:*:*:* CVE-2004-0326,0.0,,0.79778,Buffer overflow in the web proxy for GateKeeper Pro 4.7 allows remote attackers to execute arbitrary code via a long GET request.,2004-11-23,Metasploit,cpe:2.3:a:proxy-pro:professional_gatekeeper:4.7:*:*:*:*:*:*:* CVE-2004-0330,0.0,,0.83139,Buffer overflow in Serv-U ftp before 5.0.0.4 allows remote authenticated users to execute arbitrary code via a long time zone argument to the MDTM command.,2004-11-23,Metasploit,cpe:2.3:a:solarwinds:serv-u_file_server:*:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:4.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.3:*:*:*:*:*:*:* CVE-2004-0331,0.0,,0.67532,Heap-based buffer overflow in Dell OpenManage Web Server 3.4.0 allows remote attackers to cause a denial of service (crash) via a HTTP POST with a long application variable.,2004-11-23,Metasploit,cpe:2.3:a:dell:openmanage:3.2:*:*:*:*:*:*:*;cpe:2.3:a:dell:openmanage:3.4:*:*:*:*:*:*:*;cpe:2.3:a:dell:openmanage:3.7.1:*:*:*:*:*:*:*;cpe:2.3:a:dell:openmanage:3.7:*:*:*:*:*:*:* CVE-2004-0362,0.0,,0.83404,"Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.",2004-04-15,Metasploit,cpe:2.3:a:iss:blackice_agent_server:3.6ebz:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6eca:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6ecb:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6ecc:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6ecd:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6ece:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6ecf:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6cbz:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6cca:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6ccb:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6ccc:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6ccd:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6cce:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6ccf:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6cbz:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6cca:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6ccb:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6ccc:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6ccd:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6cce:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6ccf:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6ebz:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6eca:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6ecb:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6ecd:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6ece:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6ecf:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0eba:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebf:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebg:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebh:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebj:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebk:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebl:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ebz:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6eca:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ecb:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ecc:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ecd:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ece:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ecf:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_network_sensor:7.0:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_20.11:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_22.10:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_22.4:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_22.9:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ebz:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6eca:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ecb:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ecc:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ecd:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ece:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ecf:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.0.1_win_sr1.1:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.0:*:windows:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5:*:windows:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5:sr3.2:windows:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5:sr3.3:windows:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.10:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.1:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.4:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.5:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.6:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.7:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.8:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.9:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.10:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.11:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.1:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.2:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.3:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.4:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.5:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.6:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.7:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.8:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.9:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:20.11:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.10:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.1:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.2:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.3:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.4:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.5:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.6:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.7:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.8:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.9:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.10:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.11:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.1:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.2:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.3:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.4:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.5:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.6:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.7:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.8:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.9:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.1:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.2:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.3:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.4:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.5:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.6:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.7:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.8:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.9:*:*:*:*:*:*:* CVE-2004-0363,0.0,,0.72679,"Stack-based buffer overflow in the SymSpamHelper ActiveX component (symspam.dll) in Norton AntiSpam 2004, as used in Norton Internet Security 2004, allows remote attackers to execute arbitrary code via a long parameter to the LaunchCustomRuleWizard method.",2004-04-15,Metasploit,cpe:2.3:a:symantec:norton_antispam:2004:*:*:*:*:*:*:* CVE-2004-0397,0.0,,0.86588,Stack-based buffer overflow during the apr_time_t data conversion in Subversion 1.0.2 and earlier allows remote attackers to execute arbitrary code via a (1) DAV2 REPORT query or (2) get-dated-rev svn-protocol command.,2004-07-07,Metasploit,cpe:2.3:a:subversion:subversion:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:subversion:subversion:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:subversion:subversion:1.0:*:*:*:*:*:*:* CVE-2004-0430,0.0,,0.80742,Stack-based buffer overflow in AppleFileServer for Mac OS X 10.3.3 and earlier allows remote attackers to execute arbitrary code via a LoginExt packet for a Cleartext Password User Authentication Method (UAM) request with a PathName argument that includes an AFPName type string that is longer than the associated length field.,2004-07-07,Metasploit,cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* CVE-2004-0437,0.0,,0.06794,"Titan FTP Server version 3.01 build 163, and possibly other versions before build 169, allows remote authenticated users to cause a denial of service (crash) by disconnecting from the system during a ""LIST -L"" command, which causes Titan to access an invalid socket.",2004-07-07,Nuclei,cpe:2.3:a:south_river_technologies:titan_ftp_server:3.01_build_163:*:*:*:*:*:*:* CVE-2004-0519,0.0,,0.00124,"Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.",2004-08-18,Nuclei,cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:* CVE-2004-0541,0.0,,0.78284,"Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password (""pass"" variable).",2004-08-06,Metasploit,cpe:2.3:a:national_science_foundation:squid_web_proxy_cache:2.5_stable:*:*:*:*:*:*:*;cpe:2.3:a:national_science_foundation:squid_web_proxy_cache:3_pre:*:*:*:*:*:*:* CVE-2004-0608,0.0,,0.60179,"The Unreal Engine, as used in DeusEx 1.112fm and earlier, Devastation 390 and earlier, Mobile Forces 20000 and earlier, Nerf Arena Blast 1.2 and earlier, Postal 2 1337 and earlier, Rune 107 and earlier, Tactical Ops 3.4.0 and earlier, Unreal 1 226f and earlier, Unreal II XMP 7710 and earlier, Unreal Tournament 451b and earlier, Unreal Tournament 2003 2225 and earlier, Unreal Tournament 2004 before 3236, Wheel of Time 333b and earlier, and X-com Enforcer, allows remote attackers to execute arbitrary code via a UDP packet containing a secure query with a long value, which overwrites memory.",2004-12-06,Metasploit,cpe:2.3:a:arush:devastation:390.0:*:*:*:*:*:*:*;cpe:2.3:a:dreamforge:tnn_outdoors_pro_hunter:*:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_engine:226f:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_engine:433:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_engine:436:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament:451b:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2003:2199_linux:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2003:2199_macos:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2003:2199_win32:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2003:2225_macos:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2003:2225_win32:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2004:macos:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2004:win32:*:*:*:*:*:*:*;cpe:2.3:a:infogrames:tacticalops:3.4:*:*:*:*:*:*:*;cpe:2.3:a:infogrames:x-com_enforcer:*:*:*:*:*:*:*:*;cpe:2.3:a:ion_storm:deusex:1.112_fm:*:*:*:*:*:*:*;cpe:2.3:a:nerf_arena_blast:nerf_arena_blast:1.2:*:*:*:*:*:*:*;cpe:2.3:a:rage_software:mobile_forces:20000.0:*:*:*:*:*:*:*;cpe:2.3:a:robert_jordan:wheel_of_time:333.0b:*:*:*:*:*:*:*;cpe:2.3:a:running_with_scissors:postal_2:1337:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:* CVE-2004-0636,0.0,,0.78516,"Buffer overflow in the goaway function in the aim:goaway URI handler for AOL Instant Messenger (AIM) 5.5, including 5.5.3595, allows remote attackers to execute arbitrary code via a long Away message.",2004-11-23,Metasploit,cpe:2.3:a:aol:instant_messenger:5.5.3415_beta:*:*:*:*:*:*:*;cpe:2.3:a:aol:instant_messenger:5.5.3595:*:*:*:*:*:*:*;cpe:2.3:a:aol:instant_messenger:5.5:*:*:*:*:*:*:* CVE-2004-0656,0.0,,0.00739,The accept_client function in PureFTPd 1.0.18 and earlier allows remote attackers to cause a denial of service by exceeding the maximum number of connections.,2004-08-06,Nuclei,cpe:2.3:a:pureftpd:pureftpd:0.96:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.11:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.12:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.13a:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.14:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.15:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.16:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.16a:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.16b:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.16c:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.17a:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.18:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0:*:*:*:*:*:*:* CVE-2004-0695,0.0,,0.7912,Stack-based buffer overflow in the FTP service for 4D WebSTAR 5.3.2 and earlier allows remote attackers to execute arbitrary code via a long FTP command.,2004-07-27,Metasploit,cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:* CVE-2004-0735,0.0,,0.74364,"Buffer overflow in Medal of Honor (1) Allied Assault 1.11v9 and earlier, (2) Breakthrough 2.40b and earlier, and (3) Spearhead 2.15 and earlier, when playing on a Local Area Network (LAN), allows remote attackers to execute arbitrary code via vectors such as (1) the getinfo query, (2) the connect packet, and other unknown vectors.",2004-07-27,Metasploit,cpe:2.3:a:electronic_arts:medal_of_honor_allied_assault:1.0:*:*:*:*:*:*:*;cpe:2.3:a:electronic_arts:medal_of_honor_allied_assault:1.11_v9:*:*:*:*:*:*:*;cpe:2.3:a:electronic_arts:medal_of_honor_allied_assault:1.1:*:*:*:*:*:*:*;cpe:2.3:a:electronic_arts:medal_of_honor_allied_assault:breakthrough_2.40_b:*:*:*:*:*:*:*;cpe:2.3:a:electronic_arts:medal_of_honor_allied_assault:spearhead_2.15:*:*:*:*:*:*:* CVE-2004-0795,0.0,,0.31914,"DB2 8.1 remote command server (DB2RCMD.EXE) executes the db2rcmdc.exe program as the db2admin administrator, which allows local users to gain privileges via the DB2REMOTECMD named pipe.",2004-10-20,Metasploit,cpe:2.3:a:ibm:db2_universal_database:8.1:*:aix:*:*:*:*:* CVE-2004-0798,0.0,,0.72637,Buffer overflow in the _maincfgret.cgi script for Ipswitch WhatsUp Gold before 8.03 Hotfix 1 allows remote attackers to execute arbitrary code via a long instancename parameter.,2004-10-20,Metasploit,cpe:2.3:a:progress:whatsup_gold:7.03:*:*:*:*:*:*:*;cpe:2.3:a:progress:whatsup_gold:7.04:*:*:*:*:*:*:*;cpe:2.3:a:progress:whatsup_gold:7.0:*:*:*:*:*:*:*;cpe:2.3:a:progress:whatsup_gold:8.01:*:*:*:*:*:*:*;cpe:2.3:a:progress:whatsup_gold:8.03:*:*:*:*:*:*:*;cpe:2.3:a:progress:whatsup_gold:8.0:*:*:*:*:*:*:* CVE-2004-0964,0.0,,0.85695,"Buffer overflow in Zinf 2.2.1 on Windows, and other older versions for Linux, allows remote attackers or local users to execute arbitrary code via certain values in a .pls file.",2005-02-09,Metasploit,cpe:2.3:a:zinf:zinf:2.2.1:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:* CVE-2004-1037,0.0,,0.85829,The search function in TWiki 20030201 allows remote attackers to execute arbitrary commands via shell metacharacters in a search string.,2005-03-01,Metasploit,cpe:2.3:a:twiki:twiki:2003-02-01:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:* CVE-2004-1080,0.0,,0.89333,"The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the ""Association Context Vulnerability.""",2005-01-10,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:2000:*:small_business_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:2003:*:small_business_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:terminal_server:*:*:*:*:* CVE-2004-1134,0.0,,0.8642,Buffer overflow in the Microsoft W3Who ISAPI (w3who.dll) allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long query string.,2005-01-10,Metasploit,cpe:2.3:a:microsoft:w3who.dll:*:*:*:*:*:*:*:* CVE-2004-1135,0.0,,0.31938,"Multiple buffer overflows in WS_FTP Server 5.03 2004.10.14 allow remote attackers to cause a denial of service (service crash) via long (1) SITE, (2) XMKD, (3) MKD, and (4) RNFR commands.",2005-01-10,Metasploit,cpe:2.3:a:ipswitch:ws_ftp_server:5.03:*:*:*:*:*:*:* CVE-2004-1172,0.0,,0.78981,"Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname.",2005-01-10,Metasploit,cpe:2.3:a:symantec_veritas:backup_exec:8.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:8.5:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:8.6:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:* CVE-2004-1211,0.0,,0.80539,"Multiple buffer overflows in the IMAP service in Mercury/32 4.01a allow remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via long arguments to the (1) EXAMINE, (2) SUBSCRIBE, (3) STATUS, (4) APPEND, (5) CHECK, (6) CLOSE, (7) EXPUNGE, (8) FETCH, (9) RENAME, (10) DELETE, (11) LIST, (12) SEARCH, (13) CREATE, or (14) UNSUBSCRIBE commands.",2005-01-10,Metasploit,cpe:2.3:a:david_harris:mercury:4.0.1a:*:win32:*:*:*:*:* CVE-2004-1315,0.0,,0.85909,"viewtopic.php in phpBB 2.x before 2.0.11 improperly URL decodes the highlight parameter when extracting words and phrases to highlight, which allows remote attackers to execute arbitrary PHP code by double-encoding the highlight value so that special characters are inserted into the result, which is then processed by PHP exec, as exploited by the Santy.A worm.",2004-11-12,Metasploit,cpe:2.3:a:phpbb_group:phpbb:*:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.4.4:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.6c:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.6d:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.7a:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.8a:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0_beta1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0_rc1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0_rc2:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0_rc3:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0_rc4:*:*:*:*:*:*:* CVE-2004-1317,0.0,,0.78963,"Stack-based buffer overflow in doexec.c in Netcat for Windows 1.1, when running with the -e option, allows remote attackers to execute arbitrary code via a long DNS command.",2004-12-27,Metasploit,cpe:2.3:a:netcat:netcat:1.1:*:*:*:*:*:*:* CVE-2004-1373,0.0,,0.86852,"Format string vulnerability in SHOUTcast 1.9.4 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via format string specifiers in a content URL, as demonstrated in the filename portion of a .mp3 file.",2004-12-23,Metasploit,cpe:2.3:a:nullsoft:shoutcast_server:1.9.4:*:linux:*:*:*:*:*;cpe:2.3:a:nullsoft:shoutcast_server:1.9.4:*:mac_os_x:*:*:*:*:*;cpe:2.3:a:nullsoft:shoutcast_server:1.9.4:*:win32:*:*:*:*:* CVE-2004-1388,0.0,,0.74545,"Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.",2004-12-31,Metasploit,cpe:2.3:a:berlios:gps_daemon:1.25:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.26:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.91:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.92:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.93:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.94:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.95:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.96:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.97:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.98:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.0:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.1:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.2:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.3:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.4:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.7:*:*:*:*:*:*:* CVE-2004-1389,0.0,,0.35325,"Unknown vulnerability in the Veritas NetBackup Administrative Assistant interface for NetBackup BusinesServer 3.4, 3.4.1, and 4.5, DataCenter 3.4, 3.4.1, and 4.5, Enterprise Server 5.1, and NetBackup Server 5.0 and 5.1, allows attackers to execute arbitrary commands via the bpjava-susvc process, possibly related to the call-back feature.",2004-12-31,Metasploit,cpe:2.3:a:veritas:netbackup:3.4.0:*:businessserver:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:3.4.0:*:datacenter:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:3.4.1:*:businessserver:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:3.4.1:*:datacenter:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:4.5.0:*:businessserver:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:4.5.0:*:datacenter:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:5.0:*:server:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:5.1:*:enterprise_server:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:5.1:*:server:*:*:*:*:* CVE-2004-1464,5.9,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H,0.01698,"Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port.",2004-12-31,CISA,cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* CVE-2004-1520,0.0,,0.88797,Stack-based buffer overflow in IPSwitch IMail 8.13 allows remote authenticated users to execute arbitrary code via a long IMAP DELETE command.,2004-12-31,Metasploit,cpe:2.3:a:ipswitch:imail:8.13:*:*:*:*:*:*:* CVE-2004-1550,0.0,,0.39501,"Motorola Wireless Router WR850G running firmware 4.03 allows remote attackers to bypass authentication, log on as an administrator, and obtain sensitive information by repeatedly making an HTTP request for ver.asp until an administrator logs on.",2004-12-31,Metasploit,cpe:2.3:h:motorola:wr850g:4.0.3_firmware:*:*:*:*:*:*:* CVE-2004-1558,0.0,,0.86295,Multiple stack-based buffer overflows in YPOPs! (aka YahooPOPS) 0.4 through 0.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) POP3 USER command or (2) SMTP request.,2004-12-31,Metasploit,cpe:2.3:a:ypops:ypops:0.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4.3:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4.4:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4.5:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4.6:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.5:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.6:*:*:*:*:*:*:* CVE-2004-1561,0.0,,0.78571,Buffer overflow in Icecast 2.0.1 and earlier allows remote attackers to execute arbitrary code via an HTTP request with a large number of headers.,2004-12-31,Metasploit,cpe:2.3:a:icecast:icecast:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:icecast:icecast:2.0:*:*:*:*:*:*:* CVE-2004-1595,0.0,,0.79617,Buffer overflow in ShixxNote 6.net build 117 allows remote attackers to execute arbitrary code via a long font field.,2004-10-13,Metasploit,cpe:2.3:a:shixxnote:shixxnote:6.net:*:*:*:*:*:*:* CVE-2004-1602,0.0,,0.03636,"ProFTPD 1.2.x, including 1.2.8 and 1.2.10, responds in a different amount of time when a given username exists, which allows remote attackers to identify valid usernames by timing the server response.",2004-10-15,Nuclei,cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:* CVE-2004-1626,0.0,,0.73355,"Buffer overflow in Ability Server 2.34, and possibly other versions, allows remote attackers to execute arbitrary code via a long STOR command.",2004-10-22,Metasploit,cpe:2.3:a:code-crafters:ability_server:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:code-crafters:ability_server:2.3.2:*:*:*:*:*:*:*;cpe:2.3:a:code-crafters:ability_server:2.3.4:*:*:*:*:*:*:* CVE-2004-1638,0.0,,0.79074,Buffer overflow in MailCarrier 2.51 allows remote attackers to execute arbitrary code via a long (1) EHLO and possibly (2) HELO command.,2004-10-16,Metasploit,cpe:2.3:a:tabs_laboratories:mailcarrier:2.51:*:*:*:*:*:*:* CVE-2004-1641,0.0,,0.07864,"Heap-based buffer overflow in Titan FTP 3.21 and earlier allows remote attackers to cause a denial of service (crash) via a long FTP command such as (1) CWD, (2) STAT, or (3) LIST.",2004-08-29,Nuclei,cpe:2.3:a:south_river_technologies:titan_ftp_server:2.10:*:*:*:*:*:*:*;cpe:2.3:a:south_river_technologies:titan_ftp_server:2.2:*:*:*:*:*:*:*;cpe:2.3:a:south_river_technologies:titan_ftp_server:3.01:*:*:*:*:*:*:*;cpe:2.3:a:south_river_technologies:titan_ftp_server:3.10:*:*:*:*:*:*:*;cpe:2.3:a:south_river_technologies:titan_ftp_server:3.21:*:*:*:*:*:*:* CVE-2004-1965,0.0,,0.00265,"Multiple cross-site scripting (XSS) vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) redirect parameter to member.php, (2) to parameter to myhome.php (3) TID parameter to post.php, or (4) redirect parameter to index.php.",2004-04-25,Nuclei,cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.0_rc1:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.0_rc2:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.0_rc3:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.8:*:*:*:*:*:*:* CVE-2004-2074,0.0,,0.55562,Format string vulnerability in Dream FTP 1.02 allows local users to cause a denial of service (crash) via format string specifiers in the (1) PASS or (2) RETR commands.,2004-12-31,Metasploit,cpe:2.3:a:bolintech:dream_ftp_server:1.02:*:*:*:*:*:*:* CVE-2004-2086,0.0,,0.68835,Stack-based buffer overflow in results.stm for Sambar Server before the 6.0 production release allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a long query parameter.,2004-02-06,Metasploit,cpe:2.3:a:sambar:sambar_server:6.0:*:*:*:*:*:*:*;cpe:2.3:a:sambar:sambar_server:6.0:beta3:*:*:*:*:*:* CVE-2004-2111,0.0,,0.8831,Stack-based buffer overflow in the site chmod command in Serv-U FTP Server before 4.2 allows remote attackers to execute arbitrary code via a long filename.,2004-12-31,Metasploit,cpe:2.3:a:solarwinds:serv-u_file_server:*:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:4.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.0:*:*:*:*:*:*:* CVE-2004-2221,0.0,,0.77421,Buffer overflow in SoftCart.exe in Mercantec SoftCart 4.00b allows remote attackers to execute arbitrary code via a long parameter in an HTTP GET request.,2004-12-31,Metasploit,cpe:2.3:a:mercantec:softcart:4.00b:*:*:*:*:*:*:* CVE-2004-2271,0.0,,0.81176,Buffer overflow in MiniShare 1.4.1 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request.,2004-12-31,Metasploit,cpe:2.3:a:minishare:minimal_http_server:*:*:*:*:*:*:*:* CVE-2004-2416,0.0,,0.75321,Buffer overflow in the logging component of CCProxy allows remote attackers to execute arbitrary code via a long HTTP GET request.,2004-12-31,Metasploit,cpe:2.3:a:youngzsoft:ccproxy:6.0:*:*:*:*:*:*:* CVE-2004-2466,0.0,,0.72511,"chat.ghp in Easy Chat Server 1.2 allows remote attackers to cause a denial of service (server crash) via a long username parameter, possibly due to a buffer overflow. NOTE: it was later reported that 2.2 is also affected.",2004-12-31,Metasploit,cpe:2.3:a:efs_software:easy_chat_server:1.2:*:*:*:*:*:*:*;cpe:2.3:a:efs_software:easy_chat_server:2.2:*:*:*:*:*:*:* CVE-2004-2687,0.0,,0.8951,"distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks.",2004-12-31,Metasploit/Nuclei,cpe:2.3:a:apple:xcode:1.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* CVE-2004-2691,0.0,,0.77285,Unspecified vulnerability in 3Com SuperStack 3 4400 switches with firmware version before 3.31 allows remote attackers to cause a denial of service (device reset) via a crafted request to the web management interface. NOTE: the provenance of this information is unknown; details are obtained from third party reports.,2004-12-31,Metasploit,cpe:2.3:h:3com:3c17205-us:*:firmware_3.30:*:*:*:*:*:*;cpe:2.3:h:3com:3c17210-us:*:firmware_3.30:*:*:*:*:*:*;cpe:2.3:h:3com:superstack_3_switch:4400:firmware_3.30:*:*:*:*:*:*;cpe:2.3:h:3com:superstack_3_switch:4400_se:firmware_3.30:*:*:*:*:*:* CVE-2005-0043,0.0,,0.7991,Buffer overflow in Apple iTunes 4.7 allows remote attackers to execute arbitrary code via a long URL in (1) .m3u or (2) .pls playlist files.,2005-05-02,Metasploit,cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:* CVE-2005-0059,0.0,,0.89115,Buffer overflow in the Message Queuing component of Microsoft Windows 2000 and Windows XP SP1 allows remote attackers to execute arbitrary code via a crafted message.,2005-05-02,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:embedded:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:* CVE-2005-0116,0.0,,0.91763,"AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl.",2005-01-18,Metasploit,cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:* CVE-2005-0260,0.0,,0.81028,"Stack-based buffer overflow in the Discovery Service for BrightStor ARCserve Backup 11.1 and earlier allows remote attackers to execute arbitrary code via a long packet to UDP port 41524, which is not properly handled in a recvfrom call.",2005-05-02,Metasploit,cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:* CVE-2005-0277,0.0,,0.79303,"Buffer overflow in the FTP service in 3Com 3CDaemon 2.0 revision 10 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via (1) a long username in the USER command or (2) an FTP command that contains a long argument, such as cd, send, or ls.",2005-05-02,Metasploit,cpe:2.3:a:3com:3cdaemon:2.0:revision_10:*:*:*:*:*:* CVE-2005-0308,0.0,,0.78115,Buffer overflow in the wsprintf function in W32Dasm 8.93 and earlier allows remote attackers to execute arbitrary code via a large import or export function name.,2005-01-24,Metasploit,cpe:2.3:a:ursoftware:w32dasm:8.94:*:*:*:*:*:*:* CVE-2005-0353,0.0,,0.78339,Buffer overflow in the Sentinel LM (Lservnt) service in the Sentinel License Manager 7.2.0.2 allows remote attackers to execute arbitrary code by sending a large amount of data to UDP port 5093.,2005-05-02,Metasploit,cpe:2.3:a:safenet:sentinel_license_manager:7.2_.0.2:*:*:*:*:*:*:* CVE-2005-0455,0.0,,0.75424,"Stack-based buffer overflow in the CSmil1Parser::testAttributeFailed function in smlparse.cpp for RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1 allows remote attackers to execute arbitrary code via a .SMIL file with a large system-screen-size value.",2005-05-02,Metasploit,cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0_6.0.12.690:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0_beta:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1016_beta:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1053:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:8.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:* CVE-2005-0478,0.0,,0.65476,Multiple buffer overflows in TrackerCam 5.12 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) an HTTP request with a long User-Agent header or (2) a long argument to an arbitrary PHP script.,2005-03-30,Metasploit,cpe:2.3:a:trackercam:trackercam:*:*:*:*:*:*:*:* CVE-2005-0491,0.0,,0.84329,Stack-based buffer overflow in Knox Arkeia Server Backup 5.3.x allows remote attackers to execute arbitrary code via a long type 77 request.,2005-05-02,Metasploit,cpe:2.3:a:knox_software:arkeia_server_backup:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.0_rc1:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.0_rc2:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.0_rc3:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.0_rc4:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.4:*:*:*:*:*:*:* CVE-2005-0511,0.0,,0.82752,"misc.php for vBulletin 3.0.6 and earlier, when ""Add Template Name in HTML Comments"" is enabled, allows remote attackers to execute arbitrary PHP code via nested variables in the template parameter.",2005-02-21,Metasploit,cpe:2.3:a:jelsoft:vbulletin:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.0:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.0_beta_2:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.0_beta_3:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.9_can:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.0_beta_2:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.0_can4:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.0_rc4:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:* CVE-2005-0581,0.0,,0.72663,"Multiple buffer overflows in Computer Associates (CA) License Client and Server 0.1.0.15 allow remote attackers to execute arbitrary code via (1) certain long fields in the Checksum item in a GCR request, (2) a long IP address, hostname, or netmask values in a GCR request, (3) a long last parameter in a GETCONFIG packet, or (4) long values in a request with an invalid format.",2005-05-02,Metasploit,cpe:2.3:a:broadcom:license_software:0.1.0.15:*:*:*:*:*:*:* CVE-2005-0595,0.0,,0.78362,Buffer overflow in ext.dll in BadBlue 2.55 allows remote attackers to execute arbitrary code via a long mfcisapicommand parameter.,2005-05-02,Metasploit,cpe:2.3:a:working_resources_inc.:badblue:2.55:*:*:*:*:*:*:* CVE-2005-0684,0.0,,0.71813,"Multiple buffer overflows in the web tool for MySQL MaxDB before 7.5.00.26 allows remote attackers to execute arbitrary code via (1) an HTTP GET request with a long file parameter after a percent (""%"") sign or (2) a long Lock-Token string to the WebDAV functionality, which is not properly handled by the getLockTokenHeader function in WDVHandler_CommonUtils.c.",2005-04-25,Metasploit,cpe:2.3:a:mysql:maxdb:7.5.00.08:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.11:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.12:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.14:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.15:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.16:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.18:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.19:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.23:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00:*:*:*:*:*:*:* CVE-2005-0768,0.0,,0.75364,"Buffer overflow in the administration web server for GoodTech Telnet Server 4.0 and 5.0, and possibly all versions before 5.0.7, allows remote attackers to execute arbitrary code via a long string to port 2380.",2005-05-02,Metasploit,cpe:2.3:a:goodtech_systems:goodtech_telnet_server:4.0:*:windows_nt:*:*:*:*:*;cpe:2.3:a:goodtech_systems:goodtech_telnet_server:5.0:*:windows_nt:*:*:*:*:* CVE-2005-0771,0.0,,0.81368,VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106.,2005-06-23,Metasploit,cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:* CVE-2005-0773,0.0,,0.75181,"Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument.",2005-06-18,Metasploit,cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0.4019:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0.4170:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0.4172:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0.4174:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0.4202:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.3:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1127.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1151.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152.4:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1154:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.306:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.307:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691_sp2:*:*:*:*:*:*:* CVE-2005-0850,0.0,,0.01037,"FileZilla FTP server before 0.9.6 allows remote attackers to cause a denial of service via a request for a filename containing an MS-DOS device name such as CON, NUL, COM1, LPT1, and others.",2005-05-02,Nuclei,cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:* CVE-2005-0851,0.0,,0.01037,"FileZilla FTP server before 0.9.6, when using MODE Z (zlib compression), allows remote attackers to cause a denial of service (infinite loop) via certain file uploads or directory listings.",2005-05-02,Nuclei,cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:* CVE-2005-1009,0.0,,0.83516,"Multiple buffer overflows in BakBone NetVault 6.x and 7.x allow (1) remote attackers to execute arbitrary code via a modified computer name and length that leads to a heap-based buffer overflow, or (2) local users to execute arbitrary code via a long Name entry in the configure.cfg file.",2005-05-02,Metasploit,cpe:2.3:a:bakbone:netvault:7.0:*:*:*:*:*:*:*;cpe:2.3:a:bakbone:netvault:7.1:*:*:*:*:*:*:* CVE-2005-1018,0.0,,0.71743,Buffer overflow in the UniversalAgent for Computer Associates (CA) BrightStor ARCserve Backup allows remote authenticated users to cause a denial of service or execute arbitrary code via an agent request to TCP port 6050 with a large argument before the option field.,2005-05-02,Metasploit,cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:* CVE-2005-1099,0.0,,0.79026,"Multiple buffer overflows in the HandleChild function in server.c in Greylisting daemon (GLD) 1.3 and 1.4, when GLD is listening on a network interface, allow remote attackers to execute arbitrary code.",2005-04-12,Metasploit,cpe:2.3:a:salim_gasmi:gld:1.0:*:*:*:*:*:*:*;cpe:2.3:a:salim_gasmi:gld:1.1:*:*:*:*:*:*:*;cpe:2.3:a:salim_gasmi:gld:1.2:*:*:*:*:*:*:*;cpe:2.3:a:salim_gasmi:gld:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:salim_gasmi:gld:1.3:*:*:*:*:*:*:*;cpe:2.3:a:salim_gasmi:gld:1.4:*:*:*:*:*:*:* CVE-2005-1213,0.0,,0.83908,"Stack-based buffer overflow in the news reader for Microsoft Outlook Express (MSOE.DLL) 5.5 SP2, 6, and 6 SP1 allows remote malicious NNTP servers to execute arbitrary code via a LIST response with a long second field.",2005-06-14,Metasploit,cpe:2.3:a:microsoft:outlook_express:5.5:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook_express:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook_express:6.0:sp1:*:*:*:*:*:* CVE-2005-1272,0.0,,0.78265,Stack-based buffer overflow in the Backup Agent for Microsoft SQL Server in BrightStor ARCserve Backup Agent for SQL Server 11.0 allows remote attackers to execute arbitrary code via a long string sent to port (1) 6070 or (2) 6050.,2005-08-05,Metasploit,cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11.0:*:oracle:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:oracle:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:9.0_1:*:oracle:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.0:*:sap:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.0:*:sql:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:exchange:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:sap:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:sql:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11:*:exchange:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:9.0.1:*:exchange:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:9.0.1:*:sap:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:9.0.1:*:sql:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.0:*:oracle:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.0:*:sap:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.0:*:sql:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.5:*:oracle:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.5:*:sap:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.5:*:sql:*:*:*:*:* CVE-2005-1323,0.0,,0.78183,Buffer overflow in NetFtpd for NetTerm 5.1.1 and earlier allows remote attackers to execute arbitrary code via a long USER command.,2005-05-02,Metasploit,cpe:2.3:a:intersoft:netterm:4.2.2:*:*:*:*:*:*:* CVE-2005-1348,0.0,,0.91095,Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header.,2005-05-02,Metasploit,cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:* CVE-2005-1415,0.0,,0.70623,Buffer overflow in GlobalSCAPE Secure FTP Server 3.0.2 allows remote authenticated users to execute arbitrary code via a long FTP command.,2005-05-03,Metasploit,cpe:2.3:a:globalscape:secure_ftp_server:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:globalscape:secure_ftp_server:3.0:*:*:*:*:*:*:* CVE-2005-1543,0.0,,0.80369,"Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests.",2005-05-25,Metasploit,cpe:2.3:a:novell:zenworks:6.5:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_desktops:3.2:sp2:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_desktops:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_desktops:4.0:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_remote_management:*:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_server_management:6.5:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_servers:3.2:*:*:*:*:*:*:* CVE-2005-1790,0.0,,0.78794,"Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka ""Mismatched Document Object Model Objects Memory Corruption Vulnerability.""",2005-06-01,Metasploit,cpe:2.3:a:microsoft:internet_explorer:6.0.2800.1106:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0.2900.2180:*:*:*:*:*:*:* CVE-2005-1812,0.0,,0.82151,Multiple stack-based buffer overflows in FutureSoft TFTP Server Evaluation Version 1.0.0.1 allow remote attackers to execute arbitrary code via a long (1) filename or (2) transfer mode string in a Read Request (RRQ) or Write Request (WRQ) packet.,2005-06-01,Metasploit,cpe:2.3:a:futuresoft:tftp_server_2000:1.0.0.1:*:*:*:*:*:*:* CVE-2005-1815,0.0,,0.62867,Multiple buffer overflows in Hummingbird Connectivity inetD 10.0.0.1 and 9.0.0.4 allows attackers to cause a denial of service and possibly execute arbitrary code via (1) an FTP command with a long argument to FTPD (ftpdw.exe) or (2) a large amount of data to LPD (Lpdw.exe).,2005-06-01,Metasploit,cpe:2.3:a:hummingbird:connectivity:10.0:*:*:*:*:*:*:*;cpe:2.3:a:hummingbird:connectivity:7.1:*:*:*:*:*:*:*;cpe:2.3:a:hummingbird:connectivity:9.0:*:*:*:*:*:*:* CVE-2005-1921,0.0,,0.86898,"Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.",2005-07-05,Metasploit,cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*;cpe:2.3:a:gggeek:phpxmlrpc:*:*:*:*:*:*:*:*;cpe:2.3:a:php:xml_rpc:*:*:*:*:*:pear:*:*;cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* CVE-2005-1983,0.0,,0.87719,"Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by the Zotob (aka Mytob) worm.",2005-08-10,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:* CVE-2005-2086,0.0,,0.86512,PHP remote file inclusion vulnerability in viewtopic.php in phpBB 2.0.15 and earlier allows remote attackers to execute arbitrary PHP code.,2005-07-05,Metasploit,cpe:2.3:a:phpbb_group:phpbb:2.0.15:*:*:*:*:*:*:* CVE-2005-2120,0.0,,0.76202,"Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of ""\"" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.",2005-10-13,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:* CVE-2005-2265,0.0,,0.82043,"Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 allows remote attackers to cause a denial of service (access violation and crash), and possibly execute arbitrary code, by calling InstallVersion.compareTo with an object instead of a string.",2005-07-13,Metasploit,cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.5:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.5:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.5:rc2:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.6:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.6:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:rc2:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:* CVE-2005-2278,0.0,,0.85437,Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.,2005-07-18,Metasploit,cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:* CVE-2005-2287,0.0,,0.79843,"SoftiaCom wMailServer 1.0 and 2.0 allows remote attackers to cause a denial of service (application crash) via a large TCP packet with a leading space, possibly triggering a buffer overflow.",2005-07-18,Metasploit,cpe:2.3:a:softiacom:wmailserver:1.0:*:*:*:*:*:*:*;cpe:2.3:a:softiacom:wmailserver:2.0:*:*:*:*:*:*:* CVE-2005-2297,0.0,,0.71529,Stack-based buffer overflow in TreeAction.do in Sybase EAServer 4.2.5 through 5.2 allows remote authenticated users to execute arbitrary code via a large javascript parameter.,2005-07-19,Metasploit,cpe:2.3:a:sybase:easerver:4.2.5:*:*:*:*:*:*:*;cpe:2.3:a:sybase:easerver:5.0:*:*:*:*:*:*:*;cpe:2.3:a:sybase:easerver:5.1:*:*:*:*:*:*:*;cpe:2.3:a:sybase:easerver:5.2:*:*:*:*:*:*:* CVE-2005-2373,0.0,,0.37407,"Buffer overflow in SlimFTPd 3.15 and 3.16 allows remote authenticated users to execute arbitrary code via a long directory name to (1) LIST, (2) DELE or (3) RNFR commands.",2005-07-26,Metasploit,cpe:2.3:a:whitsoft_development:slimftpd:3.15:*:*:*:*:*:*:*;cpe:2.3:a:whitsoft_development:slimftpd:3.16:*:*:*:*:*:*:* CVE-2005-2428,0.0,,0.06321,"Lotus Domino R5 and R6 WebMail, with ""Generate HTML for all fields"" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.",2005-08-03,Nuclei,cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:6.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:6.5:*:*:*:*:*:*:* CVE-2005-2535,0.0,,0.82941,"Buffer overflow in the Discovery Service in BrightStor ARCserve Backup 9.0 through 11.1 allows remote attackers to execute arbitrary commands via a large packet to TCP port 41523, a different vulnerability than CVE-2005-0260.",2005-08-10,Metasploit,cpe:2.3:a:broadcom:arcserve_backup_2000:r16.5:*:windows:ja:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:aix:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:linux:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:macintosh:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:netware:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:solaris:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:tru64:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:7.0:*:linux:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:ja:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:netware:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup_hp:11.1:*:hp:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:aix:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:hpux:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:mainframe_linux:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:aix:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:hp:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:solaris:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:tru64:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:windows:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10:*:solaris:*:*:*:*:* CVE-2005-2551,0.0,,0.71755,Buffer overflow in dhost.exe in iMonitor for Novell eDirectory 8.7.3 on Windows allows attackers to cause a denial of service (crash) and obtain access to files via unknown vectors.,2005-08-12,Metasploit,cpe:2.3:a:novell:edirectory:8.7.3:*:*:*:*:*:*:* CVE-2005-2611,0.0,,0.78897,"VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.",2005-08-17,Metasploit,cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4019:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4170:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4172:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4174:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4202:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.3:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1127_.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1151_.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152_.4:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1154:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1156:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.306:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.307:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5520:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_8.6:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691_sp2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:unix_linux_server:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp3:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp4:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp5:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp6:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp7:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp8:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp3:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp4:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp5:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp6:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp7:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp8:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp3:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp4:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp5:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp3:*:*:*:*:*:*:* CVE-2005-2612,0.0,,0.73416,Direct code injection vulnerability in WordPress 1.5.1.3 and earlier allows remote attackers to execute arbitrary PHP code via the cache_lastpostdate[server] cookie.,2005-08-17,Metasploit,cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:* CVE-2005-2668,0.0,,0.82851,"Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors.",2005-08-23,Metasploit,cpe:2.3:a:broadcom:advantage_data_transport:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:adviseit:2.4:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_portal:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_san_manager:1.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp2:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_san_manager:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:cleverpath_aion:10.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:cleverpath_ecm:3.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:cleverpath_olap:5.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_admin:8.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_admin:8.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:messaging:1.11:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:messaging:1.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:messaging:1.7:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_asset_management:3.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_asset_management:3.2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp2:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_data_transport_option:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_jasmine:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_management_portal:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_management_portal:3.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_nsm_wireless_network_management_option:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_performance_management:2.4:sp3:openvms:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_service_level_management:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_service_level_management:3.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_software_delivery:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp2:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_software_delivery:4.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_tng:2.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_tng:2.2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_tng:2.4.2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_tng:2.4:*:*:*:*:*:*:*;cpe:2.3:a:ca:etrust_admin:2.1:*:*:*:*:*:*:*;cpe:2.3:a:ca:etrust_admin:2.4:*:*:*:*:*:*:*;cpe:2.3:a:ca:etrust_admin:2.7:*:*:*:*:*:*:*;cpe:2.3:a:ca:etrust_admin:2.9:*:*:*:*:*:*:*;cpe:2.3:a:ca:unicenter_asset_management:4.0:sp1:*:*:*:*:*:*;cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp1:*:*:*:*:*:*;cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp2:*:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:3.5:*:websphere_mq:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:4.0:*:lotus_notes_domino:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:4.0:*:microsoft_exchange:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:4.1:*:microsoft_exchange:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:5.0.1:*:web_servers:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:5.0:*:web_servers:*:*:*:*:*;cpe:2.3:a:ca:unicenter_software_delivery:4.0:sp1:*:*:*:*:*:*;cpe:2.3:a:ca:unicenter_tng:2.2:*:*:ja:*:*:*:* CVE-2005-2733,0.0,,0.80569,"upload_img_cgi.php in Simple PHP Blog (SPHPBlog) does not properly restrict file extensions of uploaded files, which could allow remote attackers to execute arbitrary code.",2005-08-30,Metasploit,cpe:2.3:a:alexander_palmo:simple_php_blog:0.4.0:*:*:*:*:*:*:* CVE-2005-2773,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.89823,"HP OpenView Network Node Manager 6.2 through 7.50 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) node parameter to connectedNodes.ovpl, (2) cdpView.ovpl, (3) freeIPaddrs.ovpl, and (4) ecscmg.ovpl.",2005-09-02,Metasploit/CISA,cpe:2.3:a:hp:openview_network_node_manager:*:*:*:*:*:*:*:* CVE-2005-2799,0.0,,0.85392,"Buffer overflow in apply.cgi in Linksys WRT54G 3.01.03, 3.03.6, and possibly other versions before 4.20.7, allows remote attackers to execute arbitrary code via a long HTTP POST request.",2005-09-15,Metasploit,cpe:2.3:h:linksys:wrt54g:3.01.3:*:*:*:*:*:*:*;cpe:2.3:h:linksys:wrt54g:3.03.6:*:*:*:*:*:*:* CVE-2005-2847,0.0,,0.87047,img.pl in Barracuda Spam Firewall running firmware 3.1.16 and 3.1.17 allows remote attackers to execute arbitrary commands via shell metacharacters in the f parameter.,2005-09-08,Metasploit,cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.1.16:*:*:*:*:*:*:*;cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.1.17:*:*:*:*:*:*:* CVE-2005-2852,0.0,,0.60379,"Unknown vulnerability in CIFS.NLM in Novell Netware 6.5 SP2 and SP3, 5.1, and 6.0 allows remote attackers to cause a denial of service (ABEND) via an incorrect password length, as exploited by the ""worm.rbot.ccc"" worm.",2005-09-08,Metasploit,cpe:2.3:o:novell:netware:5.1:*:*:*:*:*:*:*;cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*;cpe:2.3:o:novell:netware:6.5:sp2:*:*:*:*:*:*;cpe:2.3:o:novell:netware:6.5:sp3:*:*:*:*:*:* CVE-2005-2877,0.0,,0.81668,"The history (revision control) function in TWiki 02-Sep-2004 and earlier allows remote attackers to execute arbitrary code via shell metacharacters, as demonstrated via the rev parameter to TWikiUsers.",2005-09-16,Metasploit,cpe:2.3:a:twiki:twiki:2000-12-01:*:*:*:*:*:*:*;cpe:2.3:a:twiki:twiki:2001-12-01:*:*:*:*:*:*:*;cpe:2.3:a:twiki:twiki:2003-02-01:*:*:*:*:*:*:*;cpe:2.3:a:twiki:twiki:2004-09-01:*:*:*:*:*:*:*;cpe:2.3:a:twiki:twiki:2004-09-02:*:*:*:*:*:*:* CVE-2005-3155,0.0,,0.86484,Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote attackers to execute arbitrary code.,2005-10-05,Metasploit,cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:* CVE-2005-3190,0.0,,0.78665,"Buffer overflow in Computer Associates (CA) iGateway 3.0 and 4.0 before 4.0.050623, when running in debug mode, allows remote attackers to execute arbitrary code via HTTP GET requests.",2005-10-13,Metasploit,cpe:2.3:a:broadcom:igateway:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:igateway:4.0:*:*:*:*:*:*:* CVE-2005-3252,0.0,,0.83516,Stack-based buffer overflow in the Back Orifice (BO) preprocessor for Snort before 2.4.3 allows remote attackers to execute arbitrary code via a crafted UDP packet.,2005-10-18,Metasploit,cpe:2.3:a:sourcefire:snort:2.4.0:*:*:*:*:*:*:*;cpe:2.3:a:sourcefire:snort:2.4.1:*:*:*:*:*:*:*;cpe:2.3:a:sourcefire:snort:2.4.2:*:*:*:*:*:*:* CVE-2005-3314,0.0,,0.83419,"Stack-based buffer overflow in the IMAP daemon in Novell Netmail 3.5.2 allows remote attackers to execute arbitrary code via ""long verb arguments.""",2005-11-18,Metasploit,cpe:2.3:a:novell:netmail:3.5.2:e-ftfl:*:*:*:*:*:* CVE-2005-3344,0.0,,0.1015,"The default installation of Horde 3.0.4 contains an administrative account with a blank password, which allows remote attackers to gain access.",2005-11-16,Nuclei,cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:* CVE-2005-3398,0.0,,0.39542,"The default configuration of the web server for the Solaris Management Console (SMC) in Solaris 8, 9, and 10 enables the HTTP TRACE method, which could allow remote attackers to obtain sensitive information such as cookies and authentication data from HTTP headers.",2005-11-01,Metasploit,cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:* CVE-2005-3498,0.0,,0.51951,"IBM WebSphere Application Server 5.0.x before 5.02.15, 5.1.x before 5.1.1.8, and 6.x before fixpack V6.0.2.5, when session trace is enabled, records a full URL including the queryString in the trace logs when an application encodes a URL, which could allow attackers to obtain sensitive information.",2005-11-04,Metasploit,cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:* CVE-2005-3589,0.0,,0.67665,Buffer overflow in FileZilla Server Terminal 0.9.4d may allow remote attackers to cause a denial of service (terminal crash) via a long USER ftp command.,2005-11-16,Metasploit,cpe:2.3:a:filezilla:filezilla_server_terminal:0.9.4d:*:*:*:*:*:*:* CVE-2005-3634,0.0,,0.0214,frameset.htm in the BSP runtime in SAP Web Application Server (WAS) 6.10 through 7.00 allows remote attackers to log users out and redirect them to arbitrary web sites via a close command in the sap-sessioncmd parameter and a URL in the sap-exiturl parameter.,2005-11-16,Nuclei,cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_web_application_server:6.20:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_web_application_server:6.40:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_web_application_server:7.0:*:*:*:*:*:*:* CVE-2005-3683,0.0,,0.84662,"Stack-based buffer overflow in freeFTPd before 1.0.9 with Logging enabled, allows remote attackers to cause a denial of service (application crash), and possibly execute arbitrary code, via a long USER command.",2005-11-19,Metasploit,cpe:2.3:a:freeftpd:freeftpd:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0:*:*:*:*:*:*:* CVE-2005-3757,0.0,,0.75746,"The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.",2005-11-22,Metasploit,cpe:2.3:h:google:mini_search_appliance:*:*:*:*:*:*:*:*;cpe:2.3:h:google:search_appliance:*:*:*:*:*:*:*:* CVE-2005-4085,0.0,,0.77161,Buffer overflow in BlueCoat (a) WinProxy before 6.1a and (b) the web console access functionality in ProxyAV before 2.4.2.3 allows remote attackers to execute arbitrary code via a long Host: header.,2005-12-31,Metasploit,cpe:2.3:a:bluecoat:webproxy:4.0:r1a:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1b:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1c:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1e:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1f:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1h:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1k:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1m:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1n:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1p:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:5.0:r1a:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:5.0:r1b:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:5.0:r1c:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:5.1:r1a:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:5.1:r1d:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:5.1:r1e:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:5.2:r1a:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:6.0:r1a:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:6.0:r1c:*:*:*:*:*:*;cpe:2.3:h:bluecoat:proxyav:*:*:*:*:*:*:*:* CVE-2005-4145,0.0,,0.6483,"The MSDE version of Lyris ListManager 5.0 through 8.9b configures the sa account in the database to use a password with a small search space (""lyris"" and up to 5 digits, possibly from the process ID), which allows remote attackers to gain access via a brute force attack.",2005-12-10,Metasploit,cpe:2.3:a:lyris_technologies_inc:listmanager:5.0:*:*:*:*:*:*:*;cpe:2.3:a:lyris_technologies_inc:listmanager:6.0:*:*:*:*:*:*:*;cpe:2.3:a:lyris_technologies_inc:listmanager:7.0:*:*:*:*:*:*:*;cpe:2.3:a:lyris_technologies_inc:listmanager:8.0:*:*:*:*:*:*:*;cpe:2.3:a:lyris_technologies_inc:listmanager:8.8a:*:*:*:*:*:*:* CVE-2005-4267,0.0,,0.76892,"Stack-based buffer overflow in Qualcomm WorldMail 3.0 allows remote attackers to execute arbitrary code via a long IMAP command that ends with a ""}"" character, as demonstrated using long (1) LIST, (2) LSUB, (3) SEARCH TEXT, (4) STATUS INBOX, (5) AUTHENTICATE, (6) FETCH, (7) SELECT, and (8) COPY commands.",2005-12-21,Metasploit,cpe:2.3:a:qualcomm:worldmail:3.0:*:*:*:*:*:*:* CVE-2005-4385,0.0,,0.00231,Cross-site scripting (XSS) vulnerability in search.htm in Cofax 2.0 RC3 and earlier allows remote attackers to inject arbitrary web script or HTML via the searchstring parameter.,2005-12-20,Nuclei,cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*;cpe:2.3:a:cofax:cofax:1.9.9d:*:*:*:*:*:*:*;cpe:2.3:a:cofax:cofax:2.0_rc1:*:*:*:*:*:*:*;cpe:2.3:a:cofax:cofax:2.0_rc2:*:*:*:*:*:*:*;cpe:2.3:a:cofax:cofax:2.0_rc3:*:*:*:*:*:*:* CVE-2005-4411,0.0,,0.8155,Buffer overflow in Mercury Mail Transport System 4.01b allows remote attackers to execute arbitrary code via a long request to TCP port 105.,2005-12-20,Metasploit,cpe:2.3:a:david_harris:mercury_mail_transport_system:4.01b:*:*:*:*:*:*:* CVE-2005-4560,0.0,,0.90524,"The Windows Graphical Device Interface library (GDI32.DLL) in Microsoft Windows allows remote attackers to execute arbitrary code via a Windows Metafile (WMF) format image with a crafted SETABORTPROC GDI Escape function call, related to the Windows Picture and Fax Viewer (SHIMGVW.DLL), a different vulnerability than CVE-2005-2123 and CVE-2005-2124, and as originally discovered in the wild on unionseek.com.",2005-12-28,Metasploit,cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:* CVE-2005-4734,0.0,,0.7409,Stack-based buffer overflow in IISWebAgentIF.dll in RSA Authentication Agent for Web (aka SecurID Web Agent) 5.2 and 5.3 for IIS allows remote attackers to execute arbitrary code via a long url parameter in the Redirect method.,2005-12-31,Metasploit,cpe:2.3:a:rsa:authentication_agent_for_web:5.2:*:*:*:*:*:*:*;cpe:2.3:a:rsa:authentication_agent_for_web:5.3:*:*:*:*:*:*:* CVE-2005-4797,0.0,,0.73269,"Directory traversal vulnerability in printd line printer daemon (lpd) in Solaris 7 through 10 allows remote attackers to delete arbitrary files via "".."" sequences in an ""Unlink data file"" command.",2005-12-31,Metasploit,cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:* CVE-2005-4832,0.0,,0.52586,"SQL injection vulnerability in the Oracle Database Server 10g allows remote authenticated users to execute arbitrary SQL commands with elevated privileges via the SUBSCRIPTION_NAME parameter in the (1) SYS.DBMS_CDC_SUBSCRIBE and (2) SYS.DBMS_CDC_ISUBSCRIBE packages, a different vector than CVE-2005-1197.",2005-12-31,Metasploit,cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:enterprise_10.2.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:enterprise_9.0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:enterprise_9.0.4_.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_10.1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_10.1.0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_10.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_10.1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_10.10.3.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_10.1_.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_10.2.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_9.0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_9.0.4_.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.1.0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.1_.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.2.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_9.0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_9.0.4_.0:*:*:*:*:*:*:* CVE-2006-0003,0.0,,0.91596,"Unspecified vulnerability in the RDS.Dataspace ActiveX control, which is contained in ActiveX Data Objects (ADO) and distributed in Microsoft Data Access Components (MDAC) 2.7 and 2.8, allows remote attackers to execute arbitrary code via unknown attack vectors.",2006-04-12,Metasploit,cpe:2.3:a:microsoft:data_access_components:2.5:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.7:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.8:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.8:sp2:*:*:*:*:*:* CVE-2006-0027,0.0,,0.87053,Unspecified vulnerability in Microsoft Exchange allows remote attackers to execute arbitrary code via e-mail messages with crafted (1) vCal or (2) iCal Calendar properties.,2006-05-10,Metasploit,cpe:2.3:a:microsoft:exchange_server:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2003:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:* CVE-2006-0295,0.0,,0.82372,"Mozilla Firefox 1.5, Thunderbird 1.5 if Javascript is enabled in mail, and SeaMonkey before 1.0 might allow remote attackers to execute arbitrary code via the QueryInterface method of the built-in Location and Navigator objects, which leads to memory corruption.",2006-02-02,Metasploit,cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:* CVE-2006-0395,0.0,,0.64008,"The Download Validation in Mail in Mac OS X 10.4 does not properly recognize attachment file types to warn a user of an unsafe type, which allows user-assisted remote attackers to execute arbitrary code via crafted file types.",2006-08-05,Metasploit,cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:* CVE-2006-0441,0.0,,0.81125,"Stack-based buffer overflow in Sami FTP Server 2.0.1 allows remote attackers to execute arbitrary code via a long USER command, which triggers the overflow when the log is viewed.",2006-01-26,Metasploit,cpe:2.3:a:karjasoft:sami_ftp_server:2.0.1:*:*:*:*:*:*:* CVE-2006-0460,0.0,,0.82218,Multiple buffer overflows in BomberClone before 0.11.6.2 allow remote attackers to execute arbitrary code via long error messages.,2006-02-17,Metasploit,cpe:2.3:a:bomberclone:bomberclone:0.10.0:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.11.3:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.11.4:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.11.5:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.11.6:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.1:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.2:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.3:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.4:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.5:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.6:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.7:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.8:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.9.5:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.9.6:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.9.7:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.9.8:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.9.9:*:*:*:*:*:*:* CVE-2006-0476,0.0,,0.88573,Buffer overflow in Nullsoft Winamp 5.12 allows remote attackers to execute arbitrary code via a playlist (pls) file with a long file name (File1 field).,2006-01-31,Metasploit,cpe:2.3:a:nullsoft:winamp:5.12:*:*:*:*:*:*:* CVE-2006-0564,0.0,,0.72006,"Stack-based buffer overflow in Microsoft HTML Help Workshop 4.74.8702.0, and possibly earlier versions, and as included in the Microsoft HTML Help 1.4 SDK, allows context-dependent attackers to execute arbitrary code via a .hhp file with a long Contents file field.",2006-02-06,Metasploit,cpe:2.3:a:microsoft:html_help:1.4:*:sdk:*:*:*:*:*;cpe:2.3:a:microsoft:html_help_workshop:4.74.8702.0:*:*:*:*:*:*:* CVE-2006-0848,0.0,,0.83055,"The ""Open 'safe' files after downloading"" option in Safari on Apple Mac OS X allows remote user-assisted attackers to execute arbitrary commands by tricking a user into downloading a __MACOSX folder that contains metadata (resource fork) that invokes the Terminal, which automatically interprets the script using bash, as demonstrated using a ZIP file that contains a script with a safe file extension.",2006-02-22,Metasploit,cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:* CVE-2006-0900,0.0,,0.79325,"nfsd in FreeBSD 6.0 kernel allows remote attackers to cause a denial of service via a crafted NFS mount request, as demonstrated by the ProtoVer NFS test suite.",2006-02-27,Metasploit,cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:* CVE-2006-0987,0.0,,0.27831,"The default configuration of ISC BIND before 9.4.1-P1, when configured as a caching name server, allows recursive queries and provides additional delegation information to arbitrary IP addresses, which allows remote attackers to cause a denial of service (traffic amplification) via DNS queries with spoofed source IP addresses.",2006-03-03,Metasploit,cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:* CVE-2006-0988,0.0,,0.68044,"The default configuration of the DNS Server service on Windows Server 2003 and Windows 2000, and the Microsoft DNS Server service on Windows NT 4.0, allows recursive queries and provides additional delegation information to arbitrary IP addresses, which allows remote attackers to cause a denial of service (traffic amplification) via DNS queries with spoofed source IP addresses.",2006-03-03,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:* CVE-2006-0992,0.0,,0.88808,"Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2006-0092. This is the correct identifier.",2006-04-14,Metasploit,cpe:2.3:a:novell:groupwise_messenger:2.0:*:*:*:*:*:*:* CVE-2006-1016,0.0,,0.76517,"Buffer overflow in the IsComponentInstalled method in Internet Explorer 6.0, when used on Windows 2000 before SP4 or Windows XP before SP1, allows remote attackers to execute arbitrary code via JavaScript that calls IsComponentInstalled with a long first argument.",2006-03-07,Metasploit,cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:* CVE-2006-1148,0.0,,0.81711,"Multiple stack-based buffer overflows in the procConnectArgs function in servmgr.cpp in PeerCast before 0.1217 allow remote attackers to execute arbitrary code via an HTTP GET request with a long (1) parameter name or (2) value in a URL, which triggers the overflow in the nextCGIarg function in servhs.cpp.",2006-03-10,Metasploit,cpe:2.3:a:peercast:peercast:*:*:*:*:*:*:*:*;cpe:2.3:a:peercast:peercast:0.1211:*:*:*:*:*:*:*;cpe:2.3:a:peercast:peercast:0.1212:*:*:*:*:*:*:* CVE-2006-1255,0.0,,0.86928,"Stack-based buffer overflow in the IMAP service in Mercur Messaging 5.0 SP3 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long string to the (1) LOGIN or (2) SELECT command, a different set of attack vectors and possibly a different vulnerability than CVE-2003-1177.",2006-03-19,Metasploit,cpe:2.3:a:mercur:mercur_messaging:*:*:*:*:*:*:*:* CVE-2006-1359,0.0,,0.87602,"Microsoft Internet Explorer 6 and 7 Beta 2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a certain createTextRange call on a checkbox object, which results in a dereference of an invalid table pointer.",2006-03-23,Metasploit,cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:ie:7.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:* CVE-2006-1547,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.13582,"ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils.",2006-03-30,CISA,cpe:2.3:a:apache:commons_beanutils:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* CVE-2006-1551,0.0,,0.72147,Eval injection vulnerability in pajax_call_dispatcher.php in PAJAX 0.5.1 and earlier allows remote attackers to execute arbitrary code via the (1) $method and (2) $args parameters.,2006-04-13,Metasploit,cpe:2.3:a:georges_auberger:pajax:0.5.0:*:*:*:*:*:*:*;cpe:2.3:a:georges_auberger:pajax:0.5.1:*:*:*:*:*:*:* CVE-2006-1652,0.0,,0.85939,"Multiple buffer overflows in (a) UltraVNC (aka Ultr@VNC) 1.0.1 and earlier and (b) tabbed_viewer 1.29 (1) allow user-assisted remote attackers to execute arbitrary code via a malicious server that sends a long string to a client that connects on TCP port 5900, which triggers an overflow in Log::ReallyPrint; and (2) allow remote attackers to cause a denial of service (server crash) via a long HTTP GET request to TCP port 5800, which triggers an overflow in VNCLog::ReallyPrint.",2006-04-06,Metasploit,cpe:2.3:a:ultravnc:tabbed_viewer:1.29:*:*:*:*:*:*:*;cpe:2.3:a:ultravnc:vnc_viewer:1.0.1:*:*:*:*:*:*:* CVE-2006-1681,0.0,,0.00299,"Cross-site scripting (XSS) vulnerability in Cherokee HTTPD 0.5 and earlier allows remote attackers to inject arbitrary web script or HTML via a malformed request that generates an HTTP 400 error, which is not properly handled when the error message is generated.",2006-04-11,Nuclei,cpe:2.3:a:cherokee:cherokee_httpd:0.1.5:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.1.6:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.2.5:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.2.6:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.2.7:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.2:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.4.17:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.4.6:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.4.7:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.4.8:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.4.9:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.5:*:*:*:*:*:*:* CVE-2006-2081,0.0,,0.58402,"Oracle Database Server 10g Release 2 allows local users to execute arbitrary SQL queries via the GET_DOMAIN_INDEX_METADATA function in the DBMS_EXPORT_EXTENSION package. NOTE: this issue was originally linked to DB05 (CVE-2006-1870), but a reliable third party has claimed that it is not the same issue. Based on details of the problem, the primary issue appears to be insecure privileges that facilitate the introduction of SQL in a way that is not related to special characters, so this is not ""SQL injection"" per se.",2006-04-27,Metasploit,cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:* CVE-2006-2086,0.0,,0.74928,"Buffer overflow in JuniperSetupDLL.dll, loaded from JuniperSetup.ocx by the Juniper SSL-VPN Client when accessing a Juniper NetScreen IVE device running IVE OS before 4.2r8.1, 5.0 before 5.0r6.1, 5.1 before 5.1r8, 5.2 before 5.2r4.1, or 5.3 before 5.3r2.1, allows remote attackers to execute arbitrary code via a long argument in the ProductName parameter.",2006-04-29,Metasploit,cpe:2.3:a:juniper:junipersetup_control:*:*:*:*:*:*:*:* CVE-2006-2173,0.0,,0.04601,"Buffer overflow in FileZilla FTP Server 2.2.22 allows remote authenticated attackers to cause a denial of service and possibly execute arbitrary code via a long (1) PORT or (2) PASS followed by the MLSD command, or (2) the remote server interface, as demonstrated by the Infigo FTPStress Fuzzer.",2006-05-04,Nuclei,cpe:2.3:a:filezilla:filezilla_server:*:*:*:*:*:*:*:* CVE-2006-2212,0.0,,0.71543,Buffer overflow in KarjaSoft Sami FTP Server 2.0.2 and earlier allows remote attackers to execute arbitrary code via a long (1) USER or (2) PASS command.,2006-05-05,Metasploit,cpe:2.3:a:karjasoft:sami_ftp_server:2.0.2:*:*:*:*:*:*:* CVE-2006-2237,0.0,,0.90596,"The web interface for AWStats 6.4 and 6.5, when statistics updates are enabled, allows remote attackers to execute arbitrary code via shell metacharacters in the migrate parameter.",2006-05-08,Metasploit,cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:* CVE-2006-2369,0.0,,0.91145,"RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as ""Type 1 - None"", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.",2006-05-15,Metasploit,cpe:2.3:a:vnc:realvnc:4.1.1:*:*:*:*:*:*:* CVE-2006-2370,0.0,,0.81642,"Buffer overflow in the Routing and Remote Access service (RRAS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote unauthenticated or authenticated attackers to execute arbitrary code via certain crafted ""RPC related requests,"" aka the ""RRAS Memory Corruption Vulnerability.""",2006-06-13,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition_64-bit:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition_64-bit:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:enterprise:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:* CVE-2006-2407,0.0,,0.79892,"Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string.",2006-05-16,Metasploit,cpe:2.3:a:freeftpd:freeftpd:1.0.10:*:*:*:*:*:*:*;cpe:2.3:a:freesshd:freesshd:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:weonlydo:wodsshserver:1.2.7:*:*:*:*:*:*:*;cpe:2.3:a:weonlydo:wodsshserver:1.3.3_demo:*:*:*:*:*:*:* CVE-2006-2447,0.0,,0.744,"SpamAssassin before 3.1.3, when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username.",2006-06-06,Metasploit,cpe:2.3:a:apache:spamassassin:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:spamassassin:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:spamassassin:3.1.2:*:*:*:*:*:*:* CVE-2006-2492,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.75259,"Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object pointer, as originally reported by ISC on 20060519 for a zero-day attack.",2006-05-20,CISA,cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:works_suite:*:*:*:*:*:*:*:* CVE-2006-2502,0.0,,0.7701,"Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.",2006-05-22,Metasploit,cpe:2.3:a:cyrus:imapd:2.3.2:*:*:*:*:*:*:* CVE-2006-2630,0.0,,0.78935,Stack-based buffer overflow in Symantec Antivirus 10.1 and Client Security 3.1 allows remote attackers to execute arbitrary code via unknown attack vectors.,2006-05-27,Metasploit,cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec:norton_antivirus:10.0.2.2010:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:norton_antivirus:10.0.2.2020:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:norton_antivirus:10.0.2.2021:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:norton_antivirus:10.1.400:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:norton_antivirus:10.1:*:corporate:*:*:*:*:* CVE-2006-2685,0.0,,0.85605,"PHP remote file inclusion vulnerability in Basic Analysis and Security Engine (BASE) 1.2.4 and earlier, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via a URL in the BASE_path parameter to (1) base_qry_common.php, (2) base_stat_common.php, and (3) includes/base_include.inc.php.",2006-05-31,Metasploit,cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.4:*:*:*:*:*:*:* CVE-2006-2842,0.0,,0.0094,"PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable",2006-06-06,Nuclei,cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_r3:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.4_rc1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_rc1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:* CVE-2006-2926,0.0,,0.84815,Stack-based buffer overflow in the WWW Proxy Server of Qbik WinGate 6.1.1.1077 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long URL HTTP request.,2006-06-09,Metasploit,cpe:2.3:a:qbik:wingate:6.1.1.1077:*:*:*:*:*:*:* CVE-2006-2961,0.0,,0.83469,Stack-based buffer overflow in CesarFTP 0.99g and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long MKD command. NOTE: the provenance of this information is unknown; the details are obtained from third party information.,2006-06-12,Metasploit,cpe:2.3:a:aclogic:cesarftp:*:*:*:*:*:*:*:* CVE-2006-3252,0.0,,0.80048,Buffer overflow in the Online Registration Facility for Algorithmic Research PrivateWire VPN software up to 3.7 allows remote attackers to execute arbitrary code via a long GET request.,2006-06-27,Metasploit,cpe:2.3:a:algorithmic_research:privatewire_gateway:3.7:*:*:*:*:*:*:* CVE-2006-3392,0.0,,0.67141,"Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using ""..%01"" sequences, which bypass the removal of ""../"" sequences before bytes such as ""%01"" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.",2006-07-06,Metasploit,cpe:2.3:a:usermin:usermin:*:*:*:*:*:*:*:*;cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:* CVE-2006-3439,0.0,,0.88792,"Buffer overflow in the Server Service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers, including anonymous users, to execute arbitrary code via a crafted RPC message, a different vulnerability than CVE-2006-1314.",2006-08-09,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:* CVE-2006-3459,0.0,,0.69306,"Multiple stack-based buffer overflows in the TIFF library (libtiff) before 3.8.2, as used in Adobe Reader 9.3.0 and other products, allow context-dependent attackers to execute arbitrary code or cause a denial of service via unspecified vectors, including a large tdir_count value in the TIFFFetchShortPair function in tif_dirread.c.",2006-08-03,Metasploit,cpe:2.3:a:adobe:acrobat_reader:9.3.0:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta18:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta24:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta28:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta29:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta31:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta32:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta34:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta35:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta36:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta37:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.6:beta:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.7:alpha2:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.7:alpha3:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.7:alpha4:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.7:alpha:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.7:beta:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.6.0:beta2:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.6.0:beta:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.0:alpha:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.0:beta2:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.0:beta:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.2:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.3:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.4:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.8.0:*:*:*:*:*:*:* CVE-2006-3524,0.0,,0.83969,Buffer overflow in SIPfoundry sipXtapi released before 20060324 allows remote attackers to execute arbitrary code via a long CSeq field value in an INVITE message.,2006-07-12,Metasploit,cpe:2.3:a:sipfoundry:sipxtapi:*:*:*:*:*:*:*:* CVE-2006-3677,0.0,,0.81109,"Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.",2006-07-27,Metasploit,cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:* CVE-2006-3726,0.0,,0.80852,"Buffer overflow in FileCOPA FTP Server before 1.01 released on 18th July 2006, allows remote authenticated attackers to execute arbitrary code via a long argument to the LIST command.",2006-07-21,Metasploit,cpe:2.3:a:intervations:filecopa:*:*:*:*:*:*:*:* CVE-2006-3730,0.0,,0.88442,"Integer overflow in Microsoft Internet Explorer 6 on Windows XP SP2 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a 0x7fffffff argument to the setSlice method on a WebViewFolderIcon ActiveX object, which leads to an invalid memory copy.",2006-07-21,Metasploit,cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:* CVE-2006-3747,0.0,,0.92663,"Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.",2006-07-28,Metasploit,cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* CVE-2006-3838,0.0,,0.7153,"Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) before 2.5.0, as used in products including (a) Sidewinder, (b) iPolicy Security Manager, (c) Astaro Report Manager, (d) Fortinet FortiReporter, (e) Top Layer Network Security Analyzer, and possibly other products, allow remote attackers to execute arbitrary code via long (1) DELTAINTERVAL, (2) LOGFOLDER, (3) DELETELOGS, (4) FWASERVER, (5) SYSLOGPUBLICIP, (6) GETFWAIMPORTLOG, (7) GETFWADELTA, (8) DELETERDEPDEVICE, (9) COMPRESSRAWLOGFILE, (10) GETSYSLOGFIREWALLS, (11) ADDPOLICY, and (12) EDITPOLICY commands to the Syslog daemon (syslogserver.exe); (13) GUIADDDEVICE, (14) ADDDEVICE, and (15) DELETEDEVICE commands to the Topology server (Topology.exe); the (15) LICMGR_ADDLICENSE command to the License Manager (EnterpriseSecurityAnalyzer.exe); the (16) TRACE and (17) QUERYMONITOR commands to the Monitoring agent (Monitoring.exe); and possibly other vectors related to the Syslog daemon (syslogserver.exe).",2006-07-27,Metasploit,cpe:2.3:a:eiqnetworks:enterprise_security_analyzer:*:*:*:*:*:*:*:* CVE-2006-3942,0.0,,0.87271,"The server driver (srv.sys) in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service (system crash) via an SMB_COM_TRANSACTION SMB message that contains a string without null character termination, which leads to a NULL dereference in the ExecuteTransaction function, possibly related to an ""SMB PIPE,"" aka the ""Mailslot DOS"" vulnerability. NOTE: the name ""Mailslot DOS"" was derived from incomplete initial research; the vulnerability is not associated with a mailslot.",2006-07-31,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:* CVE-2006-3952,0.0,,0.87004,Stack-based buffer overflow in EFS Software Easy File Sharing FTP Server 2.0 allows remote attackers to execute arbitrary code via a long argument to the PASS command. NOTE: the provenance of this information is unknown; the details are obtained from third party information.,2006-08-01,Metasploit,cpe:2.3:a:efs_software:efs_ftp_server:2.0:*:*:*:*:*:*:* CVE-2006-3961,0.0,,0.70793,"Buffer overflow in McSubMgr ActiveX control (mcsubmgr.dll) in McAfee Security Center 6.0.23 for Internet Security Suite 2006, Wireless Home Network Security, Personal Firewall Plus, VirusScan, Privacy Service, SpamKiller, AntiSpyware, and QuickClean allows remote user-assisted attackers to execute arbitrary commands via long string parameters, which are later used in vsprintf.",2006-08-01,Metasploit,cpe:2.3:a:mcafee:antispyware:2005:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:antispyware:2006:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:internet_security_suite:2004:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:internet_security_suite:2005:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:internet_security_suite:2006:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:personal_firewall_plus:2004:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:personal_firewall_plus:2005:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:personal_firewall_plus:2006:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:privacy_service:2004:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:privacy_service:2005:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:privacy_service:2006:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:quickclean:2004:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:quickclean:2005:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:quickclean:2006:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:security_center:4.3:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:security_center:6.0.22:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:security_center:6.0.23:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:security_center:6.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:spamkiller:5.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:spamkiller:6.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:spamkiller:7.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:virusscan:2004:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:virusscan:2005:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:virusscan:2006:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:wireless_home_network_security:2006:*:*:*:*:*:*:* CVE-2006-4305,0.0,,0.71142,Buffer overflow in SAP DB and MaxDB before 7.6.00.30 allows remote attackers to execute arbitrary code via a long database name when connecting via a WebDBM client.,2006-08-30,Metasploit,cpe:2.3:a:mysql:maxdb:*:*:*:*:*:*:*:*;cpe:2.3:a:sap-db:sap-db:*:*:*:*:*:*:*:* CVE-2006-4313,0.0,,0.67665,"Multiple unspecified vulnerabilities in Cisco VPN 3000 series concentrators before 4.1, 4.1.x up to 4.1(7)L, and 4.7.x up to 4.7(2)F allow attackers to execute the (1) CWD, (2) MKD, (3) CDUP, (4) RNFR, (5) SIZE, and (6) RMD FTP commands to modify files or create and delete directories via unknown vectors.",2006-08-23,Metasploit,cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.5.b:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.5.b:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.b:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.l:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.1.f:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.2.f:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7:*:*:*:*:*:*:* CVE-2006-4318,0.0,,0.7975,Buffer overflow in WFTPD Server 3.23 allows remote attackers to execute arbitrary code via long SIZE commands.,2006-08-24,Metasploit,cpe:2.3:a:texas_imperial_software:wftpd:3.23:*:*:*:*:*:*:* CVE-2006-4602,0.0,,0.83363,"Unrestricted file upload vulnerability in jhot.php in TikiWiki 1.9.4 Sirius and earlier allows remote attackers to execute arbitrary PHP code via a filepath parameter that contains a filename with a .php extension, which is uploaded to the img/wiki/ directory.",2006-09-07,Metasploit,cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.4:*:*:*:*:*:*:* CVE-2006-4688,0.0,,0.82092,"Buffer overflow in Client Service for NetWare (CSNW) in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via crafted messages, aka ""Client Service for NetWare Memory Corruption Vulnerability.""",2006-11-14,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:* CVE-2006-4691,0.0,,0.88274,Stack-based buffer overflow in the NetpManageIPCConnect function in the Workstation service (wkssvc.dll) in Microsoft Windows 2000 SP4 and XP SP2 allows remote attackers to execute arbitrary code via NetrJoinDomain2 RPC messages with a long hostname.,2006-11-14,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:* CVE-2006-4704,0.0,,0.73165,"Cross-zone scripting vulnerability in the WMI Object Broker (WMIScriptUtils.WMIObjectBroker2) ActiveX control (WmiScriptUtils.dll) in Microsoft Visual Studio 2005 allows remote attackers to bypass Internet zone restrictions and execute arbitrary code by instantiating dangerous objects, aka ""WMI Object Broker Vulnerability.""",2006-11-01,Metasploit,cpe:2.3:a:microsoft:visual_studio_.net:2005:*:*:*:*:*:*:* CVE-2006-4777,0.0,,0.87569,"Heap-based buffer overflow in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) for Internet Explorer 6.0 SP1, on Chinese and possibly other Windows distributions, allows remote attackers to execute arbitrary code via unknown manipulations in arguments to the KeyFrame method, possibly related to an integer overflow, as demonstrated by daxctle2, and a different vulnerability than CVE-2006-4446.",2006-09-14,Metasploit,cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:* CVE-2006-4842,0.0,,0.10698,"The Netscape Portable Runtime (NSPR) API 4.6.1 and 4.6.2, as used in Sun Solaris 10, trusts user-specified environment variables for specifying log files even when running from setuid programs, which allows local users to create or overwrite arbitrary files.",2006-10-12,Metasploit,cpe:2.3:a:netscape:portable_runtime_api:4.6.1:*:*:*:*:*:*:*;cpe:2.3:a:netscape:portable_runtime_api:4.6.2:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:* CVE-2006-4847,0.0,,0.89526,"Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands.",2006-09-19,Metasploit,cpe:2.3:a:ipswitch:ws_ftp_server:1.0.1eval:*:*:*:*:*:*:*;cpe:2.3:a:ipswitch:ws_ftp_server:1.0.2eval:*:*:*:*:*:*:*;cpe:2.3:a:ipswitch:ws_ftp_server:3.0_1:*:*:*:*:*:*:*;cpe:2.3:a:ipswitch:ws_ftp_server:4.01:*:*:*:*:*:*:*;cpe:2.3:a:ipswitch:ws_ftp_server:5.02:*:*:*:*:*:*:*;cpe:2.3:a:ipswitch:ws_ftp_server:5.03:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:* CVE-2006-4868,0.0,,0.63976,"Stack-based buffer overflow in the Vector Graphics Rendering engine (vgx.dll), as used in Microsoft Outlook and Internet Explorer 6.0 on Windows XP SP2, and possibly other versions, allows remote attackers to execute arbitrary code via a Vector Markup Language (VML) file with a long fill parameter within a rect tag.",2006-09-19,Metasploit,cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2003:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:* CVE-2006-4948,0.0,,0.76985,Stack-based buffer overflow in tftpd.exe in ProSysInfo TFTP Server TFTPDWIN 0.4.2 and earlier allows remote attackers to execute arbitrary code or cause a denial of service via a long file name. NOTE: the provenance of this information is unknown; the details are obtained from third party information.,2006-09-23,Metasploit,cpe:2.3:a:prosysinfo:tftp_server_tftpdwin:*:*:*:*:*:*:*:* CVE-2006-5112,0.0,,0.82279,Buffer overflow in InterVations NaviCOPA Web Server 2.01 allows remote attackers to execute arbitrary code via a long HTTP GET request.,2006-10-03,Metasploit,cpe:2.3:a:intervations:navicopa_web_server:2.01:*:*:*:*:*:*:* CVE-2006-5143,0.0,,0.84629,"Multiple buffer overflows in CA BrightStor ARCserve Backup r11.5 SP1 and earlier, r11.1, and 9.01; BrightStor ARCserve Backup for Windows r11; BrightStor Enterprise Backup 10.5; Server Protection Suite r2; and Business Protection Suite r2 allow remote attackers to execute arbitrary code via crafted data on TCP port 6071 to the Backup Agent RPC Server (DBASVR.exe) using the RPC routines with opcode (1) 0x01, (2) 0x02, or (3) 0x18; invalid stub data on TCP port 6503 to the RPC routines with opcode (4) 0x2b or (5) 0x2d in ASCORE.dll in the Message Engine RPC Server (msgeng.exe); (6) a long hostname on TCP port 41523 to ASBRDCST.DLL in the Discovery Service (casdscsvc.exe); or unspecified vectors related to the (7) Job Engine Service.",2006-10-10,Metasploit,cpe:2.3:a:broadcom:brightstor_arcserve_backup:*:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:server_protection_suite:2:*:*:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:* CVE-2006-5156,0.0,,0.82959,Buffer overflow in McAfee ePolicy Orchestrator before 3.5.0.720 and ProtectionPilot before 1.1.1.126 allows remote attackers to execute arbitrary code via a request to /spipe/pkg/ with a long source header.,2006-10-05,Metasploit,cpe:2.3:a:mcafee:epolicy_orchestrator:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:epolicy_orchestrator:3.0:sp2a:*:*:*:*:*:*;cpe:2.3:a:mcafee:epolicy_orchestrator:3.5.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:protectionpilot:1.1.1:*:*:*:*:*:*:* CVE-2006-5198,0.0,,0.73442,"The WZFILEVIEW.FileViewCtrl.61 ActiveX control (aka Sky Software ""FileView"" ActiveX control) for WinZip 10.0 before build 7245 allows remote attackers to execute arbitrary code via unspecified ""unsafe methods.""",2006-11-14,Metasploit,cpe:2.3:a:winzip:winzip:10.0:*:*:*:*:*:*:* CVE-2006-5216,0.0,,0.81799,Stack-based buffer overflow in Sergey Lyubka Simple HTTPD (shttpd) 1.34 allows remote attackers to execute arbitrary code via a long URI.,2006-10-10,Metasploit,cpe:2.3:a:sergey_lyubka:simple_httpd:1.34:*:*:*:*:*:*:* CVE-2006-5229,0.0,,0.37831,"OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as demonstrated by sshtime. NOTE: as of 20061014, it appears that this issue is dependent on the use of manually-set passwords that causes delays when processing /etc/shadow due to an increased number of rounds.",2006-10-10,Metasploit,cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux:*:*:*:*:*:*:*:* CVE-2006-5276,0.0,,0.87695,"Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 before beta 2; and Sourcefire Intrusion Sensor; allows remote attackers to execute arbitrary code via crafted SMB traffic.",2007-02-20,Metasploit,cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*;cpe:2.3:a:snort:snort:2.6.1.1:*:*:*:*:*:*:*;cpe:2.3:a:snort:snort:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:snort:snort:2.7_beta1:*:*:*:*:*:*:*;cpe:2.3:a:sourcefire:intrusion_sensor:4.1:*:*:*:*:*:*:*;cpe:2.3:a:sourcefire:intrusion_sensor:4.1:*:crossbeam:*:*:*:*:*;cpe:2.3:a:sourcefire:intrusion_sensor:4.5:*:*:*:*:*:*:*;cpe:2.3:a:sourcefire:intrusion_sensor:4.5:*:crossbeam:*:*:*:*:*;cpe:2.3:a:sourcefire:intrusion_sensor:4.6:*:*:*:*:*:*:*;cpe:2.3:a:sourcefire:intrusion_sensor:4.6:*:crossbeam:*:*:*:*:* CVE-2006-5478,0.0,,0.90702,"Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.",2006-10-24,Metasploit,cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.3.8_presp9:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.3:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:* CVE-2006-5614,0.0,,0.88425,"Microsoft Windows NAT Helper Components (ipnathlp.dll) on Windows XP SP2, when Internet Connection Sharing is enabled, allows remote attackers to cause a denial of service (svchost.exe crash) via a malformed DNS query, which results in a null pointer dereference.",2006-10-31,Metasploit,cpe:2.3:a:microsoft:windows_nt_helper_components:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:* CVE-2006-5650,0.0,,0.82608,"The ICQPhone.SipxPhoneManager ActiveX control in America Online ICQ 5.1 allows remote attackers to download and execute arbitrary code via the DownloadAgent function, as demonstrated using an ICQ avatar.",2006-11-07,Metasploit,cpe:2.3:a:aol:icq:5.1:*:*:*:*:*:*:* CVE-2006-5702,0.0,,0.53418,"Tikiwiki 1.9.5 allows remote attackers to obtain sensitive information (MySQL username and password) via an empty sort_mode parameter in (1) tiki-listpages.php, (2) tiki-lastchanges.php, (3) messu-archive.php, (4) messu-mailbox.php, (5) messu-sent.php, (6) tiki-directory_add_site.php, (7) tiki-directory_ranking.php, (8) tiki-directory_search.php, (9) tiki-forums.php, (10) tiki-view_forum.php, (11) tiki-friends.php, (12) tiki-list_blogs.php, (13) tiki-list_faqs.php, (14) tiki-list_trackers.php, (15) tiki-list_users.php, (16) tiki-my_tiki.php, (17) tiki-notepad_list.php, (18) tiki-orphan_pages.php, (19) tiki-shoutbox.php, (20) tiki-usermenu.php, and (21) tiki-webmail_contacts.php, which reveal the information in certain database error messages.",2006-11-04,Metasploit,cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.5:*:*:*:*:*:*:* CVE-2006-5745,0.0,,0.87269,"Unspecified vulnerability in the setRequestHeader method in the XMLHTTP (XML HTTP) ActiveX Control 4.0 in Microsoft XML Core Services 4.0 on Windows, when accessed by Internet Explorer, allows remote attackers to execute arbitrary code via crafted arguments that lead to memory corruption, a different vulnerability than CVE-2006-4685. NOTE: some of these details are obtained from third party information.",2006-11-06,Metasploit,cpe:2.3:a:microsoft:xml_core_services:4.0:*:*:*:*:*:*:* CVE-2006-5780,0.0,,0.7828,"Stack-based buffer overflow in nfsd.exe in XLink Omni-NFS Server 5.2 allows remote attackers to execute arbitrary code via a crafted TCP packet to port 2049 (nfsd), as demonstrated by vd_xlink.pm.",2006-11-07,Metasploit,cpe:2.3:a:xlink_technology:omni-nfs_server:5.2:*:*:*:*:*:*:* CVE-2006-5792,0.0,,0.71383,"Unspecified vulnerability in XLink Omni-NFS Enterprise allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by vd_xlink2.pm, an ""Omni-NFS Enterprise remote exploit."" NOTE: this is probably a different vulnerability than CVE-2006-5780. As of 20061107, this disclosure has no actionable information. However, since it is from a reliable researcher, it is being assigned a CVE identifier for tracking purposes.",2006-11-07,Metasploit,cpe:2.3:a:xlink_technology:omni-nfs_x_enterprise:*:*:*:*:*:*:*:* CVE-2006-5815,0.0,,0.59834,"Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a ""ProFTPD remote exploit.""",2006-11-08,Metasploit,cpe:2.3:a:proftpd_project:proftpd:*:*:*:*:*:*:*:* CVE-2006-6010,0.0,,0.20146,"SAP allows remote attackers to obtain potentially sensitive information such as operating system and SAP version via an RFC_SYSTEM_INFO RfcCallReceive request, a different vulnerability than CVE-2003-0747.",2006-11-21,Metasploit,cpe:2.3:a:sap:sap_web_application_server:*:*:*:*:*:*:*:* CVE-2006-6063,0.0,,0.79349,"Stack-based buffer overflow in Un4seen XMPlay 3.3.0.5 and earlier allows remote attackers to execute arbitrary code via a M3U file containing a long (1) FileName, and cause a crash via a long (2) DisplayName.",2006-11-22,Metasploit,cpe:2.3:a:un4seen:xmplay:*:*:*:*:*:*:*:* CVE-2006-6076,0.0,,0.7604,Buffer overflow in the Tape Engine (tapeeng.exe) in CA (formerly Computer Associates) BrightStor ARCserve Backup 11.5 and earlier allows remote attackers to execute arbitrary code via certain RPC requests to TCP port 6502.,2006-11-24,Metasploit,cpe:2.3:a:broadcom:brightstor_arcserve_backup:*:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:sp1:*:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.0:*:sql:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:sql:*:*:*:*:* CVE-2006-6183,0.0,,0.47508,"Multiple stack-based buffer overflows in 3Com 3CTftpSvc 2.0.1, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long mode field (aka transporting mode) in a (1) GET or (2) PUT command.",2006-12-01,Metasploit,cpe:2.3:a:3com:3ctftpsvc:*:*:*:*:*:*:*:* CVE-2006-6184,0.0,,0.80575,"Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long filename in a (1) GET or (2) PUT command.",2006-12-01,Metasploit,cpe:2.3:a:alliedtelesyn:at-tftp:*:*:*:*:*:*:*:* CVE-2006-6199,0.0,,0.84024,"Stack-based buffer overflow in BlazeVideo BlazeDVD Standard and Professional 5.0, and possibly earlier, allows remote attackers to execute arbitrary code via a long filename in a PLF playlist.",2006-12-01,Metasploit,cpe:2.3:a:blazevideo:blaze_dvd:5.0:*:pro:*:*:*:*:*;cpe:2.3:a:blazevideo:blaze_dvd:5.0:*:standard:*:*:*:*:* CVE-2006-6251,0.0,,0.78545,"Stack-based buffer overflow in VUPlayer 2.44 and earlier allows remote attackers to execute arbitrary code via a long string in an M3U file, aka an ""M3U UNC Name"" attack.",2006-12-04,Metasploit,cpe:2.3:a:vuplayer:vuplayer:*:*:*:*:*:*:*:* CVE-2006-6423,0.0,,0.39215,"Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix.",2006-12-12,Metasploit,cpe:2.3:a:mailenable:mailenable_enterprise:1.11:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.12:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.13:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.14:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.15:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.16:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.17:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.18:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.19:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.22:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.23:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.24:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.25:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.26:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.27:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.28:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.29:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.30:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.31:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.32:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.33:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.34:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.35:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.36:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.37:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.38:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.39:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.40:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:2.35:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:* CVE-2006-6424,0.0,,0.64126,"Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow; and (2) via crafted arguments to the STOR command to the Network Messaging Application Protocol (NMAP) daemon, resulting in a stack overflow.",2006-12-27,Metasploit,cpe:2.3:a:novell:netmail:*:e-ftfl:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.0.3a:a:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.0.3a:b:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:*:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:a:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:b:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:c:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:d:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:e:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:f:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:g:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:h:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.1:f:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.5:*:*:*:*:*:*:* CVE-2006-6425,0.0,,0.76472,Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command.,2006-12-27,Metasploit,cpe:2.3:a:novell:netmail:*:e-ftfl:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.0.3a:a:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.0.3a:b:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:*:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:a:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:b:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:c:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:d:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:e:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:f:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:g:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:h:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.1:f:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.5:*:*:*:*:*:*:* CVE-2006-6565,0.0,,0.5735,"FileZilla Server before 0.9.22 allows remote attackers to cause a denial of service (crash) via a wildcard argument to the (1) LIST or (2) NLST commands, which results in a NULL pointer dereference, a different set of vectors than CVE-2006-6564. NOTE: CVE analysis suggests that the problem might be due to a malformed PORT command.",2006-12-15,Metasploit/Nuclei,cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:* CVE-2006-6576,0.0,,0.88576,Heap-based buffer overflow in Golden FTP Server (goldenftpd) 1.92 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long PASS command. NOTE: it was later reported that 4.70 is also affected. NOTE: the USER vector is already covered by CVE-2005-0634.,2006-12-15,Metasploit,cpe:2.3:a:goldenftpserver:golden_ftp_server:1.92:*:*:*:*:*:*:* CVE-2006-6665,0.0,,0.75657,Buffer overflow in Astonsoft DeepBurner Pro and Free 1.8.0 and earlier allows user-assisted remote attackers to execute arbitrary code via a long file name tag in a dbr file.,2006-12-20,Metasploit,cpe:2.3:a:astonsoft:deepburner:*:*:free:*:*:*:*:*;cpe:2.3:a:astonsoft:deepburner:*:*:pro:*:*:*:*:* CVE-2006-6707,0.0,,0.74943,Stack-based buffer overflow in the NeoTraceExplorer.NeoTraceLoader ActiveX control (NeoTraceExplorer.dll) in NeoTrace Express 3.25 and NeoTrace Pro (aka McAfee Visual Trace) 3.25 allows remote attackers to execute arbitrary code via a long argument string to the TraceTarget method. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.,2006-12-23,Metasploit,cpe:2.3:a:mcafee:neotrace:3.25:*:express:*:*:*:*:*;cpe:2.3:a:mcafee:neotrace:3.25:*:professional:*:*:*:*:*;cpe:2.3:a:mcafee:visual_trace:3.25:*:*:*:*:*:*:* CVE-2006-6761,0.0,,0.53596,Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.,2006-12-27,Metasploit,cpe:2.3:a:novell:netmail:3.5.2:a:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.5.2:b:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.5.2:c1:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.5.2:c:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.5.2:d:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.5.2:e-ftfl:*:*:*:*:*:* CVE-2007-0015,0.0,,0.85981,Buffer overflow in Apple QuickTime 7.1.3 allows remote attackers to execute arbitrary code via a long rtsp:// URI.,2007-01-01,Metasploit,cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:* CVE-2007-0018,0.0,,0.72473,"Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote attackers to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the products include (1) NCTsoft NCTAudioStudio, NCTAudioEditor, and NCTDialogicVoice; (2) Magic Audio Recorder, Music Editor, and Audio Converter; (3) Aurora Media Workshop; DB Audio Mixer And Editor; (4) J. Hepple Products including Fx Audio Editor and others; (5) EXPStudio Audio Editor; (6) iMesh; (7) Quikscribe; (8) RMBSoft AudioConvert and SoundEdit Pro 2.1; (9) CDBurnerXP; (10) Code-it Software Wave MP3 Editor and aBasic Editor; (11) Movavi VideoMessage, DVD to iPod, and others; (12) SoftDiv Software Dexster, iVideoMAX, and others; (13) Sienzo Digital Music Mentor (DMM); (14) MP3 Normalizer; (15) Roemer Software FREE and Easy Hi-Q Recorder, and Easy Hi-Q Converter; (16) Audio Edit Magic; (17) Joshua Video and Audio Converter; (18) Virtual CD; (19) Cheetah CD and DVD Burner; (20) Mystik Media AudioEdit Deluxe, Blaze Media, and others; (21) Power Audio Editor; (22) DanDans Digital Media Full Audio Converter, Music Editing Master, and others; (23) Xrlly Software Text to Speech Makerand Arial Sound Recorder / Audio Converter; (24) Absolute Sound Recorder, Video to Audio Converter, and MP3 Splitter; (25) Easy Ringtone Maker; (26) RecordNRip; (27) McFunSoft iPod Audio Studio, Audio Recorder for Free, and others; (28) MP3 WAV Converter; (29) BearShare 6.0.2.26789; and (30) Oracle Siebel SimBuilder and CRM 7.x.",2007-01-24,Metasploit,cpe:2.3:a:altdo:convert_mp3_master:1.1:*:*:*:*:*:*:*;cpe:2.3:a:altdo:mp3_record_and_edit_audio_master:1.2:*:*:*:*:*:*:*;cpe:2.3:a:americanshareware:mp3_wav_converter:3.1.8:*:*:*:*:*:*:*;cpe:2.3:a:audio_edit_magic:audio_edit_magic:9.2.3_389:*:*:*:*:*:*:*;cpe:2.3:a:bearshare:bearshare:6.0.2.26789:*:*:*:*:*:*:*;cpe:2.3:a:cdburnerxp:cdburnerxp_pro:3.0.116:*:*:*:*:*:*:*;cpe:2.3:a:cheetahburner:cheetah_cd_burner:3.56:*:*:*:*:*:*:*;cpe:2.3:a:cheetahburner:cheetah_dvd_burner:1.79:*:*:*:*:*:*:*;cpe:2.3:a:code-it_softare:abasic_editor:10.1:*:*:*:*:*:*:*;cpe:2.3:a:code-it_softare:wave_mp3_editor:10.1:*:*:*:*:*:*:*;cpe:2.3:a:dandans_digital_media_products:easy_audio_editor:7.4:*:*:*:*:*:*:*;cpe:2.3:a:dandans_digital_media_products:full_audio_converter:4.2:*:*:*:*:*:*:*;cpe:2.3:a:dandans_digital_media_products:music_editing_master:5.2:*:*:*:*:*:*:*;cpe:2.3:a:dandans_digital_media_products:visual_video_converter:4.4:*:*:*:*:*:*:*;cpe:2.3:a:digital_borneo:audio_mixer_and_editor:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:easy_ringtone_maker:easy_ringtone_maker:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:expstudio:audio_editor:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:iaudiosoft.com:absolute_mp3_splitter:2.5.4:*:*:*:*:*:*:*;cpe:2.3:a:iaudiosoft.com:absolute_sound_recorder:3.4.5:*:*:*:*:*:*:*;cpe:2.3:a:iaudiosoft.com:absolute_video_to_audio_converter:2.7.9:*:*:*:*:*:*:*;cpe:2.3:a:imesh.com:imesh:7.0.2.26789:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_audio_concat:1.2.0_beta:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_audio_editor:4.7.11:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_audio_tools:7.3.4:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_magic_music:5.7.7:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_movie_joiner:6.2.8:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_movie_joiner_and_splitter:6.2.8:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_movie_splitter:6.4.7:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_new_sound:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_video_converter:7.51.21:*:*:*:*:*:*:*;cpe:2.3:a:joshua_mediasoft:audio_convertor_plus:2.2:*:*:*:*:*:*:*;cpe:2.3:a:joshua_mediasoft:video_converter_plus:3.01:*:*:*:*:*:*:*;cpe:2.3:a:magicvideosoftare:magic_audio_converter:8.2.6_build_719:*:*:*:*:*:*:*;cpe:2.3:a:magicvideosoftare:magic_audio_recorder:5.3.7:*:*:*:*:*:*:*;cpe:2.3:a:magicvideosoftare:magic_music_editor:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:mcfunsoft:audio_editor:6.3.3_build_489:*:*:*:*:*:*:*;cpe:2.3:a:mcfunsoft:audio_recorder_for_free:6.1:*:*:*:*:*:*:*;cpe:2.3:a:mcfunsoft:audio_studio:6.6.3_build_479:*:*:*:*:*:*:*;cpe:2.3:a:mcfunsoft:ipod_audio_studio:6.2.4:*:*:*:*:*:*:*;cpe:2.3:a:mcfunsoft:ipod_music_converter:5.1:*:*:*:*:*:*:*;cpe:2.3:a:mcfunsoft:recording_to_ipod_solution:5.1:*:*:*:*:*:*:*;cpe:2.3:a:mediatox:aurora_media_workshop:3.3.25:*:*:*:*:*:*:*;cpe:2.3:a:movavi:chiliburner:2.3:*:*:*:*:*:*:*;cpe:2.3:a:movavi:convertmovie:4.4:*:*:*:*:*:*:*;cpe:2.3:a:movavi:dvd_to_ipod:1.0:*:*:*:*:*:*:*;cpe:2.3:a:movavi:splitmovie:1.4:*:*:*:*:*:*:*;cpe:2.3:a:movavi:suite:3.5:*:*:*:*:*:*:*;cpe:2.3:a:movavi:videomessage:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mp3-soft:mp3_normalizer:1.03:*:*:*:*:*:*:*;cpe:2.3:a:mystik_media_products:audioedit_deluxe:4.10:*:*:*:*:*:*:*;cpe:2.3:a:mystik_media_products:blaze_media_pro:7.0:*:*:*:*:*:*:*;cpe:2.3:a:mystik_media_products:blaze_mediaconvert:3.4:*:*:*:*:*:*:*;cpe:2.3:a:mystik_media_products:contextconvert_pro:3.1:*:*:*:*:*:*:*;cpe:2.3:a:nctsoft_products:nctaudioeditor:2.7.1:*:*:*:*:*:*:*;cpe:2.3:a:nctsoft_products:nctaudiofile2:*:*:*:*:*:*:*:*;cpe:2.3:a:nctsoft_products:nctaudiostudio:2.7.1:*:*:*:*:*:*:*;cpe:2.3:a:nctsoft_products:nctdialogicvoice:2.7.1:*:*:*:*:*:*:*;cpe:2.3:a:nextlevel_systems:audio_editor_gold:9.2.5_build_424:*:*:*:*:*:*:*;cpe:2.3:a:nextlevel_systems:audio_studio_gold:7.0.1.1_build_500:*:*:*:*:*:*:*;cpe:2.3:a:quikscribe:quikscribe_player:5.022.05:*:*:*:*:*:*:*;cpe:2.3:a:quikscribe:quikscribe_recorder:5.021.29:*:*:*:*:*:*:*;cpe:2.3:a:recordnrip:recordnrip:1.0:*:*:*:*:*:*:*;cpe:2.3:a:rmbsoft:audioconvert:3.1.0.125:*:*:*:*:*:*:*;cpe:2.3:a:rmbsoft:soundedit_pro:2.1:*:*:*:*:*:*:*;cpe:2.3:a:roemer_software:easy_hi-q_converter:1.7:*:*:*:*:*:*:*;cpe:2.3:a:roemer_software:easy_hi-q_recorder:2.0:*:*:*:*:*:*:*;cpe:2.3:a:roemer_software:free_hi-q_recorder:1.9:*:*:*:*:*:*:*;cpe:2.3:a:sienzo:digital_music_mentor:2.6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:smart_media_systems:power_audio_editor:11.0.1:*:*:*:*:*:*:*;cpe:2.3:a:softdiv_softare:dexster:3.0:*:*:*:*:*:*:*;cpe:2.3:a:softdiv_softare:ivideomax:3.9:*:*:*:*:*:*:*;cpe:2.3:a:softdiv_softare:mp3_to_wav_converter:3.0:*:*:*:*:*:*:*;cpe:2.3:a:softdiv_softare:snosh:1.4:*:*:*:*:*:*:*;cpe:2.3:a:softdiv_softare:videozilla:2.5:*:*:*:*:*:*:*;cpe:2.3:a:virtual_cd:virtual_cd:6.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:virtual_cd:virtual_cd:7.1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:virtual_cd:virtual_cd:8.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:virtual_cd:virtual_cd_file_server:7.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:xrlly_software:arial_audio_converter:2.3.40:*:*:*:*:*:*:*;cpe:2.3:a:xrlly_software:arial_sound_recorder:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:xrlly_software:text_to_speech_maker:1.3.8:*:*:*:*:*:*:*;cpe:2.3:a:xwaver.com:magic_audio_editor_pro:10.3.1_build_476:*:*:*:*:*:*:*;cpe:2.3:a:xwaver.com:magic_music_studio_pro:7.0.2.1_build_500:*:*:*:*:*:*:* CVE-2007-0038,0.0,,0.88342,"Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons, a variant of CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this might be a duplicate of CVE-2007-1765; if so, then CVE-2007-0038 should be preferred.",2007-03-30,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:gold:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:gold:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:gold:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:gold:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional_x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:* CVE-2007-0169,0.0,,0.77509,"Multiple buffer overflows in Computer Associates (CA) BrightStor ARCserve Backup 9.01 through 11.5, Enterprise Backup 10.5, and CA Server/Business Protection Suite r2 allow remote attackers to execute arbitrary code via RPC requests with crafted data for opnums (1) 0x2F and (2) 0x75 in the (a) Message Engine RPC service, or opnum (3) 0xCF in the Tape Engine service.",2007-01-11,Metasploit,cpe:2.3:a:broadcom:brightstor_arcserve_backup:*:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:* CVE-2007-0325,0.0,,0.73581,"Multiple buffer overflows in the Trend Micro OfficeScan Web-Deployment SetupINICtrl ActiveX control in OfficeScanSetupINI.dll, as used in OfficeScan 7.0 before Build 1344, OfficeScan 7.3 before Build 1241, and Client / Server / Messaging Security 3.0 before Build 1197, allow remote attackers to execute arbitrary code via a crafted HTML document.",2007-02-20,Metasploit,cpe:2.3:a:trend_micro:client-server-messaging_security:3.0:*:*:*:*:*:*:*;cpe:2.3:a:trend_micro:officescan_corporate_edition:7.0:*:*:*:*:*:*:*;cpe:2.3:a:trend_micro:officescan_corporate_edition:7.3:*:*:*:*:*:*:* CVE-2007-0348,0.0,,0.74294,"Stack-based buffer overflow in the IASystemInfo.dll ActiveX control in (1) InterActual Player 2.60.12.0717, (2) Roxio CinePlayer 3.2, (3) WinDVD 7.0.27.172, and possibly other products, allows remote attackers to execute arbitrary code via a long ApplicationType property.",2007-03-21,Metasploit,cpe:2.3:a:interactual_technologies:interactual_player:2.60.12.0717:*:*:*:*:*:*:*;cpe:2.3:a:intervideo:windvd:7.0.27.172:*:*:*:*:*:*:*;cpe:2.3:a:roxio:cineplayer:3.2:*:*:*:*:*:*:* CVE-2007-0449,0.0,,0.82011,"Multiple buffer overflows in LGSERVER.EXE in CA BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.1 SP1, Mobile Backup r4.0, Desktop and Business Protection Suite r2, and Desktop Management Suite (DMS) r11.0 and r11.1 allow remote attackers to execute arbitrary code via crafted packets to TCP port (1) 1900 or (2) 2200.",2007-01-23,Metasploit,cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_mobile_backup:r4.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:desktop_management_suite:11.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:desktop_management_suite:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:desktop_protection_suite:2.0:*:*:*:*:*:*:* CVE-2007-0671,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.68363,"Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonstrated by Exploit-MSExcel.h in targeted zero-day attacks.",2007-02-03,CISA,cpe:2.3:a:microsoft:access:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:access:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:access:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2004:*:mac:*:*:*:*:*;cpe:2.3:a:microsoft:excel_viewer:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:frontpage:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:frontpage:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:frontpage:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:infopath:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:onenote:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:powerpoint:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:powerpoint:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:powerpoint:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:powerpoint:2004:*:mac:*:*:*:*:*;cpe:2.3:a:microsoft:project:2000:sr1:*:*:*:*:*:*;cpe:2.3:a:microsoft:project:2002:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:project:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:publisher:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:publisher:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:publisher:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:visio:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:word_viewer:2003:*:*:*:*:*:*:* CVE-2007-0774,0.0,,0.86753,"Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.",2007-03-04,Metasploit,cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.20:*:*:*:*:*:*:* CVE-2007-0882,0.0,,0.91063,"Argument injection vulnerability in the telnet daemon (in.telnetd) in Solaris 10 and 11 (SunOS 5.10 and 5.11) misinterprets certain client ""-f"" sequences as valid requests for the login program to skip authentication, which allows remote attackers to log into certain accounts, as demonstrated by the bin account.",2007-02-12,Metasploit,cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:* CVE-2007-0885,0.0,,0.02133,Cross-site scripting (XSS) vulnerability in jira/secure/BrowseProject.jspa in Rainbow with the Zen (Rainbow.Zen) extension allows remote attackers to inject arbitrary web script or HTML via the id parameter.,2007-02-12,Nuclei,cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*;cpe:2.3:a:rainbow_portal:rainbow_with_the_zen:*:*:*:*:*:*:*:* CVE-2007-0977,0.0,,0.70115,"IBM Lotus Domino R5 and R6 WebMail, with ""Generate HTML for all fields"" enabled, stores HTTPPassword hashes from names.nsf in a manner accessible through Readviewentries and OpenDocument requests to the defaultview view, a different vector than CVE-2005-2428.",2007-02-16,Metasploit,cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:6.0:*:*:*:*:*:*:* CVE-2007-1036,0.0,,0.90349,"The default configuration of JBoss does not restrict access to the (1) console and (2) web management interfaces, which allows remote attackers to bypass authentication and gain administrative access via direct requests.",2007-02-21,Metasploit,cpe:2.3:a:jboss:jboss_application_server:*:*:*:*:*:*:*:* CVE-2007-1070,0.0,,0.78365,"Multiple stack-based buffer overflows in Trend Micro ServerProtect for Windows and EMC 5.58, and for Network Appliance Filer 5.61 and 5.62, allow remote attackers to execute arbitrary code via crafted RPC requests to TmRpcSrv.dll that trigger overflows when calling the (1) CMON_NetTestConnection, (2) CMON_ActiveUpdate, and (3) CMON_ActiveRollback functions in (a) StCommon.dll, and (4) ENG_SetRealTimeScanConfigInfo and (5) ENG_SendEMail functions in (b) eng50.dll.",2007-02-21,Metasploit,cpe:2.3:a:trend_micro:serverprotect:5.58:*:emc:*:*:*:*:*;cpe:2.3:a:trend_micro:serverprotect:5.61:*:network_appliance_filer:*:*:*:*:*;cpe:2.3:a:trend_micro:serverprotect:5.62:*:network_appliance_filer:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:32_bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:* CVE-2007-1286,0.0,,0.77523,"Integer overflow in PHP 4.4.4 and earlier allows remote context-dependent attackers to execute arbitrary code via a long string to the unserialize function, which triggers the overflow in the ZVAL reference counter.",2007-03-06,Metasploit,cpe:2.3:a:php:php:*:*:*:*:*:*:*:* CVE-2007-1373,0.0,,0.76457,Stack-based buffer overflow in Mercury/32 (aka Mercury Mail Transport System) 4.01b and earlier allows remote attackers to execute arbitrary code via a long LOGIN command. NOTE: this might be the same issue as CVE-2006-5961.,2007-03-10,Metasploit,cpe:2.3:a:pmail:mercury_mail_transport_system:*:*:*:*:*:*:*:* CVE-2007-1435,0.0,,0.6068,"Buffer overflow in D-Link TFTP Server 1.0 allows remote attackers to cause a denial of service (crash) via a long (1) GET or (2) PUT request, which triggers memory corruption. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.",2007-03-13,Metasploit,cpe:2.3:a:d-link:tftp_server:1.0:*:*:*:*:*:*:* CVE-2007-1559,0.0,,0.62849,Multiple stack-based buffer overflows in SonicDVDDashVRNav.dll in Roxio CinePlayer 3.2 allow remote attackers to execute arbitrary code via (1) unspecified long property values to SonicMediaPlayer.dll or (2) long arguments to unspecified methods in SonicMediaPlayer.dll.,2007-04-11,Metasploit,cpe:2.3:a:roxio:cineplayer:3.2:*:*:*:*:*:*:* CVE-2007-1674,0.0,,0.78218,Stack-based buffer overflow in the Alert Service (aolnsrvr.exe) in LANDesk Management Suite 8.7 allows remote attackers to execute arbitrary code via a crafted packet to port 65535/UDP.,2007-04-18,Metasploit,cpe:2.3:a:landesk:landesk_management_suite:8.7:*:*:*:*:*:*:* CVE-2007-1682,0.0,,0.63261,"Multiple stack-based buffer overflows in the FileManager ActiveX control in SAFmgPws.dll in SoftArtisans XFile before 2.4.0 allow remote attackers to execute arbitrary code via unspecified calls to the (1) BuildPath, (2) GetDriveName, (3) DriveExists, or (4) DeleteFile method.",2008-08-27,Metasploit,cpe:2.3:a:softartisans:xfile:*:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.01:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.0:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1.6:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1.7:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.0:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.1.6:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.1.7:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.2.4:*:*:*:*:*:*:* CVE-2007-1689,0.0,,0.73764,Buffer overflow in the ISAlertDataCOM ActiveX control in ISLALERT.DLL for Norton Personal Firewall 2004 and Internet Security 2004 allows remote attackers to execute arbitrary code via long arguments to the (1) Get and (2) Set functions.,2007-05-16,Metasploit,cpe:2.3:a:symantec:norton_internet_security:2004:*:*:*:*:*:*:*;cpe:2.3:a:symantec:norton_personal_firewall:2004:*:*:*:*:*:*:* CVE-2007-1748,0.0,,0.85144,"Stack-based buffer overflow in the RPC interface in the Domain Name System (DNS) Server Service in Microsoft Windows 2000 Server SP 4, Server 2003 SP 1, and Server 2003 SP 2 allows remote attackers to execute arbitrary code via a long zone name containing character constants represented by escape sequences.",2007-04-13,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp2:*:x64:*:*:*:*:* CVE-2007-1765,0.0,,0.59326,"Unspecified vulnerability in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a malformed ANI file, which results in memory corruption when processing cursors, animated cursors, and icons, a similar issue to CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this issue might be a duplicate of CVE-2007-0038; if so, then use CVE-2007-0038 instead of this identifier.",2007-03-30,Metasploit,cpe:2.3:a:avaya:ip600_media_servers:*:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:ie:7.0:*:vista:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*;cpe:2.3:h:avaya:definity_one_media_server:*:*:*:*:*:*:*:*;cpe:2.3:h:avaya:s3400:*:*:*:*:*:*:*:*;cpe:2.3:h:avaya:s8100:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:*:*:*:advanced_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:*:*:*:datacenter_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:*:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:*:*:ja:server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:advanced_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:datacenter_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:advanced_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:datacenter_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:advanced_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:datacenter_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:advanced_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:datacenter_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:server:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp2:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:datacenter:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:enterprise:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:standard:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:web_edition:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:business:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:december_ctp:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:enterprise:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:home_basic:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:home_premium:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:beta1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:beta2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:beta:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:home:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:media_center:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:tablet_pc:*:*:* CVE-2007-1819,0.0,,0.7557,"Stack-based buffer overflow in the SPIDERLib.Loader ActiveX control (Spider90.ocx) 9.1.0.4353 in TestDirector (TD) for Mercury Quality Center 9.0 before Patch 12.1, and 8.2 SP1 before Patch 32, allows remote attackers to execute arbitrary code via a long ProgColor property.",2007-04-02,Metasploit,cpe:2.3:a:hp:mercury_quality_center:8.2:sp1:*:*:*:*:*:*;cpe:2.3:a:hp:mercury_quality_center:9.0:*:*:*:*:*:*:* CVE-2007-1868,0.0,,0.75178,"The management service in IBM Tivoli Provisioning Manager for OS Deployment before 5.1 Fix Pack 2 does not properly handle multipart/form-data in HTTP POST requests, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via crafted POST requests to port 8080/tcp or 443/tcp.",2007-04-04,Metasploit,cpe:2.3:a:ibm:tivoli_provisioning_manager_os_deployment:5.1.0.116:*:*:*:*:*:*:* CVE-2007-2139,0.0,,0.83801,"Multiple stack-based buffer overflows in the SUN RPC service in CA (formerly Computer Associates) BrightStor ARCserve Media Server, as used in BrightStor ARCserve Backup 9.01 through 11.5 SP2, BrightStor Enterprise Backup 10.5, Server Protection Suite 2, and Business Protection Suite 2, allow remote attackers to execute arbitrary code via malformed RPC strings, a different vulnerability than CVE-2006-5171, CVE-2006-5172, and CVE-2007-1785.",2007-04-25,Metasploit,cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:sp2:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:server_protection_suite:2:*:*:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:*;cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_sbs_premium:*:*:*:*:*;cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_sbs_standard:*:*:*:*:* CVE-2007-2175,0.0,,0.84873,"Apple QuickTime Java extensions (QTJava.dll), as used in Safari and other browsers, and when Java is enabled, allows remote attackers to execute arbitrary code via parameters to the toQTPointer method in quicktime.util.QTHandleRef, which can be used to modify arbitrary memory when creating QTPointerRef objects, as demonstrated during the ""PWN 2 0WN"" contest at CanSecWest 2007.",2007-04-24,Metasploit,cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* CVE-2007-2193,0.0,,0.75177,"Stack-based buffer overflow in the ID_X.apl plugin in ACDSee 9.0 Build 108, Pro 8.1 Build 99, and Photo Editor 4.0 Build 195 allows user-assisted remote attackers to execute arbitrary code via a crafted XPM file with a long section string. NOTE: some of these details are obtained from third party information.",2007-04-24,Metasploit,cpe:2.3:a:acd_systems:acdsee:8.1_build_99:*:pro:*:*:*:*:*;cpe:2.3:a:acd_systems:acdsee:9.0_build_108:*:*:*:*:*:*:*;cpe:2.3:a:acd_systems:photo_editor:4.0_build_195:*:*:*:*:*:*:* CVE-2007-2238,0.0,,0.7633,"Multiple stack-based buffer overflows in the Whale Client Components ActiveX control (WhlMgr.dll), as used in Microsoft Intelligent Application Gateway (IAG) before 3.7 SP2, allow remote attackers to execute arbitrary code via long arguments to the (1) CheckForUpdates or (2) UpdateComponents methods.",2009-04-16,Metasploit,cpe:2.3:a:microsoft:intelligent_application_gateway_2007:*:sp1:*:*:*:*:*:* CVE-2007-2280,0.0,,0.71004,"Stack-based buffer overflow in OmniInet.exe (aka the backup client service daemon) in the Application Recovery Manager component in HP OpenView Storage Data Protector 5.50 and 6.0 allows remote attackers to execute arbitrary code via an MSG_PROTOCOL command with long arguments, a different vulnerability than CVE-2009-3844.",2009-12-18,Metasploit,cpe:2.3:a:hp:openview_storage_data_protector:5.50:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_storage_data_protector:6.0:*:*:*:*:*:*:* CVE-2007-2386,0.0,,0.71927,Buffer overflow in mDNSResponder in Apple Mac OS X 10.4 up to 10.4.9 allows remote attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted UPnP Internet Gateway Device (IGD) packet.,2007-05-24,Metasploit,cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:* CVE-2007-2446,0.0,,0.7795,"Multiple heap-based buffer overflows in the NDR parsing in smbd in Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 (lsa_io_trans_names).",2007-05-14,Metasploit,cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:* CVE-2007-2447,0.0,,0.60899,"The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the ""username map script"" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.",2007-05-14,Metasploit,cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:* CVE-2007-2449,0.0,,0.80304,"Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a ""snp/snoop.jsp;"" sequence.",2007-06-14,Nuclei,cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:* CVE-2007-2508,0.0,,0.78609,"Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote attackers to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the AgRpcCln.dll library in SpntSvc.exe; or (2) TCP port 3628, which triggers an overflow in EarthAgent.exe. NOTE: both issues are reachable via TmRpcSrv.dll.",2007-05-08,Metasploit,cpe:2.3:a:trend_micro:serverprotect:*:*:*:*:*:*:*:* CVE-2007-2617,0.0,,0.09033,"srsexec in Sun Remote Services (SRS) Net Connect Software Proxy Core package in Sun Solaris 10 does not enforce file permissions when opening files, which allows local users to read the first line of arbitrary files via the -d and -v options.",2007-05-11,Metasploit,cpe:2.3:a:sun:net_connect_software:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:sun:net_connect_software:3.2.4:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:* CVE-2007-2711,0.0,,0.79226,Stack-based buffer overflow in TinyIdentD 2.2 and earlier allows remote attackers to execute arbitrary code via a long string to TCP port 113.,2007-05-16,Metasploit,cpe:2.3:a:tinyirc:tinyidentd:*:*:*:*:*:*:*:* CVE-2007-2864,0.0,,0.79929,Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file.,2007-06-06,Metasploit,cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:10.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:common_services:1.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:common_services:1.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:common_services:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:common_services:2.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:common_services:2.2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:common_services:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_antivirus:8.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_antivirus:8.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_antivirus_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_ez_antivirus:7.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_ez_armor:1.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_ez_armor:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_ez_armor:3.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:integrated_threat_management:8.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:internet_security_suite:1.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:internet_security_suite:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:internet_security_suite:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*;cpe:2.3:a:ca:etrust_secure_content_manager:8.0:*:*:*:*:*:*:*;cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*;cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:* CVE-2007-2888,0.0,,0.80267,"Stack-based buffer overflow in UltraISO 8.6.2.2011 and earlier allows user-assisted remote attackers to execute arbitrary code via a long FILE string (filename) in a .cue file, a related issue to CVE-2007-2761. NOTE: some details are obtained from third party information.",2007-05-30,Metasploit,cpe:2.3:a:ezb_systems:ultraiso:*:*:*:*:*:*:*:* CVE-2007-2918,0.0,,0.73156,"Multiple stack-based buffer overflows in ActiveX controls (1) VibeC in (a) vibecontrol.dll, (2) CallManager and (3) ViewerClient in (b) StarClient.dll, (4) ComLink in (c) uicomlink.dll, and (5) WebCamXMP in (d) wcamxmp.dll in Logitech VideoCall allow remote attackers to cause a denial of service (browser crash) and execute arbitrary code via unspecified vectors.",2007-06-01,Metasploit,cpe:2.3:a:logitech:videocall:*:*:*:*:*:*:*:* CVE-2007-2919,0.0,,0.74523,"Multiple stack-based buffer overflows in the FViewerLoading ActiveX control (FlipViewerX.dll) in E-Book Systems FlipViewer before 4.1 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via long (1) UID, (2) Opf, (3) PAGENO, (4) LaunchMode, (5) SubID, (6) BookID, (7) LibraryID, (8) SubURL, and (9) LoadOpf properties.",2007-06-06,Metasploit,cpe:2.3:a:e-book_systems:flipviewer:*:*:*:*:*:*:*:* CVE-2007-2987,0.0,,0.74973,"Multiple buffer overflows in certain ActiveX controls in sasatl.dll in Zenturi ProgramChecker allow remote attackers to execute arbitrary code via unspecified vectors, possibly involving the (1) DebugMsgLog or (2) DoFileProperties methods.",2007-06-01,Metasploit,cpe:2.3:a:zenturi:zenturi_programchecker:*:*:*:*:*:*:*:* CVE-2007-3010,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94007,masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server R7.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the user parameter during a ping action.,2007-09-18,Metasploit/Nuclei/CISA,cpe:2.3:a:al-enterprise:omnipcx_enterprise_communication_server:*:*:*:*:*:*:*:* CVE-2007-3039,0.0,,0.83998,"Stack-based buffer overflow in the Microsoft Message Queuing (MSMQ) service in Microsoft Windows 2000 Server SP4, Windows 2000 Professional SP4, and Windows XP SP2 allows attackers to execute arbitrary code via a long string in an opnum 0x06 RPC call to port 2103. NOTE: this is remotely exploitable on Windows 2000 Server.",2007-12-12,Metasploit,cpe:2.3:a:microsoft:message_queuing:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:pro:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:srv:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:* CVE-2007-3068,0.0,,0.7945,Stack-based buffer overflow in DVD X Player 4.1 Professional allows remote attackers to execute arbitrary code via a PLF playlist containing a long filename.,2007-06-06,Metasploit,cpe:2.3:a:dvd_x_studios:dvd_x_player:4.1:*:professional:*:*:*:*:* CVE-2007-3147,0.0,,0.58205,Buffer overflow in the Yahoo! Webcam Upload ActiveX control in ywcupl.dll 2.0.1.4 for Yahoo! Messenger 8.1.0.249 allows remote attackers to execute arbitrary code via a long server property value to the send method. NOTE: some of these details are obtained from third party information.,2007-06-11,Metasploit,cpe:2.3:a:yahoo:messenger:2.0.1.4:*:*:*:*:*:*:*;cpe:2.3:a:yahoo:messenger:8.0.0.863:*:*:*:*:*:*:*;cpe:2.3:a:yahoo:messenger:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:yahoo:messenger:8.0:*:*:*:*:*:*:*;cpe:2.3:a:yahoo:messenger:8.0_2005.1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:yahoo:messenger:8.1.0.249:*:*:*:*:*:*:* CVE-2007-3216,0.0,,0.60166,"Multiple buffer overflows in the LGServer component of CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.1 allow remote attackers to execute arbitrary code via crafted arguments to the (1) rxsAddNewUser, (2) rxsSetUserInfo, (3) rxsRenameUser, (4) rxsSetMessageLogSettings, (5) rxsExportData, (6) rxsSetServerOptions, (7) rxsRenameFile, (8) rxsACIManageSend, (9) rxsExportUser, (10) rxsImportUser, (11) rxsMoveUserData, (12) rxsUseLicenseIni, (13) rxsLicGetSiteId, (14) rxsGetLogFileNames, (15) rxsGetBackupLog, (16) rxsBackupComplete, (17) rxsSetDataProtectionSecurityData, (18) rxsSetDefaultConfigName, (19) rxsGetMessageLogSettings, (20) rxsHWDiskGetTotal, (21) rxsHWDiskGetFree, (22) rxsGetSubDirs, (23) rxsGetServerDBPathName, (24) rxsSetServerOptions, (25) rxsDeleteFile, (26) rxsACIManageSend, (27) rxcReadBackupSetList, (28) rxcWriteConfigInfo, (29) rxcSetAssetManagement, (30) rxcWriteFileListForRestore, (31) rxcReadSaveSetProfile, (32) rxcInitSaveSetProfile, (33) rxcAddSaveSetNextAppList, (34) rxcAddSaveSetNextFilesPathList, (35) rxcAddNextBackupSetIncWildCard, (36) rxcGetRevisions, (37) rxrAddMovedUser, (38) rxrSetClientVersion, or (39) rxsSetDataGrowthScheduleAndFilter commands.",2007-06-14,Metasploit,cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:*:*:*:*:*:*:* CVE-2007-3280,0.0,,0.56641,"The Database Link library (dblink) in PostgreSQL 8.1 implements functions via CREATE statements that map to arbitrary libraries based on the C programming language, which allows remote authenticated superusers to map and execute a function from any library, as demonstrated by using the system function in libc.so.6 to gain shell access.",2007-06-19,Metasploit,cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:* CVE-2007-3314,0.0,,0.76114,"Stack-based buffer overflow in peviewer.spl in Altap Servant Salamander 2.5 with Portable Executable Viewer 2.02 (English Trial), and 2.0 with Portable Executable Viewer 1.00 (English Trial), allows remote attackers to execute arbitrary code via a long PDB debug filename in a PE file.",2007-06-21,Metasploit,cpe:2.3:a:altap:portable_executable_viewer:1.00:*:english_trial:*:*:*:*:*;cpe:2.3:a:altap:portable_executable_viewer:2.02:*:english_trial:*:*:*:*:*;cpe:2.3:a:altap:servant_salamander:2.0:*:*:*:*:*:*:*;cpe:2.3:a:altap:servant_salamander:2.5:*:*:*:*:*:*:* CVE-2007-3389,0.0,,0.22887,"Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload.",2007-06-26,Metasploit,cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:* CVE-2007-3435,0.0,,0.76141,Stack-based buffer overflow in the BeginPrint method in a certain ActiveX control in RKD Software (barcodetools.com) BarCodeAx.dll 4.9 allows remote attackers to execute arbitrary code via a long argument.,2007-06-27,Metasploit,cpe:2.3:a:rkd_software:barcode_activex:4.9:*:*:*:*:*:*:* CVE-2007-3566,0.0,,0.74824,Stack-based buffer overflow in the database service (ibserver.exe) in Borland InterBase 2007 before SP2 allows remote attackers to execute arbitrary code via a long size value in a create request to port 3050/tcp.,2007-07-26,Metasploit,cpe:2.3:a:borland_software:interbase:2007:*:*:*:*:*:*:* CVE-2007-3605,0.0,,0.86968,Stack-based buffer overflow in the kweditcontrol.kwedit.1 ActiveX control in FrontEnd\SapGui\kwedit.dll in the EnjoySAP SAP GUI allows remote attackers to execute arbitrary code via a long argument to the PrepareToPostHTML function.,2007-07-06,Metasploit,cpe:2.3:a:sap:enjoysap:*:*:*:*:*:*:*:* CVE-2007-3614,0.0,,0.7771,"Multiple stack-based buffer overflows in waHTTP.exe (aka the SAP DB Web Server) in SAP DB, possibly 7.3 through 7.5, allow remote attackers to execute arbitrary code via (1) a certain cookie value; (2) a certain additional parameter, related to sapdbwa_GetQueryString; and other unspecified vectors related to ""numerous other fields.""",2007-07-06,Metasploit,cpe:2.3:a:sap:sap_db:7.3.00:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_db:7.3.29:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_db:7.4.03.29:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_db:7.4.03.30:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_db:7.4.3.7_beta:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_db:7.4.3:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_db:7.4:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_db:7.5:*:*:*:*:*:*:* CVE-2007-3872,0.0,,0.71103,"Multiple stack-based buffer overflows in the Shared Trace Service (OVTrace) service for HP OpenView Operations A.07.50 for Windows, and possibly earlier versions, allow remote attackers to execute arbitrary code via certain crafted requests.",2007-08-09,Metasploit,cpe:2.3:a:hp:openview_operations:*:*:windows:*:*:*:*:*;cpe:2.3:a:hp:shared_trace_service:*:*:*:*:*:*:*:* CVE-2007-3901,0.0,,0.78531,Stack-based buffer overflow in the DirectShow Synchronized Accessible Media Interchange (SAMI) parser in quartz.dll for Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted SAMI file.,2007-12-12,Metasploit,cpe:2.3:a:microsoft:directx:10.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:5.2:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:6.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:7.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:7.0a:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:7.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:8.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:8.0a:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:8.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:8.1a:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:8.1b:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:8.2:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:9.0a:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:9.0b:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:9.0c:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web_edition:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:professional:*:*:*:*:* CVE-2007-3925,0.0,,0.90441,Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.,2007-07-21,Metasploit,cpe:2.3:a:ipswitch:imail_server:*:*:*:*:*:*:*:*;cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:*:*:*:*:*:*:*:* CVE-2007-4006,0.0,,0.66371,"Buffer overflow in Mike Dubman Windows RSH daemon (rshd) 1.7 has unknown impact and remote attack vectors, aka ZD-00000034. NOTE: this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. A CVE has been assigned for tracking purposes, but duplicates with other CVEs are difficult to determine.",2007-07-26,Metasploit,cpe:2.3:a:mike_dubman:windows_rsh_daemon:1.7:*:*:*:*:*:*:* CVE-2007-4370,0.0,,0.7605,Multiple buffer overflows in the (1) client and (2) server in Racer 0.5.3 beta 5 allow remote attackers to execute arbitrary code via a long string to UDP port 26000.,2007-08-15,Metasploit,cpe:2.3:a:racer:racer:0.5.3:*:*:*:*:*:*:* CVE-2007-4387,0.0,,0.52822,"Cross-site request forgery (CSRF) vulnerability in /xslt in 2wire 1701HG and 2071 Gateway routers, with 3.17.5 and 5.29.51 software, allows remote attackers to perform certain configuration changes as administrators.",2007-08-17,Metasploit,cpe:2.3:h:2wire:1701hg_router:3.17.5:*:*:*:*:*:*:*;cpe:2.3:h:2wire:1701hg_router:5.29.51:*:*:*:*:*:*:*;cpe:2.3:h:2wire:2071_router:3.17.5:*:*:*:*:*:*:*;cpe:2.3:h:2wire:2071_router:5.29.51:*:*:*:*:*:*:* CVE-2007-4440,0.0,,0.81335,"Stack-based buffer overflow in the MercuryS SMTP server in Mercury Mail Transport System, possibly 4.51 and earlier, allows remote attackers to execute arbitrary code via a long AUTH CRAM-MD5 string. NOTE: this might overlap CVE-2006-5961.",2007-08-21,Metasploit,cpe:2.3:a:pmail:mercury_mail_transport_system:*:*:*:*:*:*:*:* CVE-2007-4466,0.0,,0.66935,Multiple stack-based buffer overflows in Electronic Arts (EA) SnoopyCtrl ActiveX control (NPSnpy.dll) allow remote attackers to execute arbitrary code via unspecified methods and parameters.,2007-10-09,Metasploit,cpe:2.3:a:electronic_arts:snoopyctrl:*:*:*:*:*:*:*:* CVE-2007-4474,0.0,,0.87468,"Multiple stack-based buffer overflows in the IBM Lotus Domino Web Access ActiveX control, as provided by inotes6.dll, inotes6w.dll, dwa7.dll, and dwa7w.dll, in Domino 6.x and 7.x allow remote attackers to execute arbitrary code, as demonstrated by an overflow from a long General_ServerName property value when calling the InstallBrowserHelperDll function in the Upload Module in the dwa7.dwa7.1 control in dwa7w.dll 7.0.34.1.",2007-12-27,Metasploit,cpe:2.3:a:ibm:domino_web_access:6.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.5.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.5.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:7.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino_web_access:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino_web_access:7.0.34.1:*:*:*:*:*:*:* CVE-2007-4475,0.0,,0.68002,Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method.,2009-04-01,Metasploit,cpe:2.3:a:sap:sapgui:*:*:*:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6:*:*:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6:*:windows:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6a:*:*:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6a:*:windows:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6b:*:*:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6b:*:windows:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6c:*:*:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6c:*:windows:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6d:*:*:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6d:*:windows:*:*:*:*:*;cpe:2.3:a:sap:sapgui:6.40:*:*:*:*:*:*:* CVE-2007-4504,0.0,,0.0006,Directory traversal vulnerability in index.php in the RSfiles component (com_rsfiles) 1.0.2 and earlier for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the path parameter in a files.display action.,2007-08-23,Nuclei,cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:* CVE-2007-4515,0.0,,0.72612,Buffer overflow in a certain ActiveX control in YVerInfo.dll before 2007.8.27.1 in the Yahoo! services suite for Yahoo! Messenger before 8.1.0.419 allows remote attackers to execute arbitrary code via unspecified vectors involving arguments to the (1) fvCom and (2) info methods. NOTE: some of these details are obtained from third party information.,2007-08-31,Metasploit,cpe:2.3:a:yahoo:messenger:*:*:*:*:*:*:*:* CVE-2007-4556,0.0,,0.02359,"Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via form input beginning with a ""%{"" sequence and ending with a ""}"" character.",2007-08-28,Nuclei,cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:* CVE-2007-4560,0.0,,0.91095,"clamav-milter in ClamAV before 0.91.2, when run in black hole mode, allows remote attackers to execute arbitrary commands via shell metacharacters that are used in a certain popen call, involving the ""recipient field of sendmail.""",2007-08-28,Metasploit,cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* CVE-2007-4607,0.0,,0.79668,"Buffer overflow in the EasyMailSMTPObj ActiveX control in emsmtp.dll 6.0.1 in the Quiksoft EasyMail SMTP Object, as used in Postcast Server Pro 3.0.61 and other products, allows remote attackers to execute arbitrary code via a long argument to the SubmitToExpress method, a different vulnerability than CVE-2007-1029. NOTE: this may have been fixed in version 6.0.3.15.",2007-08-31,Metasploit,cpe:2.3:a:gate_comm_software:postcast_server_pro:3.0.61:*:*:*:*:*:*:*;cpe:2.3:a:quicksoft:easymail_objects:*:*:*:*:*:*:*:* CVE-2007-4620,0.0,,0.75811,"Multiple stack-based buffer overflows in Computer Associates (CA) Alert Notification Service (Alert.exe) 8.1.586.0, 8.0.450.0, and 7.1.758.0, as used in multiple CA products including Anti-Virus for the Enterprise 7.1 through r11.1 and Threat Manager for the Enterprise 8.1 and r8, allow remote authenticated users to execute arbitrary code via crafted RPC requests.",2008-04-07,Metasploit,cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:*;cpe:2.3:a:ca:threat_manager_for_the_enterprise:r8.1:*:*:*:*:*:*:*;cpe:2.3:a:ca:threat_manager_for_the_enterprise:r8:*:*:*:*:*:*:* CVE-2007-4776,0.0,,0.81829,"Buffer overflow in Microsoft Visual Basic 6.0 and Enterprise Edition 6.0 SP6 allows user-assisted remote attackers to execute arbitrary code via a Visual Basic project (vbp) file containing a long Reference line, related to VBP_Open and OLE. NOTE: there are limited usage scenarios under which this would be a vulnerability.",2007-09-10,Metasploit,cpe:2.3:a:microsoft:visual_basic:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_basic:6.0:sp6:enterprise:*:*:*:*:* CVE-2007-4880,0.0,,0.88938,"Buffer overflow in the Client Acceptor Daemon (CAD), dsmcad.exe, in certain IBM Tivoli Storage Manager (TSM) clients 5.1 before 5.1.8.1, 5.2 before 5.2.5.2, 5.3 before 5.3.5.3, and 5.4 before 5.4.1.2 allows remote attackers to execute arbitrary code via crafted HTTP headers, aka IC52905.",2007-09-28,Metasploit,cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4:*:*:*:*:*:*:* CVE-2007-4915,0.0,,0.78618,"The Intersil isl3893 extensions for Boa 0.93.15, as used on the FreeLan RO80211G-AP and other devices, do not prevent stack writes from entering memory locations used for string constants, which allows remote attackers to change the admin password stored in memory via a long username in an HTTP Basic Authentication request.",2007-09-17,Metasploit,cpe:2.3:a:boa:boa_webserver:0.93.15:*:*:*:*:*:*:* CVE-2007-5003,0.0,,0.82085,"Multiple stack-based buffer overflows in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 allow remote attackers to execute arbitrary code via a long (1) username or (2) password to the rxrLogin command in rxRPC.dll, or a long (3) username argument to the GetUserInfo function.",2007-10-01,Metasploit,cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:4.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:desktop_management_suite:11.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:desktop_management_suite:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:desktop_management_suite:11.2:*:*:*:*:*:*:*;cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:* CVE-2007-5067,0.0,,0.83256,Multiple buffer overflows in iMatix Xitami Web Server 2.5c2 allow remote attackers to execute arbitrary code via a long If-Modified-Since header to (1) xigui32.exe or (2) xitami.exe.,2007-09-24,Metasploit,cpe:2.3:a:imatix:xitami:2.5_c2:*:*:*:*:*:*:* CVE-2007-5082,0.0,,0.70512,"Multiple stack-based buffer overflows in Computer Associates (CA) BrightStor Hierarchical Storage Manager (HSM) before r11.6 allow remote attackers to execute arbitrary code via unspecified CsAgent service commands with certain opcodes, related to missing validation of a length parameter.",2007-10-01,Metasploit,cpe:2.3:a:broadcom:brightstor_hierarchical_storage_manager:11.5:*:*:*:*:*:*:* CVE-2007-5107,0.0,,0.76187,"Stack-based buffer overflow in the AskJeevesToolBar.SettingsPlugin.1 ActiveX control in askBar.dll in IAC Search & Media ask.com Ask Toolbar 4.0.2.53 and earlier allows remote attackers to execute arbitrary code via a long ShortFormat property value. NOTE: some of these details are obtained from third party information. NOTE: the researcher claims that this is the same as CVE-2007-5108, but there is insufficient detail for CVE-2007-5108 to be certain.",2007-09-26,Metasploit,cpe:2.3:a:ask.com:ask_toolbar:*:*:*:*:*:*:*:* CVE-2007-5208,0.0,,0.73524,"hpssd in Hewlett-Packard Linux Imaging and Printing Project (hplip) 1.x and 2.x before 2.7.10 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a from address, which is not properly handled when invoking sendmail.",2007-10-13,Metasploit,cpe:2.3:a:hp:linux_imaging_and_printing_project:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:linux_imaging_and_printing_project:1.0:*:*:*:*:*:*:* CVE-2007-5217,0.0,,0.65697,"Stack-based buffer overflow in the ADM4 ActiveX control in adm4.dll in Altnet Download Manager 4.0.0.6, as used in (1) Kazaa 3.2.7 and (2) Grokster, allows remote attackers to execute arbitrary code via a long argument to the Install method. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.",2007-10-05,Metasploit,cpe:2.3:a:altnet:altnet_download_manager:4.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:grokster:grokster:2.6:*:*:*:*:*:*:*;cpe:2.3:a:kazaa:kazaa_media_desktop:3.2.7:*:*:*:*:*:*:* CVE-2007-5243,0.0,,0.82951,"Multiple stack-based buffer overflows in Borland InterBase LI 8.0.0.53 through 8.1.0.253, and WI 5.1.1.680 through 8.1.0.257, allow remote attackers to execute arbitrary code via (1) a long service attach request on TCP port 3050 to the (a) SVC_attach or (b) INET_connect function, (2) a long create request on TCP port 3050 to the (c) isc_create_database or (d) jrd8_create_database function, (3) a long attach request on TCP port 3050 to the (e) isc_attach_database or (f) PWD_db_aliased function, or unspecified vectors involving the (4) jrd8_attach_database or (5) expand_filename2 function.",2007-10-06,Metasploit,cpe:2.3:a:borland_software:interbase:li_8.0.0.253:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:li_8.0.0.53:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:li_8.0.0.54:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-o6.0.1.6:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-o6.0.2.0:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v5.1.1.680:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v5.5.0.742:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v6.0.0.627:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v6.0.1.0:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v6.0.1.6:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v6.5.0.28:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v7.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v7.5.0.129:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v7.5.1.80:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v8.0.0.123:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi_5.1.1.680:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi_8.1.0.257:*:*:*:*:*:*:* CVE-2007-5244,0.0,,0.76302,"Stack-based buffer overflow in Borland InterBase LI 8.0.0.53 through 8.1.0.253 on Linux, and possibly unspecified versions on Solaris, allows remote attackers to execute arbitrary code via a long attach request on TCP port 3050 to the open_marker_file function.",2007-10-06,Metasploit,cpe:2.3:a:borland_software:interbase:li_8.0.0.253:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:li_8.0.0.53:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:li_8.0.0.54:*:*:*:*:*:*:* CVE-2007-5423,0.0,,0.88231,"tiki-graph_formula.php in TikiWiki 1.9.8 allows remote attackers to execute arbitrary code via PHP sequences in the f array parameter, which are processed by create_function.",2007-10-12,Metasploit,cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.8:*:*:*:*:*:*:* CVE-2007-5511,0.0,,0.63711,"SQL injection vulnerability in Workspace Manager for Oracle Database before OWM 10.2.0.4.1, OWM 10.1.0.8.0, and OWM 9.2.0.8.0 allows attackers to execute arbitrary SQL commands via the FINDRICSET procedure in the LT package. NOTE: this is probably covered by CVE-2007-5510, but there are insufficient details to be certain.",2007-10-17,Metasploit,cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:* CVE-2007-5601,0.0,,0.67392,"Stack-based buffer overflow in the Database Component in MPAMedia.dll in RealNetworks RealPlayer 10.5 and 11 beta, and earlier versions including 10, RealOne Player, and RealOne Player 2, allows remote attackers to execute arbitrary code via certain playlist names, as demonstrated via the import method to the IERPCtl ActiveX control in ierpplug.dll.",2007-10-20,Metasploit,cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11_beta:*:*:*:*:*:*:* CVE-2007-5603,0.0,,0.71288,"Stack-based buffer overflow in the SonicWall SSL-VPN NetExtender NELaunchCtrl ActiveX control before 2.1.0.51, and 2.5.x before 2.5.0.56, allows remote attackers to execute arbitrary code via a long string in the second argument to the AddRouteEntry method.",2007-11-05,Metasploit,cpe:2.3:a:sonicwall:ssl_vpn:*:*:*:*:*:*:*:* CVE-2007-5659,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.93258,Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be subsumed by CVE-2008-0655.,2008-02-12,Metasploit/CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* CVE-2007-5660,0.0,,0.6769,"Unspecified vulnerability in the Update Service ActiveX control in isusweb.dll before 6.0.100.65101 in MacroVision FLEXnet Connect and InstallShield 2008 allows remote attackers to execute arbitrary code via an unspecified ""unsafe method,"" possibly involving a buffer overflow.",2007-11-02,Metasploit,cpe:2.3:a:macrovision:flexnet_connect:*:*:*:*:*:*:*:*;cpe:2.3:a:macrovision:installshield_2008:*:*:*:*:*:*:*:*;cpe:2.3:a:macrovision:update_service:3.0:*:*:*:*:*:*:*;cpe:2.3:a:macrovision:update_service:4.0:*:*:*:*:*:*:*;cpe:2.3:a:macrovision:update_service:5.0:*:*:*:*:*:*:*;cpe:2.3:a:macrovision:update_service:5.1.100_47363:*:*:*:*:*:*:*;cpe:2.3:a:macrovision:update_service:6.0.100_60146:*:*:*:*:*:*:* CVE-2007-5728,0.0,,0.00488,"Cross-site scripting (XSS) vulnerability in phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, different vectors than CVE-2007-2865.",2007-10-30,Nuclei,cpe:2.3:a:phppgadmin:phppgadmin:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:4.1.1:*:*:*:*:*:*:* CVE-2007-5779,0.0,,0.81828,Buffer overflow in the GomManager (GomWeb Control) ActiveX control in GomWeb3.dll 1.0.0.12 in Gretech Online Movie Player (GOM Player) 2.1.6.3499 allows remote attackers to execute arbitrary code via a long argument to the OpenUrl method.,2007-11-01,Metasploit,cpe:2.3:a:gom_player:gom_player:2.1.6.3499:*:*:*:*:*:*:* CVE-2007-5863,0.0,,0.74389,"Software Update in Apple Mac OS X 10.5.1 allows remote attackers to execute arbitrary commands via a man-in-the-middle (MITM) attack between the client and the server, using a modified distribution definition file with the ""allow-external-scripts"" option.",2007-12-19,Metasploit,cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:* CVE-2007-6016,0.0,,0.7098,"Multiple stack-based buffer overflows in the PVATLCalendar.PVCalendar.1 ActiveX control in pvcalendar.ocx in the scheduler component in the Media Server in Symantec Backup Exec for Windows Server (BEWS) 11d 11.0.6235 and 11.0.7170, and 12.0 12.0.1364, allow remote attackers to execute arbitrary code via a long (1) _DOWText0, (2) _DOWText1, (3) _DOWText2, (4) _DOWText3, (5) _DOWText4, (6) _DOWText5, (7) _DOWText6, (8) _MonthText0, (9) _MonthText1, (10) _MonthText2, (11) _MonthText3, (12) _MonthText4, (13) _MonthText5, (14) _MonthText6, (15) _MonthText7, (16) _MonthText8, (17) _MonthText9, (18) _MonthText10, or (19) _MonthText11 property value when executing the Save method. NOTE: the vendor states ""Authenticated user involvement required,"" but authentication is not needed to attack a client machine that loads this control.",2008-02-29,Metasploit,cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.6235:*:*:*:*:*:*;cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.7170:*:*:*:*:*:*;cpe:2.3:a:symantec:backup_exec_for_windows_server:12.0:12.0.1364:*:*:*:*:*:* CVE-2007-6165,0.0,,0.38553,"Mail in Apple Mac OS X Leopard (10.5.1) allows user-assisted remote attackers to execute arbitrary code via an AppleDouble attachment containing an apparently-safe file type and script in a resource fork, which does not warn the user that a separate program is going to be executed. NOTE: this is a regression error related to CVE-2006-0395.",2007-11-29,Metasploit,cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:* CVE-2007-6166,0.0,,0.84232,"Stack-based buffer overflow in Apple QuickTime before 7.3.1, as used in QuickTime Player on Windows XP and Safari on Mac OS X, allows remote Real Time Streaming Protocol (RTSP) servers to execute arbitrary code via an RTSP response with a long Content-Type header.",2007-11-29,Metasploit,cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:* CVE-2007-6204,0.0,,0.81604,"Multiple stack-based buffer overflows in HP OpenView Network Node Manager (OV NNM) 6.41, 7.01, and 7.51 allow remote attackers to execute arbitrary code via unspecified long arguments to (1) ovlogin.exe, (2) OpenView5.exe, (3) snmpviewer.exe, and (4) webappmon.exe, as demonstrated via a long Action parameter to OpenView5.exe.",2007-12-13,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:6.41:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:* CVE-2007-6377,0.0,,0.82776,Stack-based buffer overflow in the PassThru functionality in ext.dll in BadBlue 2.72b and earlier allows remote attackers to execute arbitrary code via a long query string.,2007-12-15,Metasploit,cpe:2.3:a:badblue:badblue:*:*:*:*:*:*:*:* CVE-2007-6507,0.0,,0.7136,"SpntSvc.exe daemon in Trend Micro ServerProtect 5.58 for Windows, before Security Patch 4, exposes unspecified dangerous sub-functions from StRpcSrv.dll in the DCE/RPC interface, which allows remote attackers to obtain ""full file system access"" and execute arbitrary code.",2007-12-20,Metasploit,cpe:2.3:a:trend_micro:serverprotect:5.58_security_patch_3:*:windows:*:*:*:*:* CVE-2007-6509,0.0,,0.71369,Unspecified vulnerability in Appian Enterprise Business Process Management (BPM) Suite 5.6 SP1 allows remote attackers to cause a denial of service via a crafted packet to port 5400/tcp.,2007-12-21,Metasploit,cpe:2.3:a:appian:business_process_management_suite:5.6:sp1:*:*:*:*:*:* CVE-2007-6530,0.0,,0.65752,"Buffer overflow in the XUpload.ocx ActiveX control in Persits Software XUpload 2.1.0.1, and probably other versions before 3.0, as used by HP Mercury LoadRunner and Groove Virtual Office, allows remote attackers to execute arbitrary code via a long argument to the AddFolder function.",2007-12-27,Metasploit,cpe:2.3:a:groove:virtual_office:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:*:*:*:*:*:*:*:*;cpe:2.3:a:persits:xupload:2.1.0.1:*:*:*:*:*:*:* CVE-2007-6750,0.0,,0.87964,"The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.",2011-12-27,Metasploit,cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.2.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.30:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.31:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.32:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.33:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.34:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.35:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.36:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.37:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.38:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.39:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.41:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.42:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.65:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.68:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.99:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:* CVE-2008-0015,0.0,,0.8358,"Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted web page, as exploited in the wild in July 2009, aka ""Microsoft Video ActiveX Control Vulnerability.""",2009-07-07,Metasploit,cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2008-0065,0.0,,0.7236,"Multiple stack-based buffer overflows in in_mp3.dll in Winamp 5.21, 5.5, and 5.51 allow remote attackers to execute arbitrary code via a long (1) artist or (2) name tag in Ultravox streaming metadata, related to construction of stream titles.",2008-01-22,Metasploit,cpe:2.3:a:winamp:nullsoft_winamp:5.21:*:*:*:*:*:*:*;cpe:2.3:a:winamp:nullsoft_winamp:5.51:*:*:*:*:*:*:*;cpe:2.3:a:winamp:nullsoft_winamp:5.5:*:*:*:*:*:*:* CVE-2008-0067,0.0,,0.74623,"Multiple stack-based buffer overflows in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allow remote attackers to execute arbitrary code via (1) long string parameters to the OpenView5.exe CGI program; (2) a long string parameter to the OpenView5.exe CGI program, related to ov.dll; or a long string parameter to the (3) getcvdata.exe, (4) ovlaunch.exe, or (5) Toolbar.exe CGI program.",2009-01-08,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:* CVE-2008-0226,0.0,,0.91936,"Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) ""input_buffer& operator>>"" in yassl_imp.cpp.",2008-01-10,Metasploit,cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.50:sp1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.60:sp1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*;cpe:2.3:a:yassl:yassl:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* CVE-2008-0244,0.0,,0.89824,"SAP MaxDB 7.6.03 build 007 and earlier allows remote attackers to execute arbitrary commands via ""&&"" and other shell metacharacters in exec_sdbinfo and other unspecified commands, which are executed when MaxDB invokes cons.exe.",2008-01-12,Metasploit,cpe:2.3:a:sap:maxdb:*:*:*:*:*:*:*:* CVE-2008-0311,0.0,,0.65003,Stack-based buffer overflow in the PGMWebHandler::parse_request function in the StarTeam Multicast Service component (STMulticastService) 6.4 in Borland CaliberRM 2006 allows remote attackers to execute arbitrary code via a large HTTP request.,2008-04-06,Metasploit,cpe:2.3:a:borland:caliberrm:2006:*:*:*:*:*:*:* CVE-2008-0320,0.0,,0.82,Heap-based buffer overflow in the OLE importer in OpenOffice.org before 2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an OLE file with a crafted DocumentSummaryInformation stream.,2008-04-17,Metasploit,cpe:2.3:a:openoffice:openoffice.org:*:*:*:*:*:*:*:*;cpe:2.3:a:openoffice:openoffice.org:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:openoffice:openoffice.org:2.1:*:*:*:*:*:*:*;cpe:2.3:a:openoffice:openoffice.org:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:openoffice:openoffice.org:2.2:*:*:*:*:*:*:*;cpe:2.3:a:openoffice:openoffice.org:2.3:*:*:*:*:*:*:* CVE-2008-0492,0.0,,0.6666,Stack-based buffer overflow in the Persits.XUpload.2 ActiveX control in XUpload.ocx 3.0.0.4 and earlier in Persits XUpload 3.0 allows remote attackers to execute arbitrary code via a long argument to the AddFile method. NOTE: some of these details are obtained from third party information.,2008-01-30,Metasploit,cpe:2.3:a:persits:xupload:3.0:*:*:*:*:*:*:* CVE-2008-0506,0.0,,0.88385,"include/imageObjectIM.class.php in Coppermine Photo Gallery (CPG) before 1.4.15, when the ImageMagick picture processing method is configured, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) quality, (2) angle, or (3) clipval parameter to picEditor.php.",2008-01-31,Metasploit,cpe:2.3:a:coppermine:coppermine_photo_gallery:*:*:*:*:*:*:*:* CVE-2008-0550,0.0,,0.68157,"Off-by-one error in Steamcast 0.9.75 and earlier allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a certain HTTP request that leads to a buffer overflow, as demonstrated by a long User-Agent header.",2008-02-01,Metasploit,cpe:2.3:a:radio_toolbox:steamcast:*:*:*:*:*:*:*:* CVE-2008-0610,0.0,,0.74834,"Stack-based buffer overflow in the ClientConnection::NegotiateProtocolVersion function in vncviewer/ClientConnection.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mode or when using the DSM plugin, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a modified size value.",2008-02-06,Metasploit,cpe:2.3:a:ultravnc:ultravnc:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ultravnc:ultravnc:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc6:*:*:*:*:*:*:*;cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc7:*:*:*:*:*:*:*;cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc8:*:*:*:*:*:*:* CVE-2008-0621,0.0,,0.88155,"Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands.",2008-02-06,Metasploit,cpe:2.3:a:sap:sapgui:7.10:*:*:*:*:*:*:*;cpe:2.3:a:sap:saplpd:*:*:*:*:*:*:*:*;cpe:2.3:a:sap:sapsprint:*:*:*:*:*:*:*:* CVE-2008-0655,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.69964,Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.,2008-02-07,CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* CVE-2008-0702,0.0,,0.16074,"Multiple heap-based buffer overflows in Titan FTP Server 6.03 and 6.0.5.549 allow remote attackers to cause a denial of service (daemon crash or hang) and possibly execute arbitrary code via a long argument to the (1) USER or (2) PASS command, different vectors than CVE-2004-1641.",2008-02-12,Nuclei,cpe:2.3:a:south_river_technologies:titan_ftp_server:6.0.5.549:*:*:*:*:*:*:*;cpe:2.3:a:south_river_technologies:titan_ftp_server:6.03:*:*:*:*:*:*:* CVE-2008-0871,0.0,,0.70217,Multiple stack-based buffer overflows in Now SMS/MMS Gateway 2007.06.27 and earlier allow remote attackers to execute arbitrary code via a (1) long password in an Authorization header to the HTTP service or a (2) large packet to the SMPP service.,2008-02-21,Metasploit,cpe:2.3:a:now:sms_mms_gateway:*:*:*:*:*:*:*:* CVE-2008-0926,0.0,,0.65873,"The SOAP interface to the eMBox module in Novell eDirectory 8.7.3.9 and earlier, and 8.8.x before 8.8.2, relies on client-side authentication, which allows remote attackers to bypass authentication via requests for /SOAP URIs, and cause a denial of service (daemon shutdown) or read arbitrary files. NOTE: it was later reported that 8.7.3.10 (aka 8.7.3 SP10) is also affected.",2008-03-28,Metasploit,cpe:2.3:a:novell:edirectory:*:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.3.8:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.3.8_presp9:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.3.9:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.3:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.8:*:*:*:*:*:*:* CVE-2008-0935,0.0,,0.82864,Stack-based buffer overflow in the Novell iPrint Control ActiveX control in ienipp.ocx in Novell iPrint Client before 4.34 allows remote attackers to execute arbitrary code via a long argument to the ExecuteRequest method.,2008-02-25,Metasploit,cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint_client:4.26:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint_client:4.32:*:*:*:*:*:*:* CVE-2008-0955,0.0,,0.73958,Stack-based buffer overflow in the Creative Software AutoUpdate Engine ActiveX control in CTSUEng.ocx allows remote attackers to execute arbitrary code via a long CacheFolder property value.,2008-05-29,Metasploit,cpe:2.3:a:creative:creative_software_autoupdate_engine:*:*:*:*:*:*:*:* CVE-2008-1059,0.0,,0.00265,PHP remote file inclusion vulnerability in modules/syntax_highlight.php in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the libpath parameter.,2008-02-28,Nuclei,cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:sniplets_plugin:1.2.2:*:*:*:*:*:*:* CVE-2008-1061,0.0,,0.00155,"Multiple cross-site scripting (XSS) vulnerabilities in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) text parameter to (a) warning.php, (b) notice.php, and (c) inset.php in view/sniplets/, and possibly (d) modules/execute.php; the (2) url parameter to (e) view/admin/submenu.php; and the (3) page parameter to (f) view/admin/pager.php.",2008-02-28,Nuclei,cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:sniplets_plugin:1.2.2:*:*:*:*:*:*:* CVE-2008-1117,0.0,,0.77307,"Directory traversal vulnerability in the Notes (aka Flash Notes or instant messages) feature in tb2ftp.dll in Timbuktu Pro 8.6.5 for Windows, and possibly 8.7 for Mac OS X, allows remote attackers to upload files to arbitrary locations via a destination filename with a \ (backslash) character followed by ../ (dot dot slash) sequences. NOTE: this can be leveraged for code execution by writing to a Startup folder. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-4220.",2008-03-14,Metasploit,cpe:2.3:a:netopia:timbuktu_pro:8.6.5:*:windows:*:*:*:*:* CVE-2008-1309,0.0,,0.75492,"The RealAudioObjects.RealAudio ActiveX control in rmoc3260.dll in RealNetworks RealPlayer Enterprise, RealPlayer 10, RealPlayer 10.5 before build 6.0.12.1675, and RealPlayer 11 before 11.0.3 build 6.0.14.806 does not properly manage memory for the (1) Console or (2) Controls property, which allows remote attackers to execute arbitrary code or cause a denial of service (browser crash) via a series of assignments of long string values, which triggers an overwrite of freed heap memory.",2008-03-12,Metasploit,cpe:2.3:a:realnetworks:realplayer:*:*:enterprise:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11:*:*:*:*:*:*:* CVE-2008-1311,0.0,,0.6635,"The TFTP server in PacketTrap pt360 Tool Suite PRO 2.0.3901.0 and earlier allows remote attackers to cause a denial of service (daemon hang) by uploading a file named (1) '|' (pipe), (2) '""' (quotation mark), or (3) ""<>"" (less than, greater than); or (4) a file with a long name. NOTE: the issue for vector 4 might exist because of an incomplete fix for CVE-2008-1312.",2008-03-12,Metasploit,cpe:2.3:a:packettrap:pt360_tool_suite_pro:*:*:*:*:*:*:*:* CVE-2008-1358,0.0,,0.7623,Stack-based buffer overflow in the IMAP server in Alt-N Technologies MDaemon 9.6.4 allows remote authenticated users to execute arbitrary code via a FETCH command with a long BODY.,2008-03-17,Metasploit,cpe:2.3:a:altn:mdaemon:9.6.4:*:*:*:*:*:*:* CVE-2008-1365,0.0,,0.75208,"Stack-based buffer overflow in Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long encrypted password, which triggers the overflow in (1) cgiChkMasterPwd.exe, (2) policyserver.exe as reachable through cgiABLogon.exe, and other vectors.",2008-03-17,Metasploit,cpe:2.3:a:trend_micro:officescan_corporate_edition:*:*:*:*:*:*:*:* CVE-2008-1447,6.8,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N,0.86321,"The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka ""DNS Insufficient Socket Entropy Vulnerability"" or ""the Kaminsky bug.""",2008-07-08,Metasploit,cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*;cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*;cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:* CVE-2008-1472,0.0,,0.75854,"Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method.",2008-03-24,Metasploit,cpe:2.3:a:computer_associates:brightstor_arcserve_backup_laptops_desktops:11.5:*:*:*:*:*:*:*;cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:a:*:*:*:*:*:*;cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:c1:*:*:*:*:*:*;cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:ga:*:*:*:*:*:*;cpe:2.3:a:computer_associates:desktop_management_suite:r11.2:*:*:*:*:*:*:*;cpe:2.3:a:computer_associates:unicenter_dsm_r11_list_control_atx:11.2.3.1895:*:*:*:*:*:*:*;cpe:2.3:a:unicenter:asset_management:r11.1:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:asset_management:r11.1:c1:*:*:*:*:*:*;cpe:2.3:a:unicenter:asset_management:r11.1:ga:*:*:*:*:*:*;cpe:2.3:a:unicenter:asset_management:r11.2:*:*:*:*:*:*:*;cpe:2.3:a:unicenter:asset_management:r11.2:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:asset_management:r11.2:c1:*:*:*:*:*:*;cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:c1:*:*:*:*:*:*;cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:ga:*:*:*:*:*:*;cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:*:*:*:*:*:*:*;cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:c1:*:*:*:*:*:*;cpe:2.3:a:unicenter:remote_control:r11.1:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:remote_control:r11.1:c1:*:*:*:*:*:*;cpe:2.3:a:unicenter:remote_control:r11.1:ga:*:*:*:*:*:*;cpe:2.3:a:unicenter:remote_control:r11.2:*:*:*:*:*:*:*;cpe:2.3:a:unicenter:remote_control:r11.2:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:remote_control:r11.2:c1:*:*:*:*:*:*;cpe:2.3:a:unicenter:software_delivery:r11.1:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:software_delivery:r11.1:c1:*:*:*:*:*:*;cpe:2.3:a:unicenter:software_delivery:r11.1:ga:*:*:*:*:*:*;cpe:2.3:a:unicenter:software_delivery:r11.2:*:*:*:*:*:*:*;cpe:2.3:a:unicenter:software_delivery:r11.2:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:software_delivery:r11.2:c1:*:*:*:*:*:* CVE-2008-1491,0.0,,0.8669,Stack-based buffer overflow in the DPC Proxy server (DpcProxy.exe) in ASUS Remote Console (aka ARC or ASMB3) 2.0.0.19 and 2.0.0.24 allows remote attackers to execute arbitrary code via a long string to TCP port 623.,2008-03-25,Metasploit,cpe:2.3:a:asus:remote_console:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:asus:remote_console:2.0.0.24:*:*:*:*:*:*:* CVE-2008-1547,0.0,,0.65006,Open redirect vulnerability in exchweb/bin/redir.asp in Microsoft Outlook Web Access (OWA) for Exchange Server 2003 SP2 (aka build 6.5.7638) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the URL parameter.,2008-10-21,Nuclei,cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:* CVE-2008-1562,0.0,,0.4219,"The LDAP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.8 allows remote attackers to cause a denial of service (application crash) via a malformed packet, a different vulnerability than CVE-2006-5740.",2008-03-31,Metasploit,cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:* CVE-2008-1602,0.0,,0.76581,"Stack-based buffer overflow in Orbit downloader 2.6.3 and 2.6.4 allows remote attackers to execute arbitrary code via a long download URL, which is not properly handled during Unicode conversion for a balloon notification after a download has failed.",2008-04-06,Metasploit,cpe:2.3:a:orbit_downloader:orbit_downloader:2.6.3:*:*:*:*:*:*:*;cpe:2.3:a:orbit_downloader:orbit_downloader:2.6.4:*:*:*:*:*:*:* CVE-2008-1610,0.0,,0.75087,Stack-based buffer overflow in TallSoft Quick TFTP Server Pro 2.1 allows remote attackers to cause a denial of service or execute arbitrary code via a long mode field in a read or write request.,2008-04-01,Metasploit,cpe:2.3:a:tallsoft_quick:tftp_server_pro:2.1:*:*:*:*:*:*:* CVE-2008-1611,0.0,,0.8243,Stack-based buffer overflow in TFTP Server SP 1.4 for Windows allows remote attackers to cause a denial of service or execute arbitrary code via a long filename in a read or write request.,2008-04-01,Metasploit,cpe:2.3:a:tftp-server:winagents_tftp_server:sp_1.4:*:windows:*:*:*:*:* CVE-2008-1661,0.0,,0.80524,Stack-based buffer overflow in DoubleTake.exe in HP StorageWorks Storage Mirroring (SWSM) before 4.5 SP2 allows remote attackers to execute arbitrary code via a crafted encoded authentication request.,2008-06-04,Metasploit,cpe:2.3:a:hp:storageworks_storage_mirroring:4.5:sp1:*:*:*:*:*:* CVE-2008-1697,0.0,,0.8345,"Stack-based buffer overflow in ovwparser.dll in HP OpenView Network Node Manager (OV NNM) 7.53, 7.51, and earlier allows remote attackers to execute arbitrary code via a long URI in an HTTP request processed by ovas.exe, as demonstrated by a certain topology/homeBaseView request. NOTE: some of these details are obtained from third party information.",2008-04-08,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:* CVE-2008-1724,0.0,,0.76967,Stack-based buffer overflow in the IActiveXTransfer.FileTransfer method in the SecureTransport FileTransfer ActiveX control in vcst_en.dll 1.0.0.5 in Tumbleweed SecureTransport Server before 4.6.1 Hotfix 20 allows remote attackers to execute arbitrary code via a long remoteFile parameter.,2008-04-11,Metasploit,cpe:2.3:a:tumbleweed:securetransport_server_app:*:*:*:*:*:*:*:*;cpe:2.3:h:tumbleweed:securetransport_server:*:*:*:*:*:*:*:* CVE-2008-1898,0.0,,0.79812,"A certain ActiveX control in WkImgSrv.dll 7.03.0616.0, as distributed in Microsoft Works 7 and Microsoft Office 2003 and 2007, allows remote attackers to execute arbitrary code or cause a denial of service (browser crash) via an invalid WksPictureInterface property value, which triggers an improper function call.",2008-04-21,Metasploit,cpe:2.3:a:microsoft:office:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:works:7.0:*:*:*:*:*:*:* CVE-2008-1914,0.0,,0.87013,Stack-based buffer overflow in the AntServer module (AntServer.exe) in BigAnt IM Server in BigAnt Messenger 2.2 allows remote attackers to execute arbitrary code via a long URI in a request to TCP port 6080. NOTE: some of these details are obtained from third party information.,2008-04-22,Metasploit,cpe:2.3:a:bigantsoft:bigant_messenger:2.2:*:*:*:*:*:*:* CVE-2008-2031,0.0,,0.53859,"VicFTPS 5.0 allows remote attackers to cause a denial of service (crash) via a crafted LIST command, which triggers a NULL pointer dereference. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.",2008-04-30,Metasploit,cpe:2.3:a:vicftps:vicftps:5.0:*:*:*:*:*:*:* CVE-2008-2157,0.0,,0.84999,robotd in the Library Manager in EMC AlphaStor 3.1 SP1 for Windows allows remote attackers to execute arbitrary commands via an unspecified string field in a packet to TCP port 3500.,2008-05-29,Metasploit,cpe:2.3:a:emc_corporation:alphastor:3.1_sp1:*:*:*:*:*:*:* CVE-2008-2158,0.0,,0.36377,Multiple stack-based buffer overflows in the Command Line Interface process in the Server Agent in EMC AlphaStor 3.1 SP1 for Windows allow remote attackers to execute arbitrary code via crafted TCP packets to port 41025.,2008-05-29,Metasploit,cpe:2.3:a:emc_corporation:alphastor:3.1_sp1:*:*:*:*:*:*:* CVE-2008-2161,0.0,,0.78902,"Buffer overflow in TFTP Server SP 1.4 and 1.5 on Windows, and possibly other versions, allows remote attackers to execute arbitrary code via a long TFTP error packet. NOTE: some of these details are obtained from third party information.",2008-05-12,Metasploit,cpe:2.3:a:tftp:tftp_server_sp:1.4:*:*:*:*:*:*:*;cpe:2.3:a:tftp:tftp_server_sp:1.5:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:all_windows:*:*:*:*:*:*:*:* CVE-2008-2240,0.0,,0.83949,"Stack-based buffer overflow in the Web Server service in IBM Lotus Domino before 7.0.3 FP1, and 8.x before 8.0.1, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long Accept-Language HTTP header.",2008-05-22,Metasploit,cpe:2.3:a:ibm:lotus_domino:6.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:6.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:7.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:8.0:*:*:*:*:*:*:* CVE-2008-2286,0.0,,0.39749,SQL injection vulnerability in axengine.exe in Symantec Altiris Deployment Solution 6.8.x and 6.9.x before 6.9.176 allows remote attackers to execute arbitrary SQL commands via unspecified string fields in a notification packet.,2008-05-18,Metasploit,cpe:2.3:a:symantec:altiris_deployment_solution:6.8:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:* CVE-2008-2398,0.0,,0.00777,Cross-site scripting (XSS) vulnerability in index.php in AppServ Open Project 2.5.10 and earlier allows remote attackers to inject arbitrary web script or HTML via the appservlang parameter.,2008-05-21,Nuclei,cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.1:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.2:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.3:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.4:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.4a:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.5:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.6:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.7:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.8:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.9:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.2:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.3:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.4:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.4a:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.5:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.6:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.7:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.8:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.9:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5:*:*:*:*:*:*:* CVE-2008-2439,0.0,,0.44618,"Directory traversal vulnerability in the UpdateAgent function in TmListen.exe in the OfficeScanNT Listener service in the client in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and other builds before 1372, OfficeScan 8.0 SP1 before build 1222, OfficeScan 8.0 SP1 Patch 1 before build 3087, and Worry-Free Business Security 5.0 before build 1220 allows remote attackers to read arbitrary files via directory traversal sequences in an HTTP request. NOTE: some of these details are obtained from third party information.",2008-10-03,Metasploit,cpe:2.3:a:trend_micro:officescan:7.3:*:*:*:*:*:*:*;cpe:2.3:a:trend_micro:officescan:8.0:sp1:*:*:*:*:*:*;cpe:2.3:a:trend_micro:officescan:8.0:sp1_patch1:*:*:*:*:*:*;cpe:2.3:a:trend_micro:worry_free_business_security:5.0:*:*:*:*:*:*:* CVE-2008-2463,0.0,,0.84093,"The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.",2008-07-07,Metasploit,cpe:2.3:a:microsoft:office_snapshot_viewer_activex:office2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_snapshot_viewer_activex:office_2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_snapshot_viewer_activex:office_xp:*:*:*:*:*:*:* CVE-2008-2499,0.0,,0.76393,"Stack-based buffer overflow in the Community Services Multiplexer (aka MUX or StMux.exe) in IBM Lotus Sametime 7.5.1 CF1 and earlier, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code via a crafted URL.",2008-05-29,Metasploit,cpe:2.3:a:ibm:lotus_sametime:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_sametime:7.5.1:cf1:*:*:*:*:*:* CVE-2008-2551,0.0,,0.85104,"The DownloaderActiveX Control (DownloaderActiveX.ocx) in Icona SpA C6 Messenger 1.0.0.1 allows remote attackers to force the download and execution of arbitrary files via a URL in the propDownloadUrl parameter with the propPostDownloadAction parameter set to ""run.""",2008-06-04,Metasploit,cpe:2.3:a:icona:instant_messenger:1.0.0.1:*:*:*:*:*:*:* CVE-2008-2639,0.0,,0.85791,"Stack-based buffer overflow in the ODBC server service in Citect CitectSCADA 6 and 7, and CitectFacilities 7, allows remote attackers to execute arbitrary code via a long string in the second application packet in a TCP session on port 20222.",2008-06-16,Metasploit,cpe:2.3:a:citect:citectfacilities:7:*:*:*:*:*:*:*;cpe:2.3:a:citect:citectscada:6:*:*:*:*:*:*:*;cpe:2.3:a:citect:citectscada:7:*:*:*:*:*:*:* CVE-2008-2650,0.0,,0.01643,"Directory traversal vulnerability in cmsimple/cms.php in CMSimple 3.1, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number.",2008-06-10,Nuclei,cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:* CVE-2008-2683,0.0,,0.79398,"The BIDIB.BIDIBCtrl.1 ActiveX control in BIDIB.ocx 10.9.3.0 in Black Ice Barcode SDK 5.01 allows remote attackers to force the download and storage of arbitrary files by specifying the origin URL in the first argument to the DownloadImageFileURL method, and the local filename in the second argument. NOTE: some of these details are obtained from third party information.",2008-06-12,Metasploit,cpe:2.3:a:black_ice:barcode_sdk:5.01:*:*:*:*:*:*:* CVE-2008-2703,0.0,,0.7077,"Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client before 2.0.3 HP1 for Windows allow remote attackers to execute arbitrary code via ""spoofed server responses"" that contain a long string after the NM_A_SZ_TRANSACTION_ID field name.",2008-06-13,Metasploit,cpe:2.3:a:novell:groupwise_messenger:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise_messenger:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise_messenger:2.0:*:*:*:*:*:*:* CVE-2008-2789,0.0,,0.47316,SQL injection vulnerability in pages/index.php in BASIC-CMS allows remote attackers to execute arbitrary SQL commands via the page_id parameter.,2008-06-20,Metasploit,cpe:2.3:a:basic-cms:basic-cms:*:*:*:*:*:*:*:* CVE-2008-2905,0.0,,0.70556,"PHP remote file inclusion vulnerability in includes/Cache/Lite/Output.php in the Cache_Lite package in Mambo 4.6.4 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.",2008-06-30,Metasploit,cpe:2.3:a:mambo:mambo:4.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.1_1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.1_beta2:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.1_beta:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.1a:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.2.3:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.3h:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5_1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5_1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5_1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5_1.0.3_beta:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5_1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.6.1:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.6.2:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.6.4:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.6:*:*:*:*:*:*:* CVE-2008-2908,0.0,,0.59529,"Multiple stack-based buffer overflows in a certain ActiveX control in ienipp.ocx in Novell iPrint Client for Windows before 4.36 allow remote attackers to execute arbitrary code via a long value of the (1) operation, (2) printer-url, or (3) target-frame parameter. NOTE: some of these details are obtained from third party information.",2008-06-30,Metasploit,cpe:2.3:a:novell:iprint_client:*:*:windows:*:*:*:*:* CVE-2008-2938,0.0,,0.92261,"Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.",2008-08-13,Metasploit,cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* CVE-2008-2992,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.93377,"Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104.",2008-11-04,Metasploit/CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:* CVE-2008-3008,0.0,,0.811,"Stack-based buffer overflow in the WMEncProfileManager ActiveX control in wmex.dll in Microsoft Windows Media Encoder 9 Series allows remote attackers to execute arbitrary code via a long first argument to the GetDetailsString method, aka ""Windows Media Encoder Buffer Overrun Vulnerability.""",2008-09-11,Metasploit,cpe:2.3:a:microsoft:windows_media_encoder:9_series:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows-nt:2008:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2008-3158,0.0,,0.10819,"Unspecified vulnerability in NWFS.SYS in Novell Client for Windows 4.91 SP4 has unknown impact and attack vectors, possibly related to IOCTL requests that overwrite arbitrary memory.",2008-07-11,Metasploit,cpe:2.3:a:novell:novell_client_for_windows:4.91_sp4:*:*:*:*:*:*:* CVE-2008-3257,0.0,,0.78222,"Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after ""POST /.jsp"" in an HTTP request.",2008-07-22,Metasploit,cpe:2.3:a:bea:weblogic_server:10.0:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:3.1.8:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.0:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.5.1:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.5.1:sp15:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.5.2:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.5.2:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.5.2:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.5:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp10:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp11:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp12:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp13:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp3:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp4:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp5:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp6:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp7:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp8:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp9:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.0:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.0:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.0:sp6:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp7:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp8:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:sp7:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:8.1:sp5:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:8.1:sp6:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.0:ga:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.0:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.0:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.0:sp3:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.0:sp4:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.0:sp5:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.1:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.1:ga:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.2:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.2:mp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.2:mp2:*:*:*:*:*:*;cpe:2.3:a:bea_systems:apache_connector_in_weblogic_server:*:*:*:*:*:*:*:*;cpe:2.3:a:bea_systems:weblogic_server:10.0_mp1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:*:*:*:*:*:*:*:* CVE-2008-3273,0.0,,0.29391,"JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2.0.CP03, and 4.3.0 before 4.3.0.CP01, allows remote attackers to obtain sensitive information about ""deployed web contexts"" via a request to the status servlet, as demonstrated by a full=true query string.",2008-08-10,Metasploit,cpe:2.3:a:jboss:enterprise_application_platform:*:*:*:*:*:*:*:*;cpe:2.3:a:jboss:enterprise_application_platform:4.2.0.cp01:*:*:*:*:*:*:*;cpe:2.3:a:jboss:enterprise_application_platform:4.2.0.cp02:*:*:*:*:*:*:* CVE-2008-3431,8.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,0.04564,"The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to gain privileges by opening the \\.\VBoxDrv device and calling DeviceIoControl to send a crafted kernel address.",2008-08-05,CISA,cpe:2.3:a:oracle:virtualbox:*:*:*:*:*:*:*:* CVE-2008-3466,0.0,,0.8472,"Microsoft Host Integration Server (HIS) 2000, 2004, and 2006 does not limit RPC access to administrative functions, which allows remote attackers to bypass authentication and execute arbitrary programs via a crafted SNA RPC message using opcode 1 or 6 to call the CreateProcess function, aka ""HIS Command Execution Vulnerability.""",2008-10-15,Metasploit,cpe:2.3:a:microsoft:host_integration_server_2000:*:*:*:*:client:*:*:*;cpe:2.3:a:microsoft:host_integration_server_2000:*:sp2:*:*:server:*:*:*;cpe:2.3:a:microsoft:host_integration_server_2004:*:*:*:*:client:*:*:*;cpe:2.3:a:microsoft:host_integration_server_2004:*:*:*:*:server:*:*:*;cpe:2.3:a:microsoft:host_integration_server_2004:*:sp1:*:*:server:*:*:*;cpe:2.3:a:microsoft:host_integration_server_2006:*:*:*:*:*:*:x64:*;cpe:2.3:a:microsoft:host_integration_server_2006:*:*:*:*:*:*:x86:* CVE-2008-3558,0.0,,0.79896,Stack-based buffer overflow in the WebexUCFObject ActiveX control in atucfobj.dll in Cisco WebEx Meeting Manager before 20.2008.2606.4919 allows remote attackers to execute arbitrary code via a long argument to the NewObject method.,2008-08-08,Metasploit,cpe:2.3:a:cisco:webex_meeting_manager:20.2008.2601.4928:*:*:*:*:*:*:* CVE-2008-3656,0.0,,0.75848,"Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.",2008-08-13,Metasploit,cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:* CVE-2008-3704,0.0,,0.87473,"Heap-based buffer overflow in the MaskedEdit ActiveX control in Msmask32.ocx 6.0.81.69, and possibly other versions before 6.0.84.18, in Microsoft Visual Studio 6.0, Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 allows remote attackers to execute arbitrary code via a long Mask parameter, related to not ""validating property values with boundary checks,"" as exploited in the wild in August 2008, aka ""Masked Edit Control Memory Corruption Vulnerability.""",2008-08-18,Metasploit,cpe:2.3:a:microsoft:visual_basic:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_foxpro:8.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_foxpro:9.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_foxpro:9.0:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_studio:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_studio_.net:2002:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_studio_.net:2003:sp1:*:*:*:*:*:* CVE-2008-3878,0.0,,0.7193,"Stack-based buffer overflow in the Ultra.OfficeControl ActiveX control in OfficeCtrl.ocx 2.0.2008.801 in Ultra Shareware Ultra Office Control allows remote attackers to execute arbitrary code via long strUrl, strFile, and strPostData parameters to the HttpUpload method.",2008-09-02,Metasploit,cpe:2.3:a:ultrashareware:ultra_office_control:2.0.2008.801:*:*:*:*:*:*:* CVE-2008-3922,0.0,,0.91414,"awstatstotals.php in AWStats Totals 1.0 through 1.14 allows remote attackers to execute arbitrary code via PHP sequences in the sort parameter, which is used by the multisort function when dynamically creating an anonymous PHP function.",2008-09-04,Metasploit,cpe:2.3:a:telartis_bv:awstats_totals:1.0:*:*:*:*:*:*:*;cpe:2.3:a:telartis_bv:awstats_totals:1.11:*:*:*:*:*:*:*;cpe:2.3:a:telartis_bv:awstats_totals:1.13:*:*:*:*:*:*:*;cpe:2.3:a:telartis_bv:awstats_totals:1.14:*:*:*:*:*:*:*;cpe:2.3:a:telartis_bv:awstats_totals:1.1:*:*:*:*:*:*:* CVE-2008-3979,0.0,,0.48682,Unspecified vulnerability in the Oracle Spatial component in Oracle Database 10.1.0.5 and 10.2.0.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors. NOTE: the previous information was obtained from the January 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is a SQL injection vulnerability that allows remote authenticated users to gain MDSYS privileges via the MDSYS.SDO_TOPO_DROP_FTBL trigger.,2009-01-14,Metasploit,cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_10g:10.2.0.2:*:*:*:*:*:*:* CVE-2008-3982,0.0,,0.53142,"Unspecified vulnerability in the Workspace Manager component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to SYS.LT and WMSYS.LT, a different vulnerability than CVE-2008-3983 and CVE-2008-3984.",2008-10-14,Metasploit,cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_10g:10.2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_11i:11.1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_9i:9.2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_9i:9.2.0.8dv:*:*:*:*:*:*:* CVE-2008-3983,0.0,,0.67346,"Unspecified vulnerability in the Workspace Manager component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to SYS.LT and WMSYS.LT, a different vulnerability than CVE-2008-3982 and CVE-2008-3984.",2008-10-14,Metasploit,cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_10g:10.2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_11i:11.1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_9i:9.2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_9i:9.2.0.8dv:*:*:*:*:*:*:* CVE-2008-3984,0.0,,0.67346,"Unspecified vulnerability in the Workspace Manager component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to SYS.LT and WMSYS.LT, a different vulnerability than CVE-2008-3982 and CVE-2008-3983.",2008-10-14,Metasploit,cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_10g:10.2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_11i:11.1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_9i:9.2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_9i:9.2.0.8dv:*:*:*:*:*:*:* CVE-2008-3995,0.0,,0.47398,"Unspecified vulnerability in the Change Data Capture component in Oracle Database 10.1.0.5, 10.2.0.4, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to DBMS_CDC_PUBLISH.",2008-10-14,Metasploit,cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_10g:10.2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_11i:11.1.0.6:*:*:*:*:*:*:* CVE-2008-3996,0.0,,0.37808,"Unspecified vulnerability in the Change Data Capture component in Oracle Database 10.1.0.5, 10.2.0.4, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to SYS.DBMS_CDC_IPUBLISH.",2008-10-14,Metasploit,cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_10g:10.2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_11i:11.1.0.6:*:*:*:*:*:*:* CVE-2008-4008,0.0,,0.85806,"Unspecified vulnerability in the WebLogic Server Plugins for Apache component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2008 CPU. Oracle has not commented on reliable researcher claims that this issue is a stack-based buffer overflow in the WebLogic Apache Connector, related to an invalid parameter.",2008-10-14,Metasploit,cpe:2.3:a:oracle:bea_product_suite:10.0:mp1:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:10.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:6.1:sp7:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:7.0:sp7:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:9.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:9.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:* CVE-2008-4037,0.0,,0.73933,"Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote SMB servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, as demonstrated by backrush, aka ""SMB Credential Reflection Vulnerability."" NOTE: some reliable sources report that this vulnerability exists because of an insufficient fix for CVE-2000-0834.",2008-11-12,Metasploit,cpe:2.3:o:microsoft:windows:server_2003:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:server_2003:sp1:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows:server_2003:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:server_2003:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows:server_2003:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows:server_2003:unknown:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows:xp:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:xp:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows:xp:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:xp:unknown:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:* CVE-2008-4114,0.0,,0.78908,"srv.sys in the Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via an SMB WRITE_ANDX packet with an offset that is inconsistent with the packet size, related to ""insufficiently validating the buffer size,"" as demonstrated by a request to the \PIPE\lsarpc named pipe, aka ""SMB Validation Denial of Service Vulnerability.""",2008-09-16,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:gold:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:gold:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:sp1:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:pro_x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:pro_x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* CVE-2008-4193,0.0,,0.80446,Stack-based buffer overflow in SecurityGateway.dll in Alt-N Technologies SecurityGateway 1.0.1 allows remote attackers to execute arbitrary code via a long username parameter.,2008-09-24,Metasploit,cpe:2.3:a:alt-n:securitygateway:1.0.1:*:*:*:*:*:*:* CVE-2008-4250,0.0,,0.94038,"The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka ""Server Service Vulnerability.""",2008-10-23,Metasploit,cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:-:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x86:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2008-4322,0.0,,0.67533,"Stack-based buffer overflow in RealFlex Technologies Ltd. RealWin Server 2.0, as distributed by DATAC, allows remote attackers to execute arbitrary code via a crafted FC_INFOTAG/SET_CONTROL packet.",2008-09-29,Metasploit,cpe:2.3:a:realflex_technologies_ltd:realwin_server:2.0:*:*:*:*:*:*:* CVE-2008-4384,0.0,,0.62466,"Multiple stack-based buffer overflows in MGI Software LPViewer ActiveX control (LPControl.dll), as acquired by Roxio and iseemedia, allow remote attackers to execute arbitrary code via the (1) url, (2) toolbar, and (3) enableZoomPastMax methods.",2008-10-07,Metasploit,cpe:2.3:a:iseemedia:lpviewer:*:*:*:*:*:*:*:*;cpe:2.3:a:mgi_software:lpviewer:*:*:*:*:*:*:*:*;cpe:2.3:a:roxio:lpviewer:*:*:*:*:*:*:*:* CVE-2008-4385,0.0,,0.74091,"Husdawg, LLC Systems Requirements Lab 3, as used by Instant Expert Analysis, allows remote attackers to force the download and execution of arbitrary programs via by specifiying a malicious website argument to the Init method in (1) a certain ActiveX control (sysreqlab2.cab, sysreqlab.dll, sysreqlabsli.dll, or sysreqlab2.dll) and (2) a certain Java applet in RLApplet.class in sysreqlab2.jar or sysreqlab.jar.",2008-10-14,Metasploit,cpe:2.3:a:systemrequirementslab:system_requirements_lab:3:*:*:*:*:*:*:* CVE-2008-4388,0.0,,0.63442,"The LaunchObj ActiveX control before 5.2.2.865 in launcher.dll in Symantec AppStream Client 5.2.x before 5.2.2 SP3 MP1 does not properly validate downloaded files, which allows remote attackers to execute arbitrary code via the installAppMgr method and unspecified other methods.",2009-01-20,Metasploit,cpe:2.3:a:symantec:appstream_client:5.2:*:*:*:*:*:*:* CVE-2008-4397,0.0,,0.85816,Directory traversal vulnerability in the RPC interface (asdbapi.dll) in CA ARCserve Backup (formerly BrightStor ARCserve Backup) r11.1 through r12.0 allows remote attackers to execute arbitrary commands via a .. (dot dot) in an RPC call with opnum 0x10A.,2008-10-14,Metasploit,cpe:2.3:a:broadcom:arcserve_backup:r12.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:business_protection_suite:r2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:server_protection_suite:r2:*:*:*:*:*:*:*;cpe:2.3:a:ca:arcserve_backup:r11.1:*:*:*:*:*:*:*;cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*;cpe:2.3:a:ca:business_protection_suite:r2:*:microsoft_small_business_server_premium:*:*:*:*:*;cpe:2.3:a:ca:business_protection_suite:r2:*:microsoft_small_business_server_standard:*:*:*:*:* CVE-2008-4449,0.0,,0.80993,Stack-based buffer overflow in mIRC 6.34 allows remote attackers to execute arbitrary code via a long hostname in a PRIVMSG message.,2008-10-06,Metasploit,cpe:2.3:a:mirc:mirc:6.34:*:*:*:*:*:*:* CVE-2008-4556,0.0,,0.77322,Stack-based buffer overflow in the adm_build_path function in sadmind in Sun Solstice AdminSuite on Solaris 8 and 9 allows remote attackers to execute arbitrary code via a crafted request.,2008-10-14,Metasploit,cpe:2.3:o:sun:solaris:8:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:8:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:9:*:x86:*:*:*:*:* CVE-2008-4572,0.0,,0.70907,"GuildFTPd 0.999.14, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long arguments to the CWD and LIST commands, which triggers heap corruption related to an improper free call, and possibly triggering a heap-based buffer overflow.",2008-10-15,Metasploit,cpe:2.3:a:guildftpd:guildftpd:0.999.14:*:*:*:*:*:*:* CVE-2008-4654,0.0,,0.807,Stack-based buffer overflow in the parse_master function in the Ty demux plugin (modules/demux/ty.c) in VLC Media Player 0.9.0 through 0.9.4 allows remote attackers to execute arbitrary code via a TiVo TY media file with a header containing a crafted size value.,2008-10-22,Metasploit,cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:* CVE-2008-4668,0.0,,0.00268,Directory traversal vulnerability in the Image Browser (com_imagebrowser) 0.1.5 component for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the folder parameter to index.php.,2008-10-22,Nuclei,cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* CVE-2008-4687,0.0,,0.79225,"manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to execute arbitrary code via a sort parameter containing PHP sequences, which are processed by create_function within the multi_sort function in core/utility_api.php.",2008-10-22,Metasploit,cpe:2.3:a:mantis:mantis:*:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:0.19.3:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:0.19.4:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.1.2:*:*:*:*:*:*:* CVE-2008-4696,0.0,,0.62121,"Cross-site scripting (XSS) vulnerability in Opera.dll in Opera before 9.61 allows remote attackers to inject arbitrary web script or HTML via the anchor identifier (aka the ""optional fragment""), which is not properly escaped before storage in the History Search database (aka md.dat).",2008-10-23,Metasploit,cpe:2.3:a:opera:opera:*:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5..10:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.0:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.11:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.12:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.1:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.2:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.3:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.4:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.5:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.6:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.7:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.8:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.9:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.01:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.02:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.03:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.04:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.05:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.06:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.0:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.01:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.02:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.03:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.0:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.10:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.11:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.20:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.20:beta7:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.21:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.22:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.23:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.50:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.50:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.51:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.52:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.53:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.54:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.54:update_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.54:update_2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7:beta_1.2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.01:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.02:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.0:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.0:beta_3:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.50:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.51:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.52:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.53:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.54:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.01:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.02:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.0:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.10:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.20:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.20:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.21:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.22:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.23:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.24:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.25:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.26:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.27:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.50:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.50:beta_2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.51:*:*:*:*:*:*:* CVE-2008-4764,0.0,,0.01921,Directory traversal vulnerability in the eXtplorer module (com_extplorer) 2.0.0 RC2 and earlier in Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dir parameter in a show_error action.,2008-10-28,Nuclei,cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2008-4779,0.0,,0.7879,Stack-based buffer overflow in TUGzip 3.5.0.0 allows remote attackers to denial of service (crash) or execute arbitrary code via a long filename in a .zip file.,2008-10-29,Metasploit,cpe:2.3:a:tguzip:tguzip:3.5.5.0.0:*:*:*:*:*:*:* CVE-2008-4828,0.0,,0.77418,"Multiple stack-based buffer overflows in dsmagent.exe in the Remote Agent Service in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, and 5.4.0.0 through 5.4.1.96, and the TSM Express client 5.3.3.0 through 5.3.6.4, allow remote attackers to execute arbitrary code via (1) a request packet that is not properly parsed by an unspecified ""generic string handling function"" or (2) a crafted NodeName in a dicuGetIdentifyRequest request packet, related to the (a) Web GUI and (b) Java GUI.",2009-05-05,Metasploit,cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1.8.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.96:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3:*:*:*:*:*:*:* CVE-2008-4830,0.0,,0.62466,Insecure method vulnerability in the KWEdit ActiveX control in SAP GUI 6.40 Patch 29 (KWEDIT.DLL 6400.1.1.41) and 7.10 Patch 5 (KWEDIT.DLL 7100.1.1.43) allows remote attackers to (1) overwrite arbitrary files via the SaveDocumentAs method or (2) read or execute arbitrary files via the OpenDocument method.,2009-04-16,Metasploit,cpe:2.3:a:sap:sap_gui:6.40:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_gui:7.10:*:*:*:*:*:*:* CVE-2008-4844,0.0,,0.82846,"Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabular Data Control (TDC) in a crafted HTML or XML document, as demonstrated by nested SPAN or MARQUEE elements, and exploited in the wild in December 2008.",2008-12-11,Metasploit,cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:* CVE-2008-4922,0.0,,0.67087,"Buffer overflow in the DjVu ActiveX Control 3.0 for Microsoft Office (DjVu_ActiveX_MSOffice.dll) allows remote attackers to execute arbitrary code via a long (1) ImageURL property, and possibly the (2) Mode, (3) Page, or (4) Zoom properties.",2008-11-04,Metasploit,cpe:2.3:a:djvu:activex_control_for_microsoft_office_2000:*:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:* CVE-2008-5002,0.0,,0.68423,Insecure method vulnerability in the ChilkatCrypt2.ChilkatCrypt2.1 ActiveX control (ChilkatCrypt2.dll 4.3.2.1) in Chilkat Crypt ActiveX Component allows remote attackers to create and overwrite arbitrary files via the WriteFile method. NOTE: this could be leveraged for code execution by creating executable files in Startup folders or by accessing files using hcp:// URLs. NOTE: some of these details are obtained from third party information.,2008-11-10,Metasploit,cpe:2.3:a:chilkat_software:chilkat_crypt_activex_control:2.1:*:*:*:*:*:*:* CVE-2008-5036,0.0,,0.67309,"Stack-based buffer overflow in VideoLAN VLC media player 0.9.x before 0.9.6 might allow user-assisted attackers to execute arbitrary code via an an invalid RealText (rt) subtitle file, related to the ParseRealText function in modules/demux/subtitle.c. NOTE: this issue was SPLIT from CVE-2008-5032 on 20081110.",2008-11-10,Metasploit,cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:* CVE-2008-5081,0.0,,0.71171,"The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.",2008-12-17,Metasploit,cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.1:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.2:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.3:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.4:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.5.1:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.5.2:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.5:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.10:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.11:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.12:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.13:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.14:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.15:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.16:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.17:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.18:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.19:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.1:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.20:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.21:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.22:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.2:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.3:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.4:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.5:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.6:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.7:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.8:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.9:*:*:*:*:*:*:* CVE-2008-5159,0.0,,0.74971,"Integer overflow in the remote administration protocol processing in Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to cause a denial of service (crash) via a large string length argument, which triggers memory corruption.",2008-11-18,Metasploit,cpe:2.3:a:clientsoftware:wincome_mpd_total:*:*:*:*:*:*:*:* CVE-2008-5161,0.0,,0.03471,"Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.",2008-11-19,Metasploit,cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.10:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.11:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.9:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.1.1:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.0:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.1:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.2:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.0:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.4.0:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.4.1:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.4.2:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.5.0:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.5.1:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.0:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.1:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.4:*:linux_ibm_zos:*:*:*:*:* CVE-2008-5191,0.0,,0.55521,Multiple SQL injection vulnerabilities in SePortal 2.4 allow remote attackers to execute arbitrary SQL commands via the (1) poll_id parameter to poll.php and the (2) sp_id parameter to staticpages.php.,2008-11-21,Metasploit,cpe:2.3:a:seportal:seportal:2.4:*:*:*:*:*:*:* CVE-2008-5281,0.0,,0.05497,Heap-based buffer overflow in Titan FTP Server 6.05 build 550 allows remote attackers to execute arbitrary code via a long DELE command.,2008-11-29,Nuclei,cpe:2.3:a:south_river_technologies:titan_ftp_server:6.05:build_550:*:*:*:*:*:* CVE-2008-5353,0.0,,0.89187,"The Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not properly enforce context of ZoneInfo objects during deserialization, which allows remote attackers to run untrusted applets and applications in a privileged context, as demonstrated by ""deserializing Calendar objects"".",2008-12-05,Metasploit,cpe:2.3:a:sun:jdk:*:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:*:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:* CVE-2008-5405,0.0,,0.82978,"Stack-based buffer overflow in the RDP protocol password decoder in Cain & Abel 4.9.23 and 4.9.24, and possibly earlier, allows remote attackers to execute arbitrary code via an RDP file containing a long string.",2008-12-10,Metasploit,cpe:2.3:a:oxid:cain_and_abel:4.9.23:*:*:*:*:*:*:*;cpe:2.3:a:oxid:cain_and_abel:4.9.24:*:*:*:*:*:*:* CVE-2008-5416,0.0,,0.89069,"Heap-based buffer overflow in Microsoft SQL Server 2000 SP4, 8.00.2050, 8.00.2039, and earlier; SQL Server 2000 Desktop Engine (MSDE 2000) SP4; SQL Server 2005 SP2 and 9.00.1399.06; SQL Server 2000 Desktop Engine (WMSDE) on Windows Server 2003 SP1 and SP2; and Windows Internal Database (WYukon) SP2 allows remote authenticated users to cause a denial of service (access violation exception) or execute arbitrary code by calling the sp_replwritetovarbin extended stored procedure with a set of invalid parameters that trigger memory overwrite, aka ""SQL Server sp_replwritetovarbin Limited Memory Overwrite Vulnerability.""",2008-12-10,Metasploit,cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2005:*:*:*:*:*:*:* CVE-2008-5444,0.0,,0.75864,"Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2008-5448 and CVE-2008-5449.",2009-01-14,Metasploit,cpe:2.3:a:oracle:secure_backup:10.2.0.2:*:*:*:*:*:*:* CVE-2008-5448,0.0,,0.81775,"Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2008-5444 and CVE-2008-5449.",2009-01-14,Metasploit,cpe:2.3:a:oracle:secure_backup:10.2.0.2:*:*:*:*:*:*:* CVE-2008-5457,0.0,,0.81836,"Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.",2009-01-14,Metasploit,cpe:2.3:a:oracle:bea_product_suite:10.0:mp1:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:10.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:7.0:sp7:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:9.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:9.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:* CVE-2008-5492,0.0,,0.70177,Heap-based buffer overflow in the PDFVIEW.PdfviewCtrl.1 ActiveX control in pdfview.ocx 2.0.0.1 in VeryDOC PDF Viewer OCX Control allows remote attackers to execute arbitrary code via a long first argument to the OpenPDF method. NOTE: some of these details are obtained from third party information.,2008-12-12,Metasploit,cpe:2.3:a:verypdf:verydoc_pdf_viewer:2.0.0.1:*:*:*:*:*:*:* CVE-2008-5499,0.0,,0.88589,"Unspecified vulnerability in Adobe Flash Player for Linux 10.0.12.36, and 9.0.151.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file.",2008-12-18,Metasploit,cpe:2.3:a:adobe:flash_player_for_linux:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player_for_linux:10.0.12.36:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player_for_linux:9.0.115.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player_for_linux:9.0.124.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player_for_linux:9.0.31:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player_for_linux:9.0.48.0:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* CVE-2008-5587,0.0,,0.01986,"Directory traversal vulnerability in libraries/lib.inc.php in phpPgAdmin 4.2.1 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the _language parameter to index.php.",2008-12-16,Nuclei,cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:2.2:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.1:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:4.1.1:*:*:*:*:*:*:* CVE-2008-5626,0.0,,0.79294,"XM Easy Personal FTP Server 5.6.0 allows remote authenticated users to cause a denial of service via a crafted argument to the NLST command, as demonstrated by a -1 argument.",2008-12-17,Metasploit,cpe:2.3:a:dxmsoft:xm_easy_personal_ftp_server:5.6.0:*:*:*:*:*:*:* CVE-2008-5664,0.0,,0.78207,"Stack-based buffer overflow in Realtek Media Player (aka Realtek Sound Manager, RtlRack, or rtlrack.exe) 1.15.0.0 allows remote attackers to execute arbitrary code via a crafted playlist (PLA) file.",2008-12-19,Metasploit,cpe:2.3:a:realtek:realtek_media_player:1.15.0.0:*:*:*:*:*:*:* CVE-2008-5666,0.0,,0.63292,"WinFTP FTP Server 2.3.0, when passive (aka PASV) mode is used, allows remote authenticated users to cause a denial of service via a sequence of FTP sessions that include an invalid ""NLST -1"" command.",2008-12-19,Metasploit,cpe:2.3:a:wftpserver:winftp_ftp_server:2.3.0:*:*:*:*:*:*:* CVE-2008-5711,0.0,,0.55683,Heap-based buffer overflow in the Facebook PhotoUploader ActiveX control 5.0.14.0 and earlier allows remote attackers to execute arbitrary code via a long FileMask property value.,2008-12-24,Metasploit,cpe:2.3:a:facebook:photouploader:*:*:*:*:*:*:*:*;cpe:2.3:a:facebook:photouploader:4.5.57.0:*:*:*:*:*:*:* CVE-2008-6080,0.0,,0.063,Directory traversal vulnerability in download.php in the ionFiles (com_ionfiles) 4.4.2 component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.,2009-02-06,Nuclei,cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* CVE-2008-6082,0.0,,0.60799,Titan FTP Server 6.26 build 630 allows remote attackers to cause a denial of service (CPU consumption) via the SITE WHO command.,2009-02-06,Metasploit,cpe:2.3:a:southrivertech:titan_ftp_server:6.26:*:*:*:*:*:*:* CVE-2008-6132,0.0,,0.77652,"Eval injection vulnerability in reserve.php in phpScheduleIt 1.2.10 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via the start_date parameter.",2009-02-13,Metasploit,cpe:2.3:a:brickhost:phpscheduleit:*:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.0.0rc1:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.0:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.0_rc1:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.0:beta:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.7:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.8:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.9:*:*:*:*:*:*:* CVE-2008-6172,0.0,,0.07294,"Directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter.",2009-02-19,Nuclei,cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*;cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:* CVE-2008-6222,0.0,,0.01649,Directory traversal vulnerability in the Pro Desk Support Center (com_pro_desk) component 1.0 and 1.2 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the include_file parameter to index.php.,2009-02-20,Nuclei,cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.2:*:*:*:*:*:*:* CVE-2008-6465,0.0,,0.01157,"Multiple cross-site scripting (XSS) vulnerabilities in login.php in webshell4 in Parallels H-Sphere 3.0.0 P9 and 3.1 P1 allow remote attackers to inject arbitrary web script or HTML via the (1) err, (2) errorcode, and (3) login parameters.",2009-03-13,Nuclei,cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*;cpe:2.3:a:parallels:h-sphere:3.1:p1:*:*:*:*:*:* CVE-2008-6508,0.0,,0.72592,"Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.",2009-03-23,Metasploit,cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:2.6.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:2.6.2:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.4.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.4.3:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.4.4:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.4.5:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.5.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.6.0:*:*:*:*:*:*:* CVE-2008-6668,0.0,,0.01077,Multiple directory traversal vulnerabilities in nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) id parameter to comm.php and (2) var_filename parameter to viewrq.php.,2009-04-08,Nuclei,cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*;cpe:2.3:a:dirk_bartley:nweb2fax:0.2:*:*:*:*:*:*:* CVE-2008-6825,0.0,,0.63298,Directory traversal vulnerability in user/index.php in Fonality trixbox CE 2.6.1 and earlier allows remote attackers to include and execute arbitrary files via a .. (dot dot) in the langChoice parameter.,2009-06-05,Metasploit,cpe:2.3:a:trixbox:trixbox:*:*:*:*:*:*:*:*;cpe:2.3:a:trixbox:trixbox:2.0:*:*:*:*:*:*:*;cpe:2.3:a:trixbox:trixbox:2.4.2.0:*:*:*:*:*:*:* CVE-2008-6829,0.0,,0.68325,"VicFTPS 5.0 allows remote attackers to cause a denial of service (crash) via a LIST command that starts with a ""/\/"" (forward slash, backward slash, forward slash). NOTE: this might be the same issue as CVE-2008-2031.",2009-06-08,Metasploit,cpe:2.3:a:vicftps:vicftps:5.0:*:*:*:*:*:*:* CVE-2008-6898,0.0,,0.66182,Buffer overflow in the XHTTP Module 4.1.0.0 in the ActiveX control for SaschArt SasCam Webcam Server 2.6.5 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long argument to the Get method and other unspecified methods.,2009-08-05,Metasploit,cpe:2.3:a:saschart:sascam_webcam_server:2.6.5:*:*:*:*:*:*:* CVE-2008-6938,0.0,,0.73687,"Pi3Web 2.0.3 before PL2, when installed on Windows as a desktop application and without using the Pi3Web/Conf/Intenet.pi3, allows remote attackers to cause a denial of service (crash or hang) and obtain the full pathname of the server via a request to a file in the ISAPI directory that is not an executable DLL, which triggers the crash when the DLL load fails, as demonstrated using Isapi\users.txt.",2009-08-11,Metasploit,cpe:2.3:a:holger_zimmermann:pi3web:*:*:*:*:*:*:*:*;cpe:2.3:a:holger_zimmermann:pi3web:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:holger_zimmermann:pi3web:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:holger_zimmermann:pi3web:2.0.2_beta_1:*:*:*:*:*:*:*;cpe:2.3:a:holger_zimmermann:pi3web:2.0:*:*:*:*:*:*:* CVE-2008-6982,0.0,,0.08587,Cross-site scripting (XSS) vulnerability in index.php in devalcms 1.4a allows remote attackers to inject arbitrary web script or HTML via the currentpath parameter.,2009-08-19,Nuclei,cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:* CVE-2008-7232,0.0,,0.55749,Buffer overflow in the report function in xtacacsd 4.1.2 and earlier allows remote attackers to execute arbitrary code via a crafted CONNECT TACACS command.,2009-09-14,Metasploit,cpe:2.3:a:netplex-tech:xtacacsd:*:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:2.0:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.0:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.1:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.2:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.3:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.4:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.5:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:4.0:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:4.1:*:*:*:*:*:*:* CVE-2008-7269,0.0,,0.00653,Open redirect vulnerability in api.php in SiteEngine 5.x allows user-assisted remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the forward parameter in a logout action.,2010-12-01,Nuclei,cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:* CVE-2009-0075,0.0,,0.84846,"Microsoft Internet Explorer 7 does not properly handle errors during attempted access to deleted objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to CFunctionPointer and the appending of document objects, aka ""Uninitialized Memory Corruption Vulnerability.""",2009-02-10,Metasploit,cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:*:professional:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:professional:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2009-0133,0.0,,0.70799,"Buffer overflow in Microsoft HTML Help Workshop 4.74 and earlier allows context-dependent attackers to execute arbitrary code via a .hhp file with a long ""Index file"" field, possibly a related issue to CVE-2006-0564.",2009-01-15,Metasploit,cpe:2.3:a:microsoft:html_help_workshop:4.74:*:*:*:*:*:*:* CVE-2009-0183,0.0,,0.7952,Stack-based buffer overflow in Remote Control Server in Free Download Manager (FDM) 2.5 Build 758 and 3.0 Build 844 allows remote attackers to execute arbitrary code via a long Authorization header in an HTTP request.,2009-02-03,Metasploit,cpe:2.3:a:free_download_manager:free_download_manager:2.5:*:*:*:*:*:*:*;cpe:2.3:a:free_download_manager:free_download_manager:3.0:*:*:*:*:*:*:* CVE-2009-0184,0.0,,0.67534,"Multiple buffer overflows in the torrent parsing implementation in Free Download Manager (FDM) 2.5 Build 758 and 3.0 Build 844 allow remote attackers to execute arbitrary code via (1) a long file name within a torrent file, (2) a long tracker URL in a torrent file, or (3) a long comment in a torrent file.",2009-02-03,Metasploit,cpe:2.3:a:free_download_manager:free_download_manager:2.5:*:*:*:*:*:*:*;cpe:2.3:a:free_download_manager:free_download_manager:3.0:*:*:*:*:*:*:* CVE-2009-0187,0.0,,0.75649,"Stack-based buffer overflow in Orbit Downloader 2.8.2 and 2.8.3, and possibly other versions before 2.8.5, allows remote attackers to execute arbitrary code via a crafted HTTP URL with a long host name, which is not properly handled when constructing a ""Connecting"" log message.",2009-02-26,Metasploit,cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.2:*:*:*:*:*:*:*;cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.3:*:*:*:*:*:*:*;cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.4:*:*:*:*:*:*:* CVE-2009-0215,0.0,,0.61783,"Stack-based buffer overflow in the GetXMLValue method in the IBM Access Support ActiveX control in IbmEgath.dll, as distributed on IBM and Lenovo computers, allows remote attackers to execute arbitrary code via unspecified vectors.",2009-03-25,Metasploit,cpe:2.3:a:ibm:access_support_activex_control:3.20.284.0:*:*:*:*:*:*:* CVE-2009-0255,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.05112,"The System extension Install tool in TYPO3 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3 creates the encryption key with an insufficiently random seed, which makes it easier for attackers to crack the key.",2009-01-22,Metasploit,cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* CVE-2009-0323,0.0,,0.69816,"Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 and 11.0 allow remote attackers to execute arbitrary code via (1) a long type parameter in an input tag, which is not properly handled by the EndOfXmlAttributeValue function; (2) an ""HTML GI"" in a start tag, which is not properly handled by the ProcessStartGI function; and unspecified vectors in (3) html2thot.c and (4) xml2thot.c, related to the msgBuffer variable. NOTE: these are different vectors than CVE-2008-6005.",2009-01-28,Metasploit,cpe:2.3:a:w3:amaya:*:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:0.95b:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:0.9:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.0a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.1a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.1c:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.2a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.3a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.3b:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.4a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:10.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:2.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:2.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:2.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:2.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:2.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:3.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:3.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:3.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:5.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:5.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:5.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:5.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:6.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:6.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:6.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:6.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:6.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:7.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:7.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:7.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.1a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.1b:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.52:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.5:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.6:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.7.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.7.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.7:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.8.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.8.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.8.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.8.5:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.2.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.52:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.53:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.54:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.55:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.5:*:*:*:*:*:*:* CVE-2009-0347,0.0,,0.03639,Open redirect vulnerability in cs.html in the Autonomy (formerly Verity) Ultraseek search engine allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.,2009-01-29,Nuclei,cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:* CVE-2009-0476,0.0,,0.83257,"Stack-based buffer overflow in MultiMedia Soft AdjMmsEng.dll 7.11.1.0 and 7.11.2.7, as distributed in multiple MultiMedia Soft audio components for .NET, allows remote attackers to execute arbitrary code via a long string in a playlist (.pls) file, as originally reported for Euphonics Audio Player 1.0. NOTE: some of these details are obtained from third party information.",2009-02-08,Metasploit,cpe:2.3:a:multimediasoft:audio_dj_studio_for_.net:-:*:*:*:*:*:*:*;cpe:2.3:a:multimediasoft:audio_sound_editer_for_.net:-:*:*:*:*:*:*:*;cpe:2.3:a:multimediasoft:audio_sound_recorder_for_.net:-:*:*:*:*:*:*:*;cpe:2.3:a:multimediasoft:audio_sound_studio_for_.net:-:*:*:*:*:*:*:*;cpe:2.3:a:multimediasoft:audio_sound_suite_for_.net:-:*:*:*:*:*:*:* CVE-2009-0545,0.0,,0.93944,cgi-bin/kerbynet in ZeroShell 1.0beta11 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the type parameter in a NoAuthREQ x509List action.,2009-02-12,Metasploit/Nuclei,cpe:2.3:a:zeroshell:zeroshell:1.0:beta10:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta11:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta2:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta3:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta4:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta5:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta6:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta7:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta8:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta9:*:*:*:*:*:* CVE-2009-0546,0.0,,0.8017,Stack-based buffer overflow in NewsGator FeedDemon 2.7 and earlier allows user-assisted remote attackers to execute arbitrary code via a long text attribute in an outline element in a .opml file.,2009-02-12,Metasploit,cpe:2.3:a:newsgator:feeddemon:*:*:*:*:*:*:*:*;cpe:2.3:a:newsgator:feeddemon:2.0.0.24:*:*:*:*:*:*:*;cpe:2.3:a:newsgator:feeddemon:2.6.1.4:*:*:*:*:*:*:*;cpe:2.3:a:newsgator:feeddemon:2.6.1.5:*:*:*:*:*:*:*;cpe:2.3:a:newsgator:feeddemon:2.6:*:*:*:*:*:*:* CVE-2009-0557,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.83761,"Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel Viewer 2003 SP3; Microsoft Office Excel Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka ""Object Record Corruption Vulnerability.""",2009-06-10,CISA,cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_excel_viewer:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_excel_viewer:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:open_xml_file_format_converter:-:*:*:*:*:macos:*:* CVE-2009-0563,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.80017,"Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; Microsoft Office Word Viewer 2003 SP3; Microsoft Office Word Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a Word document with a crafted tag containing an invalid length field, aka ""Word Buffer Overflow Vulnerability.""",2009-06-10,CISA,cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_word_viewer:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:open_xml_file_format_converter:-:*:*:*:*:macos:*:* CVE-2009-0580,0.0,,0.84435,"Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",2009-06-05,Metasploit,cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.37:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.38:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.39:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:* CVE-2009-0658,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.90801,"Buffer overflow in Adobe Reader 9.0 and earlier, and Acrobat 9.0 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF document, related to a non-JavaScript function call and possibly an embedded JBIG2 image stream, as exploited in the wild in February 2009 by Trojan.Pidief.E.",2009-02-20,Metasploit,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:* CVE-2009-0695,0.0,,0.70615,"hagent.exe in Wyse Device Manager (WDM) 4.7.x does not require authentication for commands, which allows remote attackers to obtain management access via a crafted query, as demonstrated by a V52 query that triggers a power-off action.",2012-06-19,Metasploit,cpe:2.3:a:dell:wyse_device_manager:4.7.0:*:*:*:*:*:*:*;cpe:2.3:a:dell:wyse_device_manager:4.7.1:*:*:*:*:*:*:*;cpe:2.3:a:dell:wyse_device_manager:4.7.2:*:*:*:*:*:*:* CVE-2009-0815,0.0,,0.498,"The jumpUrl mechanism in class.tslib_fe.php in TYPO3 3.3.x through 3.8.x, 4.0 before 4.0.12, 4.1 before 4.1.10, 4.2 before 4.2.6, and 4.3alpha1 leaks a hash secret (juHash) in an error message, which allows remote attackers to read arbitrary files by including the hash in a request.",2009-03-05,Metasploit,cpe:2.3:a:typo3:typo3:3.3.x:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:3.5.x:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:3.6.x:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:3.7.x:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:3.8.x:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.0:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.4:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.6:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.7:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.8:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.9:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.3:alpha1:*:*:*:*:*:* CVE-2009-0836,0.0,,0.1077,"Foxit Reader 2.3 before Build 3902 and 3.0 before Build 1506, including 1120 and 1301, does not require user confirmation before performing dangerous actions defined in a PDF file, which allows remote attackers to execute arbitrary programs and have unspecified other impact via a crafted file, as demonstrated by the ""Open/Execute a file"" action.",2009-03-10,Metasploit,cpe:2.3:a:foxitsoftware:reader:2.3:*:*:*:*:*:*:*;cpe:2.3:a:foxitsoftware:reader:3.0:*:*:*:*:*:*:* CVE-2009-0837,0.0,,0.83223,"Stack-based buffer overflow in Foxit Reader 3.0 before Build 1506, including 1120 and 1301, allows remote attackers to execute arbitrary code via a long (1) relative path or (2) absolute path in the filename argument in an action, as demonstrated by the ""Open/Execute a file"" action.",2009-03-10,Metasploit,cpe:2.3:a:foxit:reader3.0:*:*:*:*:*:*:*:* CVE-2009-0880,0.0,,0.63552,Directory traversal vulnerability in the CIM server in IBM Director before 5.20.3 Service Update 2 on Windows allows remote attackers to load and execute arbitrary local DLL code via a .. (dot dot) in a /CIMListener/ URI in an M-POST request.,2009-03-12,Metasploit,cpe:2.3:a:ibm:director:*:service_update_1:*:*:*:*:*:*;cpe:2.3:a:ibm:director:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.10:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.11:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.12:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.20:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.21:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.22:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.10.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.10.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.10.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.10.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.20.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.20.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.20.2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2009-0884,0.0,,0.01005,Buffer overflow in FileZilla Server before 0.9.31 allows remote attackers to cause a denial of service via unspecified vectors related to SSL/TLS packets.,2009-03-12,Nuclei,cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:* CVE-2009-0920,0.0,,0.58773,"Stack-based buffer overflow in OvCgi/Toolbar.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a long OvOSLocale cookie, a variant of CVE-2008-0067.",2009-03-25,Metasploit,cpe:2.3:a:hp:network_node_manager:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:network_node_manager:7.5.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:network_node_manager:7.5.3:*:*:*:*:*:*:* CVE-2009-0927,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.93673,"Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Collab object, a different vulnerability than CVE-2009-0658.",2009-03-19,Metasploit/CISA,cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* CVE-2009-0932,0.0,,0.05612,Directory traversal vulnerability in framework/Image/Image.php in Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.,2009-03-17,Nuclei,cpe:2.3:a:debian:horde:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde:3.3:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde_groupware:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde_groupware:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde_groupware:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde_groupware:1.1.4:*:*:*:*:*:*:* CVE-2009-0950,0.0,,0.82109,Stack-based buffer overflow in Apple iTunes before 8.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an itms: URL with a long URL component after a colon.,2009-06-02,Metasploit,cpe:2.3:a:apple:itunes:*:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:*:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.3:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.3:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.3:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.4:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.4:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.4:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:3.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:3.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.1.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.1.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2.72:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2.72:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.5.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.5.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.5:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.6.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.6.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.6:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1.30:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1.30:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.8.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.8.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.8:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.8:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.9.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.9.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.9:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.9:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.3:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.3:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.3:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.5:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.5:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.5:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.2.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.2.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.3:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.5.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.5.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.5:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.1:-:windows:*:*:*:*:* CVE-2009-0978,0.0,,0.49273,"Unspecified vulnerability in the Workspace Manager component in Oracle Database 10.2.0.4 and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2009-0975.",2009-04-15,Metasploit,cpe:2.3:a:oracle:database_10g:10.2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_11g:11.1.0.6:*:*:*:*:*:*:* CVE-2009-1028,0.0,,0.67087,Stack-based buffer overflow in ediSys eZip Wizard 3.0 allows remote attackers to execute arbitrary code via a crafted .zip file.,2009-03-20,Metasploit,cpe:2.3:a:edisys:ezip_wizard:3.0:*:*:*:*:*:*:* CVE-2009-1029,0.0,,0.70342,"Stack-based buffer overflow in POP Peeper 3.4.0.0 and earlier allows remote POP3 servers to execute arbitrary code via a long Date header, related to Imap.dll.",2009-03-20,Metasploit,cpe:2.3:a:poppeeper:pop_peeper:*:*:*:*:*:*:*:*;cpe:2.3:a:poppeeper:pop_peeper:2.4.3:*:*:*:*:*:*:*;cpe:2.3:a:poppeeper:pop_peeper:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:poppeeper:pop_peeper:3.0:*:*:*:*:*:*:* CVE-2009-1122,0.0,,0.92339,"The WebDAV extension in Microsoft Internet Information Services (IIS) 5.0 on Windows 2000 SP4 does not properly decode URLs, which allows remote attackers to bypass authentication, and possibly read or create files, via a crafted HTTP request, aka ""IIS 5.0 WebDAV Authentication Bypass Vulnerability,"" a different vulnerability than CVE-2009-1535.",2009-06-10,Metasploit,cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:* CVE-2009-1123,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.04516,"The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application, aka ""Windows Kernel Desktop Vulnerability.""",2009-06-10,CISA,cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:-:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2009-1136,0.0,,0.85958,"The Microsoft Office Web Components Spreadsheet ActiveX control (aka OWC10 or OWC11), as distributed in Office XP SP3 and Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 Gold and SP1, and Office Small Business Accounting 2006, when used in Internet Explorer, allows remote attackers to execute arbitrary code via a crafted call to the msDataSourceObject method, as exploited in the wild in July and August 2009, aka ""Office Web Components HTML Script Vulnerability.""",2009-07-15,Metasploit,cpe:2.3:a:microsoft:isa_server:2004:sp3:enterprise:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2004:sp3:standard:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2006:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2006:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2006:supportability:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:*:small_business_accounting_2006:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2003:sp1:2007_microsoft_office:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_xp:sp3:*:*:*:*:*:*:* CVE-2009-1151,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93032,Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.,2009-03-26,Metasploit/Nuclei/CISA,cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* CVE-2009-1185,0.0,,0.8927,"udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.",2009-04-17,Metasploit,cpe:2.3:a:juniper:ctpview:*:*:*:*:*:*:*:*;cpe:2.3:a:juniper:ctpview:7.1:-:*:*:*:*:*:*;cpe:2.3:a:juniper:ctpview:7.1:r1:*:*:*:*:*:*;cpe:2.3:a:juniper:ctpview:7.2:-:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*;cpe:2.3:a:udev_project:udev:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:* CVE-2009-1260,0.0,,0.74522,Multiple stack-based buffer overflows in UltraISO 9.3.3.2685 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted (1) CCD or (2) IMG file.,2009-04-07,Metasploit,cpe:2.3:a:ezbsystems:ultraiso:*:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:3.1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:3.1_sr1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:3.1_sr2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:4.0:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:4.1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:4.5:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:5.0:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:5.1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:5.55:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:5.55_sr-1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:5.55_sr-2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.0:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.51:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.52:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.52_sr-1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.52_sr-2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.56_sr-1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.56_sr-2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.5:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.0:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.1:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.21_sr-1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.21_sr-2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.22_me:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.23:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.25:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.51:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.52:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.55:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.56:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.5:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.62:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.65:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.65_sr-2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.66:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.6:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.12:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.2:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.51:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.61:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.62:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.63:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.65:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.66:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.6:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.0:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.1.2:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.2:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.3.1:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.3.2:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.3:-:pe:*:*:*:*:* CVE-2009-1350,0.0,,0.75455,"Unspecified vulnerability in xtagent.exe in Novell NetIdentity Client before 1.2.4 allows remote attackers to execute arbitrary code by establishing an IPC$ connection to the XTIERRPCPIPE named pipe, and sending RPC messages that trigger a dereference of an arbitrary pointer.",2009-04-21,Metasploit,cpe:2.3:a:novell:netidentity_client1.2.3:*:*:*:*:*:*:*:* CVE-2009-1386,0.0,,0.42628,ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.,2009-06-04,Metasploit,cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openssl:0.9.6-15:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openssl:0.9.6b-3:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openssl:0.9.7a-2:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:* CVE-2009-1394,0.0,,0.49012,Stack-based buffer overflow in Motorola Timbuktu Pro 8.6.5 on Windows allows remote attackers to execute arbitrary code by sending a long malformed string over the PlughNTCommand named pipe.,2009-06-26,Metasploit,cpe:2.3:a:motorola:timbuktu_pro:8.6.5:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2009-1429,0.0,,0.911,"The Intel LANDesk Common Base Agent (CBA) in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allows remote attackers to execute arbitrary commands via a crafted packet whose contents are interpreted as a command to be launched in a new process by the CreateProcessA function.",2009-04-29,Metasploit,cpe:2.3:a:symantec:antivirus:*:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:*:-:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:-:-:srv:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.3:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.4:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.5:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.6:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.7:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.8:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.9:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus_central_quarantine_server:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1001:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1009:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:endpoint_protection:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:system_center:*:*:*:*:*:*:*:* CVE-2009-1430,0.0,,0.60565,"Multiple stack-based buffer overflows in IAO.EXE in the Intel Alert Originator Service in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allow remote attackers to execute arbitrary code via (1) a crafted packet or (2) data that ostensibly arrives from the MsgSys.exe process.",2009-04-29,Metasploit,cpe:2.3:a:symantec:antivirus:*:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:*:-:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:-:-:srv:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.3:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.4:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.5:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.6:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.7:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.8:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.9:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus_central_quarantine_server:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1001:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1009:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:endpoint_protection:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:system_center:*:*:*:*:*:*:*:* CVE-2009-1496,0.0,,0.01473,Directory traversal vulnerability in the Cmi Marketplace (com_cmimarketplace) component 0.1 for Joomla! allows remote attackers to list arbitrary directories via a .. (dot dot) in the viewit parameter to index.php.,2009-05-01,Nuclei,cpe:2.3:a:ijobid:com_cmimarketplace:0.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* CVE-2009-1534,0.0,,0.7543,"Buffer overflow in the Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2000 Web Components SP3, Office XP Web Components SP3, BizTalk Server 2002, and Visual Studio .NET 2003 SP1 allows remote attackers to execute arbitrary code via crafted property values, aka ""Office Web Components Buffer Overflow Vulnerability.""",2009-08-12,Metasploit,cpe:2.3:a:microsoft:biztalk_server:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2004:sp3:enterprise:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2004:sp3:standard:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2006:sp1:enterprise:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2006:sp1:standard:*:*:*:*:*;cpe:2.3:a:microsoft:office:-:*:small_business_accounting_2006:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2003:sp1:2007_microsoft_office:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_studio_.net:2003:sp1:*:*:*:*:*:* CVE-2009-1535,0.0,,0.91826,"The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.0 allows remote attackers to bypass URI-based protection mechanisms, and list folders or read, create, or modify files, via a %c0%af (Unicode / character) at an arbitrary position in the URI, as demonstrated by inserting %c0%af into a ""/protected/"" initial pathname component to bypass the password protection on the protected\ folder, aka ""IIS 5.1 and 6.0 WebDAV Authentication Bypass Vulnerability,"" a different vulnerability than CVE-2009-1122.",2009-06-10,Metasploit,cpe:2.3:a:microsoft:internet_information_services:5.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_services:6.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:-:* CVE-2009-1558,0.0,,0.10881,Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter.,2009-05-06,Nuclei,cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*;cpe:2.3:h:cisco:wvc54gca:1.00r24:*:*:*:*:*:*:* CVE-2009-1568,0.0,,0.61015,"Stack-based buffer overflow in ienipp.ocx in Novell iPrint Client 5.30, and possibly other versions before 5.32, allows remote attackers to execute arbitrary code via a long target-frame parameter.",2009-12-08,Metasploit,cpe:2.3:a:novell:iprint_client:5.30:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint_client:5.31:*:*:*:*:*:*:* CVE-2009-1569,0.0,,0.65451,"Multiple stack-based buffer overflows in Novell iPrint Client 4.38, 5.30, and possibly other versions before 5.32 allow remote attackers to execute arbitrary code via vectors related to (1) Date and (2) Time.",2009-12-08,Metasploit,cpe:2.3:a:novell:iprint:4.38:*:client:*:*:*:*:*;cpe:2.3:a:novell:iprint:5.30:*:client:*:*:*:*:* CVE-2009-1612,0.0,,0.68936,"Stack-based buffer overflow in the MPS.StormPlayer.1 ActiveX control in mps.dll 3.9.4.27 in Baofeng Storm allows remote attackers to execute arbitrary code via a long argument to the OnBeforeVideoDownload method, as exploited in the wild in April and May 2009. NOTE: some of these details are obtained from third party information. NOTE: it was later reported that 3.09.04.17 and earlier are also affected.",2009-05-11,Metasploit,cpe:2.3:a:baofeng:storm:2.7.9_10:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:2.7.9_8:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:2.8:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:2.9:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:3.9.3_25:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:3.9.3_30:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:3.9.4_17:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:3.9.4_27:*:*:*:*:*:*:* CVE-2009-1641,0.0,,0.65931,Multiple stack-based buffer overflows in Mini-stream Ripper 3.0.1.1 allow remote attackers to execute arbitrary code via (1) a long rtsp URL in a .ram file and (2) a long string in the HREF attribute of a REF element in a .asx file.,2009-05-15,Metasploit,cpe:2.3:a:mini-stream:ripper:3.0.1.1:*:*:*:*:*:*:* CVE-2009-1730,0.0,,0.62305,Multiple directory traversal vulnerabilities in NetMechanica NetDecision TFTP Server 4.2 allow remote attackers to read or modify arbitrary files via directory traversal sequences in the (1) GET or (2) PUT command.,2009-05-20,Metasploit,cpe:2.3:a:netmechanica:netdecision_tftp_server:4.2:*:*:*:*:*:*:* CVE-2009-1831,0.0,,0.81169,"The Nullsoft Modern Skins Support module (gen_ff.dll) in Nullsoft Winamp before 5.552 allows remote attackers to execute arbitrary code via a crafted MAKI file, which triggers an incorrect sign extension, an integer overflow, and a stack-based buffer overflow.",2009-05-29,Metasploit,cpe:2.3:a:nullsoft:winamp:*:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.0:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.10:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.24:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.4:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.50:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.5e:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.60:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.60:*:full:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.60:*:lite:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.61:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.61:*:full:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.62:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.62:*:standard:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.64:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.64:*:standard:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.65:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.6x:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.70:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.70:*:full:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.71:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.72:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.73:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.73:*:full:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.74:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.75:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.76:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.77:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.78:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.79:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.7x:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.80:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.81:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.90:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.91:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.95:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:3.0:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:3.1:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.01:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.02:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.03:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.03a:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.04:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.05:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.06:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.07:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08:c:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08:d:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08:e:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08c:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08d:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08e:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.091:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.093:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.094:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.09:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.0:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.111:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.112:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.11:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.12:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.13:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.1:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.21:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.22:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.23:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.24:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.2:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.31:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.32:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.33:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.34:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.35:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.36:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.3:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.51:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.52:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.53:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.541:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.54:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.5:*:*:*:*:*:*:* CVE-2009-1862,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.57995,"Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009.",2009-07-23,CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* CVE-2009-1872,0.0,,0.12,"Multiple cross-site scripting (XSS) vulnerabilities in Adobe ColdFusion Server 8.0.1, 8, and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the startRow parameter to administrator/logviewer/searchlog.cfm, or the query string to (2) wizards/common/_logintowizard.cfm, (3) wizards/common/_authenticatewizarduser.cfm, or (4) administrator/enter.cfm.",2009-08-18,Nuclei,cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.0:*:enterprise_multi-server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.0:*:enterprise_server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.0:*:linux:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.0:*:solaris:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.1:*:enterprise_multi-server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.1:*:enterprise_server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.1:*:linux:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.1:*:solaris:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0:*:enterprise_multi-server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0:*:enterprise_server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0:*:linux:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0:*:solaris:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.2:unknown:mx:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:8.1:*:*:*:*:*:*:* CVE-2009-1943,0.0,,0.64247,Stack-based buffer overflow in the IKE service (ireIke.exe) in SafeNet SoftRemote before 10.8.6 allows remote attackers to execute arbitrary code via a long request to UDP port 62514.,2009-06-05,Metasploit,cpe:2.3:a:safenet-inc:softremote1.4:*:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:*:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.7.7:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.7.7:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.0:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.1:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.2:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.3:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:8.0:*:*:*:*:*:*:* CVE-2009-1977,0.0,,0.85139,"Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the July 2009 Oracle CPU. Oracle has not commented on claims from an independent researcher that this vulnerability allows attackers to bypass authentication via unknown vectors involving the username parameter and login.php.",2009-07-14,Metasploit,cpe:2.3:a:oracle:secure_backup:10.2.0.3:*:*:*:*:*:*:* CVE-2009-1978,0.0,,0.8526,"Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the July 2009 Oracle CPU. Oracle has not commented on claims from an independent researcher that this vulnerability allows remote authenticated users to execute arbitrary code with SYSTEM privileges via vectors involving property_box.php.",2009-07-14,Metasploit,cpe:2.3:a:oracle:secure_backup:10.2.0.3:*:*:*:*:*:*:* CVE-2009-1979,0.0,,0.85749,"Unspecified vulnerability in the Network Authentication component in Oracle Database 10.1.0.5 and 10.2.0.4 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2009 CPU. Oracle has not commented on claims from an independent researcher that this is related to improper validation of the AUTH_SESSKEY parameter length that leads to arbitrary code execution.",2009-10-22,Metasploit,cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:* CVE-2009-2011,0.0,,0.74194,"Worldweaver DX Studio Player 3.0.29.0, 3.0.22.0, 3.0.12.0, and probably other versions before 3.0.29.1, when used as a plug-in for Firefox, does not restrict access to the shell.execute JavaScript API method, which allows remote attackers to execute arbitrary commands via a .dxstudio file that invokes this method.",2009-06-16,Metasploit,cpe:2.3:a:dxstudio:dx_studio_player:*:*:*:*:*:*:*:*;cpe:2.3:a:dxstudio:dx_studio_player:3.0.12.0:*:*:*:*:*:*:*;cpe:2.3:a:dxstudio:dx_studio_player:3.0.22.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* CVE-2009-2015,0.0,,0.01674,Directory traversal vulnerability in includes/file_includer.php in the Ideal MooFAQ (com_moofaq) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.,2009-06-09,Nuclei,cpe:2.3:a:ideal:com_moofaq:1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* CVE-2009-2055,0.0,,0.01238,"Cisco IOS XR 3.4.0 through 3.8.1 allows remote attackers to cause a denial of service (session reset) via a BGP UPDATE message with an invalid attribute, as demonstrated in the wild on 17 August 2009.",2009-08-19,CISA,cpe:2.3:o:cisco:ios_xr:3.4.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.4.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.4.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.4.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.5.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.5.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.5.4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.6.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.6.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.6.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.6.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.7.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.7.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.7.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.7.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.8.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.8.1:*:*:*:*:*:*:* CVE-2009-2100,0.0,,0.01877,Directory traversal vulnerability in the JoomlaPraise Projectfork (com_projectfork) component 2.0.10 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the section parameter to index.php.,2009-06-17,Nuclei,cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlapraise:com_projectfork:2.0.10:*:*:*:*:*:*:* CVE-2009-2227,0.0,,0.75031,Stack-based buffer overflow in B Labs Bopup Communication Server 3.2.26.5460 allows remote attackers to execute arbitrary code via a crafted request to TCP port 19810.,2009-06-26,Metasploit,cpe:2.3:a:blabsoft:bopup_communication_server:3.2.26.5460:*:*:*:*:*:*:* CVE-2009-2261,0.0,,0.70587,"PeaZIP 2.6.1, 2.5.1, and earlier on Windows allows user-assisted remote attackers to execute arbitrary commands via a .zip archive with a .txt file whose name contains | (pipe) characters and a command.",2009-06-30,Metasploit,cpe:2.3:a:giorgio_tani:peazip:*:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.0:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.10:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.11:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.1:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.2:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.3:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.4:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.5:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.6:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.7:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.8.1:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.8.2:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.8:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.9.1:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.9.2:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.9.3:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.9:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:2.0:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:2.1:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:2.2:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:2.3a:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:2.4.1:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:2.4:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:2.6.1:-:windows:*:*:*:*:* CVE-2009-2265,0.0,,0.92974,"Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4.1 allow remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecified connector modules, as exploited in the wild for remote code execution in July 2009, related to the file browser and the editor/filemanager/connectors/ directory.",2009-07-05,Metasploit,cpe:2.3:a:fckeditor:fckeditor:*:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.0:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.0_fc:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.0_rc2:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.0rc2:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.0rc3:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.1:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.2:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.3.2:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.3:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.3:beta:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.4.1:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.4.2:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.4.3:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.4:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.5:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.5:beta:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.6.2:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.6.3:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.6.3:beta:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.6.4:beta:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.6:*:*:*:*:*:*:* CVE-2009-2288,0.0,,0.933,statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.,2009-07-01,Metasploit,cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:1.0:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:1.0b1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:1.0b2:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:1.0b4:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:1.1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:2.0:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:2.0b4:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:2.10:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:2.7:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:* CVE-2009-2335,0.0,,0.85338,"WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for ""user convenience.""",2009-07-10,Metasploit,cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:* CVE-2009-2367,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.32334,"cgi-bin/makecgi-pro in Iomega StorCenter Pro generates predictable session IDs, which allows remote attackers to hijack active sessions and gain privileges via brute force guessing attacks on the session_id parameter.",2009-07-08,Metasploit,cpe:2.3:h:iomega:storcenter_pro:-:*:*:*:*:*:*:*;cpe:2.3:o:iomega:storcenter_pro_firmware:-:*:*:*:*:*:*:* CVE-2009-2477,0.0,,0.83034,"js/src/jstracer.cpp in the Just-in-time (JIT) JavaScript compiler (aka TraceMonkey) in Mozilla Firefox 3.5 before 3.5.1 allows remote attackers to execute arbitrary code via certain use of the escape function that triggers access to uninitialized memory locations, as originally demonstrated by a document containing P and FONT elements.",2009-07-15,Metasploit,cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:* CVE-2009-2484,0.0,,0.68591,"Stack-based buffer overflow in the Win32AddConnection function in modules/access/smb.c in VideoLAN VLC media player 0.9.9, when running on Microsoft Windows, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long smb URI in a playlist file.",2009-07-16,Metasploit,cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2009-2485,0.0,,0.80024,Stack-based buffer overflow in HT-MP3Player 1.0 allows remote attackers to execute arbitrary code via a long string in a .ht3 file.,2009-07-16,Metasploit,cpe:2.3:a:tingan:ht-mp3player:1.0:*:*:*:*:*:*:* CVE-2009-2514,0.0,,0.80209,"win32k.sys in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not correctly parse font code during construction of a directory-entry table, which allows remote attackers to execute arbitrary code via a crafted Embedded OpenType (EOT) font, aka ""Win32k EOT Parsing Vulnerability.""",2009-11-11,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:gold:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2009-2521,0.0,,0.60775,"Stack consumption vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows remote authenticated users to cause a denial of service (daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka ""IIS FTP Service DoS Vulnerability.""",2009-09-04,Metasploit,cpe:2.3:a:microsoft:internet_information_services:*:*:*:*:*:*:*:* CVE-2009-2566,0.0,,0.63261,"Stack-based buffer overflow in TFM MMPlayer 2.0, and possibly 2.0.0.30, allows remote attackers to execute arbitrary code via a long string in a playlist (.m3u) file.",2009-07-21,Metasploit,cpe:2.3:a:tfm:mmplayer:2.0:*:*:*:*:*:*:* CVE-2009-2650,0.0,,0.61668,Heap-based buffer overflow in Sorcerer Software MultiMedia Jukebox 4.0 Build 020124 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted (1) .m3u or possibly (2) .pst file.,2009-07-30,Metasploit,cpe:2.3:a:sorcerersoftware:multimedia_jukebox:4.0:*:*:*:*:*:*:* CVE-2009-2685,0.0,,0.76735,Stack-based buffer overflow in the login form in the management web server in HP Power Manager allows remote attackers to execute arbitrary code via the Login variable.,2009-11-06,Metasploit,cpe:2.3:a:hp:power_manager:*:*:*:*:*:*:*:* CVE-2009-2692,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.1838,"The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.",2009-08-14,Metasploit,cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_real_time:10:*:*:*:*:*:*:* CVE-2009-2727,0.0,,0.7763,"Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 through 5.3.10, and 6.1.0 through 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote attackers to execute arbitrary code via a long XDR-encoded ASCII string to remote procedure 15.",2009-08-10,Metasploit,cpe:2.3:o:ibm:aix:5.2.0.50:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2.0.54:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2.0:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2_l:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.0:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.10:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.7:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.8:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.9:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1.0:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:* CVE-2009-2765,0.0,,0.92013,"httpd.c in httpd in the management GUI in DD-WRT 24 sp1, and other versions before build 12533, allows remote attackers to execute arbitrary commands via shell metacharacters in a request to a cgi-bin/ URI.",2009-08-14,Metasploit,cpe:2.3:a:dd-wrt:dd-wrt:*:sp1:*:*:*:*:*:* CVE-2009-2936,0.0,,0.6839,"The Command Line Interface (aka Server CLI or administration interface) in the master process in the reverse proxy server in Varnish before 2.1.0 does not require authentication for commands received through a TCP port, which allows remote attackers to (1) execute arbitrary code via a vcl.inline directive that provides a VCL configuration file containing inline C code; (2) change the ownership of the master process via param.set, stop, and start directives; (3) read the initial line of an arbitrary file via a vcl.load directive; or (4) conduct cross-site request forgery (CSRF) attacks that leverage a victim's location on a trusted network and improper input validation of directives. NOTE: the vendor disputes this report, saying that it is ""fundamentally misguided and pointless.",2010-04-05,Metasploit,cpe:2.3:a:varnish.projects.linpro:varnish:0.9.1:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:0.9:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.0:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.1:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0:beta1:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0:beta2:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0:rc1:*:*:*:*:*:* CVE-2009-2990,0.0,,0.87912,"Array index error in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow attackers to execute arbitrary code via unspecified vectors.",2009-10-19,Metasploit,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:* CVE-2009-3023,0.0,,0.77219,"Buffer overflow in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 6.0 allows remote authenticated users to execute arbitrary code via a crafted NLST (NAME LIST) command that uses wildcards, leading to memory corruption, aka ""IIS FTP Service RCE and DoS Vulnerability.""",2009-08-31,Metasploit,cpe:2.3:a:microsoft:internet_information_server:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x86:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:-:*:x86:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:-:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:-:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2009-3028,0.0,,0.72029,"The Altiris eXpress NS SC Download ActiveX control in AeXNSPkgDLLib.dll, as used in Symantec Altiris Deployment Solution 6.9.x, Notification Server 6.0.x, and Symantec Management Platform 7.0.x exposes an unsafe method, which allows remote attackers to force the download of arbitrary files and possibly execute arbitrary code via the DownloadAndInstall method.",2011-03-07,Metasploit,cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp2:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp3:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp4:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp1_hf12:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp2:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r10:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r11:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r12:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r13:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r2:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r3:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r4:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r5:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r6:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r7:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r8:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r9:*:*:*:*:*:*;cpe:2.3:a:symantec:management_platform:7.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:management_platform:7.0:rc5:*:*:*:*:*:*;cpe:2.3:a:symantec:management_platform:7.0:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:management_platform:7.0:sp2:*:*:*:*:*:*;cpe:2.3:a:symantec:management_platform:7.0:sp3:*:*:*:*:*:*;cpe:2.3:a:symantec:management_platform:7.0:sp4:*:*:*:*:*:*;cpe:2.3:a:symantec:management_platform:7.0:sp5:*:*:*:*:*:* CVE-2009-3031,0.0,,0.76853,"Stack-based buffer overflow in the BrowseAndSaveFile method in the Altiris eXpress NS ConsoleUtilities ActiveX control 6.0.0.1846 in AeXNSConsoleUtilities.dll in Symantec Altiris Notification Server (NS) 6.0 before R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution 6.9 SP3, and Symantec Management Platform (SMP) 7.0 before SP3 allows remote attackers to execute arbitrary code via a long string in the second argument.",2009-11-03,Metasploit,cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp2:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp3:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_management_platform:7.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_management_platform:7.0:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:*:sp1:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp2:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r7:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:7.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:7.0:sp3:*:*:*:*:*:* CVE-2009-3033,0.0,,0.72538,"Buffer overflow in the RunCmd method in the Altiris eXpress NS Console Utilities ActiveX control in AeXNSConsoleUtilities.dll in the web console in Symantec Altiris Deployment Solution 6.9.x, Altiris Notification Server 6.0.x, and Management Platform 7.0.x allows remote attackers to execute arbitrary code via a long string in the second argument.",2009-11-25,Metasploit,cpe:2.3:a:symantec:altiris_deployment_solution:6.9.164:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9.176:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9.355:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9.355:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp2:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp3:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_management_platform:7.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_management_platform:7.0:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp2:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r7:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0_sp3:*:*:*:*:*:*:* CVE-2009-3053,0.0,,0.01573,"Directory traversal vulnerability in the Agora (com_agora) component 3.0.0b for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action parameter to the avatars page, reachable through index.php.",2009-09-03,Nuclei,cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*;cpe:2.3:a:jvitals:com_agora:3.0.0b:*:*:*:*:*:*:* CVE-2009-3068,0.0,,0.90721,"Unrestricted file upload vulnerability in the RoboHelpServer Servlet (robohelp/server) in Adobe RoboHelp Server 8 allows remote attackers to execute arbitrary code by uploading a Java Archive (.jsp) file during a PUBLISH action, then accessing it via a direct request to the file in the robohelp/robo/reserved/web directory under its sessionid subdirectory, as demonstrated by the vd_adobe module in VulnDisco Pack Professional 8.7 through 8.11.",2009-09-04,Metasploit,cpe:2.3:a:adobe:robohelp_server:8:*:*:*:*:*:*:* CVE-2009-3103,0.0,,0.92944,"Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka ""SMBv2 Negotiation Vulnerability."" NOTE: some of these details are obtained from third party information.",2009-09-08,Metasploit,cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:sp2:x32:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:sp2:x64:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* CVE-2009-3129,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.91029,"Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset, aka ""Excel Featheader Record Memory Corruption Vulnerability.""",2009-11-11,Metasploit/CISA,cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel_viewer:-:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel_viewer:-:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel_viewer:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:*:*:*:macos:*:* CVE-2009-3214,0.0,,0.64782,"Multiple stack-based buffer overflows in Photodex ProShow Gold 4.0.2549 allow remote attackers to execute arbitrary code via a crafted Slideshow project (.psh) file, related to the (1) cell[n].images[m].image and (2) cell[n].sound.file fields.",2009-09-16,Metasploit,cpe:2.3:a:photodex:proshow_gold:4.0.2549:*:*:*:*:*:*:* CVE-2009-3318,0.0,,0.01442,Directory traversal vulnerability in the Roland Breedveld Album (com_album) component 1.14 for Joomla! allows remote attackers to access arbitrary directories and have unspecified other impact via a .. (dot dot) in the target parameter to index.php.,2009-09-23,Nuclei,cpe:2.3:a:breedveld:com_album:1.14:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* CVE-2009-3429,0.0,,0.7195,Stack-based buffer overflow in Pirate Radio Destiny Media Player 1.61 allows remote attackers to execute arbitrary code via a long string in a .pls playlist file.,2009-09-25,Metasploit,cpe:2.3:a:pirateradio:destiny_media_player:1.61:*:*:*:*:*:*:* CVE-2009-3459,0.0,,0.88364,"Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.",2009-10-13,Metasploit,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:3.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:4.0.5a:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:4.0.5c:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:4.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:4.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:6.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.0.7:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.0.8:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.0.9:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:8.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:8.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:8.1.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:8.1.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:9.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:9.1:*:*:*:*:*:*:* CVE-2009-3548,0.0,,0.88353,"The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.",2009-11-12,Metasploit,cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.37:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.38:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.39:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:* CVE-2009-3563,0.0,,0.86927,"ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.",2009-12-09,Metasploit,cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.72:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.73:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.90:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.91:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.92:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.93:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.94:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.95:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.96:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.97:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.98:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.99:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.2p1:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.2p2:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.2p3:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:*:*:*:*:*:*:* CVE-2009-3591,0.0,,0.71287,Dopewars 1.5.12 allows remote attackers to cause a denial of service (segmentation fault) via a REQUESTJET message with an invalid location.,2009-10-08,Metasploit,cpe:2.3:a:ben_webb:dopewars:1.5.12:*:*:*:*:*:*:* CVE-2009-3672,0.0,,0.79013,"Microsoft Internet Explorer 6 and 7 does not properly handle objects in memory that (1) were not properly initialized or (2) are deleted, which allows remote attackers to execute arbitrary code via vectors involving a call to the getElementsByTagName method for the STYLE tag name, selection of the single element in the returned list, and a change to the outerHTML property of this element, related to Cascading Style Sheets (CSS) and mshtml.dll, aka ""HTML Object Memory Corruption Vulnerability."" NOTE: some of these details are obtained from third party information. NOTE: this issue was originally assigned CVE-2009-4054, but Microsoft assigned a duplicate identifier of CVE-2009-3672. CVE consumers should use this identifier instead of CVE-2009-4054.",2009-12-02,Metasploit,cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2009-3693,0.0,,0.71508,Directory traversal vulnerability in the Persits.XUpload.2 ActiveX control (XUpload.ocx) in HP LoadRunner 9.5 allows remote attackers to create arbitrary files via \.. (backwards slash dot dot) sequences in the third argument to the MakeHttpRequest method.,2009-10-13,Metasploit,cpe:2.3:a:hp:loadrunner:9.5:*:*:*:*:*:*:*;cpe:2.3:a:persits:xupload:2.0:*:*:*:*:*:*:* CVE-2009-3699,0.0,,0.78892,"Stack-based buffer overflow in libcsa.a (aka the calendar daemon library) in IBM AIX 5.x through 5.3.10 and 6.x through 6.1.3, and VIOS 2.1 and earlier, allows remote attackers to execute arbitrary code via a long XDR string in the first argument to procedure 21 of rpc.cmsd.",2009-10-15,Metasploit,cpe:2.3:a:ibm:vios:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:1.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:1.5.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.1.0.10:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.1l:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2.0.50:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2.0.54:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2.0:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2_l:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.0.20:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.0:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.10:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.7:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.8:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.9:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3:sp6:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3_l:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3_ml03:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5l:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1.0:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:* CVE-2009-3711,0.0,,0.78944,"Stack-based buffer overflow in the h_handlepeer function in http.cpp in httpdx 1.4, and possibly 1.4.3, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP GET request.",2009-10-16,Metasploit,cpe:2.3:a:jasper:httpdx:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:jasper:httpdx:1.4:*:*:*:*:*:*:* CVE-2009-3733,0.0,,0.9006,"Directory traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5 allows remote attackers to read arbitrary files via unspecified vectors.",2009-11-02,Metasploit,cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*;cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.1_build_29996:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.4_build_56528:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* CVE-2009-3837,0.0,,0.75174,Stack-based buffer overflow in Eureka Email 2.2q allows remote POP3 servers to execute arbitrary code via a long error message.,2009-11-02,Metasploit,cpe:2.3:a:eureka-email:eureka_email:2.2q:*:*:*:*:*:*:* CVE-2009-3843,0.0,,0.86831,"HP Operations Manager 8.10 on Windows contains a ""hidden account"" in the XML file that specifies Tomcat users, which allows remote attackers to conduct unrestricted file upload attacks, and thereby execute arbitrary code, by using the org.apache.catalina.manager.HTMLManagerServlet class to make requests to manager/html/upload.",2009-11-24,Metasploit,cpe:2.3:a:hp:operations_manager:8.10:*:windows:*:*:*:*:* CVE-2009-3844,0.0,,0.66265,Stack-based buffer overflow in the OmniInet process in HP OpenView Data Protector Application Recovery Manager 5.50 and 6.0 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted MSG_PROTOCOL packet.,2009-12-08,Metasploit,cpe:2.3:a:hp:openview_data_protector_application_recovery_manager:5.50:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_data_protector_application_recovery_manager:6.0:*:*:*:*:*:*:* CVE-2009-3849,0.0,,0.83371,"Multiple stack-based buffer overflows in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allow remote attackers to execute arbitrary code via (1) a long Template parameter to nnmRptConfig.exe, related to the strcat function; or (2) a long Oid parameter to snmp.exe.",2009-12-10,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:hp_ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:* CVE-2009-3853,0.0,,0.7393,"Stack-based buffer overflow in the client acceptor daemon (CAD) scheduler in the client in IBM Tivoli Storage Manager (TSM) 5.3 before 5.3.6.7, 5.4 before 5.4.3, 5.5 before 5.5.2.2, and 6.1 before 6.1.0.2, and TSM Express 5.3.3.0 through 5.3.6.6, allows remote attackers to execute arbitrary code via crafted data in a TCP packet.",2009-11-04,Metasploit,cpe:2.3:a:ibm:tivoli_storage_manager:5.2.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.3:*:express:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.4:*:express:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.5:*:express:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.6:*:express:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6:*:express:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.4.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:6.1.0:*:*:*:*:*:*:* CVE-2009-3861,0.0,,0.06573,"Stack-based buffer overflow in SafeNet SoftRemote 10.8.5 (Build 2) and 10.3.5 (Build 6), and possibly other versions before 10.8.9, allows local users to execute arbitrary code via a long string in a (1) TREENAME or (2) GROUPNAME Policy file (spd).",2009-11-04,Metasploit,cpe:2.3:a:safenet-inc:softremote:*:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.7.7:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.3.5:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.7.7:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.0:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.1:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.2:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.3:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.4:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.5:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.6:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.7:*:*:*:*:*:*:* CVE-2009-3867,0.0,,0.88695,"Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.",2009-11-05,Metasploit,cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_01a:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:* CVE-2009-3869,0.0,,0.77101,"Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.",2009-11-05,Metasploit,cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_01a:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:* CVE-2009-3953,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.90514,"The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF document, related to a CLODProgressiveMeshDeclaration ""array boundary issue,"" a different vulnerability than CVE-2009-2994.",2010-01-13,Metasploit/CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:10.0:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:* CVE-2009-3960,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,0.86265,"Unspecified vulnerability in BlazeDS 3.2 and earlier, as used in LiveCycle 8.0.1, 8.2.1, and 9.0, LiveCycle Data Services 2.5.1, 2.6.1, and 3.0, Flex Data Services 2.0.1, and ColdFusion 7.0.2, 8.0, 8.0.1, and 9.0, allows remote attackers to obtain sensitive information via vectors that are associated with a request, and related to injected tags and external entity references in XML documents.",2010-02-15,Metasploit/CISA,cpe:2.3:a:adobe:blazeds:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flex_data_services:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:livecycle:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:livecycle:8.2.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:livecycle:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:livecycle_data_services:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:livecycle_data_services:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:livecycle_data_services:3.0:*:*:*:*:*:*:* CVE-2009-3976,0.0,,0.64448,Buffer overflow in Labtam ProFTP 2.9 allows remote FTP servers to cause a denial of service (application crash) or execute arbitrary code via a long 220 reply (aka connection greeting or welcome message).,2009-11-18,Metasploit,cpe:2.3:a:labtam-inc:proftp:2.9:*:*:*:*:*:*:* CVE-2009-3999,0.0,,0.699,Stack-based buffer overflow in goform/formExportDataLogs in HP Power Manager before 4.2.10 allows remote attackers to execute arbitrary code via a long fileName parameter.,2010-01-20,Metasploit,cpe:2.3:a:hp:power_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:power_manager:4.2.5:*:*:*:*:*:*:*;cpe:2.3:a:hp:power_manager:4.2.6:*:*:*:*:*:*:* CVE-2009-4006,0.0,,0.7787,"Stack-based buffer overflow in the TEA decoding algorithm in RhinoSoft Serv-U FTP server 7.0.0.1, 9.0.0.5, and other versions before 9.1.0.0 allows remote attackers to execute arbitrary code via a long hexadecimal string.",2009-11-20,Metasploit,cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:9.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:9.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:9.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:9.1.0.0:*:*:*:*:*:*:* CVE-2009-4098,0.0,,0.50581,"Unrestricted file upload vulnerability in banner-edit.php in OpenX adserver 2.8.1 and earlier allows remote authenticated users with banner / file upload permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an images directory.",2009-11-29,Metasploit,cpe:2.3:a:openx:openx:*:*:*:*:*:*:*:*;cpe:2.3:a:openx:openx:2.4:*:*:*:*:*:*:*;cpe:2.3:a:openx:openx:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:openx:openx:2.6.3:*:*:*:*:*:*:*;cpe:2.3:a:openx:openx:2.8:*:*:*:*:*:*:* CVE-2009-4140,0.0,,0.91085,"Unrestricted file upload vulnerability in ofc_upload_image.php in Open Flash Chart v2 Beta 1 through v2 Lug Wyrm Charmer, as used in Piwik 0.2.35 through 0.4.3, Woopra Analytics Plugin before 1.4.3.2, and possibly other products, when register_globals is enabled, allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension through the name parameter with the code in the HTTP_RAW_POST_DATA parameter, then accessing it via a direct request to the file in tmp-upload-images/.",2009-12-22,Metasploit,cpe:2.3:a:matomo:matomo:0.2.37:*:*:*:*:*:*:*;cpe:2.3:a:matomo:matomo:0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:matomo:matomo:0.4.3:*:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:gamera:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:hyperion:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:ichor:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:j_rmungandr-2:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:j_rmungandr:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:kvasir:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:lug_wyrm_charmer:*:*:*:*:*:* CVE-2009-4146,0.0,,0.1817,"The _rtld function in the Run-Time Link-Editor (rtld) in libexec/rtld-elf/rtld.c in FreeBSD 7.1, 7.2, and 8.0 does not clear the LD_PRELOAD environment variable, which allows local users to gain privileges by executing a setuid or setguid program with a modified LD_PRELOAD variable containing an untrusted search path that points to a Trojan horse library, a different vector than CVE-2009-4147.",2009-12-02,Metasploit,cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:7.2:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:8.0:*:*:*:*:*:*:* CVE-2009-4147,0.0,,0.12579,"The _rtld function in the Run-Time Link-Editor (rtld) in libexec/rtld-elf/rtld.c in FreeBSD 7.1 and 8.0 does not clear the (1) LD_LIBMAP, (2) LD_LIBRARY_PATH, (3) LD_LIBMAP_DISABLE, (4) LD_DEBUG, and (5) LD_ELF_HINTS_PATH environment variables, which allows local users to gain privileges by executing a setuid or setguid program with a modified variable containing an untrusted search path that points to a Trojan horse library, different vectors than CVE-2009-4146.",2009-12-02,Metasploit,cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:8.0:*:*:*:*:*:*:* CVE-2009-4178,0.0,,0.86098,"Heap-based buffer overflow in OvWebHelp.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a long Topic parameter.",2009-12-10,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:hp_ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:* CVE-2009-4179,0.0,,0.77533,"Stack-based buffer overflow in ovalarm.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a long HTTP Accept-Language header in an OVABverbose action.",2009-12-10,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:hp_ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:* CVE-2009-4188,0.0,,0.85992,"HP Operations Dashboard has a default password of j2deployer for the j2deployer account, which allows remote attackers to execute arbitrary code via a session that uses the manager role to conduct unrestricted file upload attacks against the /manager servlet in the Tomcat servlet container. NOTE: this might overlap CVE-2009-3098.",2009-12-03,Metasploit,cpe:2.3:a:hp:operations_dashboard:*:*:*:*:*:*:*:* CVE-2009-4189,0.0,,0.83488,"HP Operations Manager has a default password of OvW*busr1 for the ovwebusr account, which allows remote attackers to execute arbitrary code via a session that uses the manager role to conduct unrestricted file upload attacks against the /manager servlet in the Tomcat servlet container. NOTE: this might overlap CVE-2009-3099 and CVE-2009-3843.",2009-12-03,Metasploit,cpe:2.3:a:hp:operations_manager:*:*:*:*:*:*:*:* CVE-2009-4195,0.0,,0.87197,"Buffer overflow in Adobe Illustrator CS4 14.0.0, CS3 13.0.3 and earlier, and CS3 13.0.0 allows remote attackers to execute arbitrary code via a long DSC comment in an Encapsulated PostScript (.eps) file. NOTE: some of these details are obtained from third party information.",2009-12-04,Metasploit,cpe:2.3:a:adobe:illustrator:13.0.0:cs4:*:*:*:*:*:*;cpe:2.3:a:adobe:illustrator:14.0.0:cs4:*:*:*:*:*:* CVE-2009-4202,0.0,,0.1537,Directory traversal vulnerability in the Omilen Photo Gallery (com_omphotogallery) component Beta 0.5 for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the controller parameter to index.php.,2009-12-04,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:omilenitsolutions:com_omphotogallery:0.5:beta:*:*:*:*:*:* CVE-2009-4223,0.0,,0.04664,PHP remote file inclusion vulnerability in adm/krgourl.php in KR-Web 1.1b2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the DOCUMENT_ROOT parameter.,2009-12-07,Nuclei,cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:*;cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:1.1:*:*:*:*:*:*:*;cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:1.1:beta:*:*:*:*:*:* CVE-2009-4225,0.0,,0.61454,Stack-based buffer overflow in the PestPatrol ActiveX control (ppctl.dll) 5.6.7.9 in CA eTrust PestPatrol allows remote attackers to execute arbitrary code via a long argument to the Initialize method.,2009-12-08,Metasploit,cpe:2.3:a:ca:etrust_pestpatrole_ppctl.dll_activex:5.6.7.9:*:*:*:*:*:*:* CVE-2009-4265,0.0,,0.67067,"Stack-based buffer overflow in Ideal Administration 2009 9.7.1, and possibly other versions, allows remote attackers to execute arbitrary code via a long Computer value in an .ipj project file.",2009-12-10,Metasploit,cpe:2.3:a:pointdev:ideal_administration_2009:9.7.1:*:*:*:*:*:*:* CVE-2009-4324,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.92892,"Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.",2009-12-15,Metasploit/CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:10.0:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:* CVE-2009-4484,0.0,,0.74607,"Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld in MySQL 5.0.x before 5.0.90, MySQL 5.1.x before 5.1.43, MySQL 5.5.x through 5.5.0-m2, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field, as demonstrated by mysql_overflow1.py and the vd_mysql5 module in VulnDisco Pack Professional 8.11. NOTE: this was originally reported for MySQL 5.0.51a.",2009-12-30,Metasploit,cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.0:milestone1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.0:milestone2:*:*:*:*:*:*;cpe:2.3:a:wolfssl:yassl:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* CVE-2009-4498,0.0,,0.71776,The node_process_command function in Zabbix Server before 1.8 allows remote attackers to execute arbitrary commands via a crafted request.,2009-12-31,Metasploit,cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:* CVE-2009-4502,0.0,,0.61272,"The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.",2009-12-31,Metasploit,cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:* CVE-2009-4588,0.0,,0.64987,"Heap-based buffer overflow in the WindsPlayerIE.View.1 ActiveX control in WindsPly.ocx 3.5.0.0 Beta, 3.0.0.5, and earlier in AwingSoft Awakening Web3D Player and Winds3D Viewer allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long SceneUrl property value, a different vulnerability than CVE-2009-2386. NOTE: some of these details are obtained from third party information.",2010-01-07,Metasploit,cpe:2.3:a:awingsoft:awakening_winds3d_player:3.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:awingsoft:awakening_winds3d_player:3.5.0.0:beta:*:*:*:*:*:*;cpe:2.3:a:awingsoft:awakening_winds3d_viewer:3.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:awingsoft:awakening_winds3d_viewer:3.5.0.0:beta:*:*:*:*:*:* CVE-2009-4655,0.0,,0.6034,"The dhost web service in Novell eDirectory 8.8.5 uses a predictable session cookie, which makes it easier for remote attackers to hijack sessions via a modified cookie.",2010-02-26,Metasploit,cpe:2.3:a:novell:edirectory:8.8.5:*:*:*:*:*:*:* CVE-2009-4656,0.0,,0.68422,"Stack-based buffer overflow in E-Soft DJ Studio Pro 4.2 including 4.2.2.7.5, and 5.x including 5.1.4.3.1, allows user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a playlist file (.pls) containing a long string. NOTE: some of these details are obtained from third party information.",2010-03-03,Metasploit,cpe:2.3:a:e-soft.co:dj_studio_pro:4.2.2.7.5:*:*:*:*:*:*:*;cpe:2.3:a:e-soft.co:dj_studio_pro:4.2:*:*:*:*:*:*:*;cpe:2.3:a:e-soft.co:dj_studio_pro:5.1.4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:e-soft.co:dj_studio_pro:5.1:*:*:*:*:*:*:* CVE-2009-4660,0.0,,0.80719,Stack-based buffer overflow in the AntServer Module (AntServer.exe) in BigAnt IM Server 2.50 allows remote attackers to execute arbitrary code via a long GET request to TCP port 6660.,2010-03-03,Metasploit,cpe:2.3:a:bigantsoft:bigant_messenger:2.50:*:*:*:*:*:*:* CVE-2009-4679,0.0,,0.23302,Directory traversal vulnerability in the inertialFATE iF Portfolio Nexus (com_if_nexus) component 1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.,2010-03-08,Nuclei,cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2009-4769,0.0,,0.62136,"Multiple format string vulnerabilities in the tolog function in httpdx 1.4, 1.4.5, 1.4.6, 1.4.6b, and 1.5 allow (1) remote attackers to execute arbitrary code via format string specifiers in a GET request to the HTTP server component when logging is enabled, and allow (2) remote authenticated users to execute arbitrary code via format string specifiers in a PWD command to the FTP server component.",2010-04-20,Metasploit,cpe:2.3:a:jasper:httpdx:1.4.5:*:*:*:*:*:*:*;cpe:2.3:a:jasper:httpdx:1.4.6:*:*:*:*:*:*:*;cpe:2.3:a:jasper:httpdx:1.4.6b:*:*:*:*:*:*:*;cpe:2.3:a:jasper:httpdx:1.4:*:*:*:*:*:*:*;cpe:2.3:a:jasper:httpdx:1.5:*:*:*:*:*:*:* CVE-2009-4850,0.0,,0.55791,The Awingsoft Awakening Winds3D Viewer plugin 3.5.0.9 allows remote attackers to execute arbitrary programs via a SceneURL property value with a URL for a .exe file.,2010-05-07,Metasploit,cpe:2.3:a:awingsoft:awakening_winds3d_viewer_plugin:3.5.0.9:*:*:*:*:*:*:* CVE-2009-4962,0.0,,0.69332,Stack-based buffer overflow in Fat Player 0.6b allows remote attackers to execute arbitrary code via a long string in a .wav file. NOTE: some of these details are obtained from third party information.,2010-07-28,Metasploit,cpe:2.3:a:adammo:fat_player:0.6:b:*:*:*:*:*:* CVE-2009-4988,0.0,,0.80845,Stack-based buffer overflow in NT_Naming_Service.exe in SAP Business One 2005 A 6.80.123 and 6.80.320 allows remote attackers to execute arbitrary code via a long GIOP request to TCP port 30000.,2010-08-25,Metasploit,cpe:2.3:a:sap:business_one_2005-a:6.80.123:*:*:*:*:*:*:*;cpe:2.3:a:sap:business_one_2005-a:6.80.320:*:*:*:*:*:*:* CVE-2009-5020,0.0,,0.01389,Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.,2010-12-02,Nuclei,cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:1.0:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:2.1.:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:3.0:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:3.1:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:3.2:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:4.1:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.8:*:*:*:*:*:*:* CVE-2009-5109,0.0,,0.62221,Stack-based buffer overflow in Mini-Stream Ripper 3.0.1.1 allows remote attackers to execute arbitrary code via a long entry in a .pls file.,2011-12-25,Metasploit,cpe:2.3:a:mini-stream:ripper:3.0.1.1:*:*:*:*:*:*:* CVE-2009-5114,0.0,,0.26552,Directory traversal vulnerability in wgarcmin.cgi in WebGlimpse 2.18.7 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the DOC parameter.,2012-03-19,Nuclei,cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:1.7.6:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:1.7.9:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.0.03:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.0.04:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.0.07:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.1.01:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.1.04:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.10.2:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.10.4:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.10.5:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.11.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.12.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.12.1:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.12.2:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.12.3:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.13.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.13.1:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.13.2:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.14.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.14.1:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.14.3:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.14.6:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.14.8:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.15.2:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.15.3:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.16.1:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.17.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.17.2:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.18.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.18.2:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.18.3:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.18.4:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.18.5:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.4.3:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.4.6:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.5.4:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.6.7:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.7.4:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.7.6:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.7.7:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.8.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.8.1:*:*:*:*:*:*:* CVE-2010-0017,0.0,,0.43931,"Race condition in the SMB client implementation in Microsoft Windows Server 2008 R2 and Windows 7 allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code, and in the SMB client implementation in Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2 allows local users to gain privileges, via a crafted SMB Negotiate response, aka ""SMB Client Race Condition Vulnerability.""",2010-02-10,Metasploit,cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:-:x64:*:*:*:*:* CVE-2010-0033,0.0,,0.79579,"Stack-based buffer overflow in Microsoft Office PowerPoint 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka ""PowerPoint Viewer TextBytesAtom Record Stack Overflow Vulnerability.""",2010-02-10,Metasploit,cpe:2.3:a:microsoft:powerpoint:2003:sp3:*:*:*:*:*:* CVE-2010-0094,0.0,,0.88908,"Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18 and 5.0 Update 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is due to missing privilege checks during deserialization of RMIConnectionImpl objects, which allows remote attackers to call system-level Java functions via the ClassLoader of a constructor that is being deserialized.",2010-04-01,Metasploit,cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:* CVE-2010-0103,0.0,,0.76775,"UsbCharger.dll in the Energizer DUO USB battery charger software contains a backdoor that is implemented through the Arucer.dll file in the %WINDIR%\system32 directory, which allows remote attackers to download arbitrary programs onto a Windows PC, and execute these programs, via a request to TCP port 7777.",2010-03-10,Metasploit,cpe:2.3:a:energizer:duo_usb:*:*:*:*:*:*:*:* CVE-2010-0111,0.0,,0.60589,"HDNLRSVC.EXE in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (aka AMS or AMS2), as used in Symantec AntiVirus Corporate Edition (SAVCE) 10.x before 10.1 MR10, Symantec System Center (SSC) 10.x, and Symantec Quarantine Server 3.5 and 3.6, allows remote attackers to execute arbitrary programs by sending msgsys.exe a UNC share pathname, which is used directly in a CreateProcessA (aka CreateProcess) call.",2011-01-31,Metasploit,cpe:2.3:a:symantec:antivirus:10.0.1.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.3:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.4:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.5:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.6:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.7:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.8:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.9:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0:mr1:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0:mr2:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.0.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.4.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.4:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.5.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.5:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.6.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.6:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.7:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.8:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.9:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1:mp1:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1:mr4:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1:mr5:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1:mr6:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1:mr7:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.2:mr2:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.2:mr3:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus_central_quarantine_server:3.5:*:*:*:*:*:*:*;cpe:2.3:a:symantec:antivirus_central_quarantine_server:3.6:*:*:*:*:*:*:*;cpe:2.3:a:symantec:system_center:10.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:system_center:10.1:*:*:*:*:*:*:* CVE-2010-0157,0.0,,0.07582,Directory traversal vulnerability in the Bible Study (com_biblestudy) component 6.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter in a studieslist action to index.php.,2010-01-06,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlabiblestudy:com_biblestudy:6.1:*:*:*:*:*:*:* CVE-2010-0188,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.92798,Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.,2010-02-22,Metasploit/CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* CVE-2010-0219,0.0,,0.93421,"Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.",2010-10-18,Metasploit/Nuclei,cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:axis2:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:axis2:1.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:axis2:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:axis2:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:axis2:1.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:axis2:1.6:*:*:*:*:*:*:*;cpe:2.3:a:sap:businessobjects:3.2:*:enterprise_xi:*:*:*:*:* CVE-2010-0232,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.7674,"The kernel in Microsoft Windows NT 3.1 through Windows 7, including Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, when access to 16-bit applications is enabled on a 32-bit x86 platform, does not properly validate certain BIOS calls, which allows local users to gain privileges by crafting a VDM_TIB data structure in the Thread Environment Block (TEB), and then calling the NtVdmControl function to start the Windows Virtual DOS Machine (aka NTVDM) subsystem, leading to improperly handled exceptions involving the #GP trap handler (nt!KiTrap0D), aka ""Windows Kernel Exception Handler Vulnerability.""",2010-01-21,Metasploit/CISA,cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:-:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2010-0248,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.78378,"Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka ""HTML Object Memory Corruption Vulnerability.""",2010-01-22,Metasploit,cpe:2.3:a:microsoft:internet_explorer:6.0.2600:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0.2800.1106:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0.2800:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0.2900.2180:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0.2900:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.2462.0000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.2479.0006:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.2600.0000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.2800.1106:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.2900.2180:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.3663.0000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.3718.0000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.3790.0000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.3790.1830:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.3790.3959:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7.0.5730.11:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7.0.5730:unknown:gold:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7.00.5730.1100:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7.00.6000.16386:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7.00.6000.16441:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8.0.6001:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2010-0249,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.9139,"Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4; Windows XP SP2 and SP3; Windows Server 2003 SP2; Windows Vista Gold, SP1, and SP2; Windows Server 2008 Gold, SP2, and R2; and Windows 7 allows remote attackers to execute arbitrary code by accessing a pointer associated with a deleted object, related to incorrectly initialized memory and improper handling of objects in memory, as exploited in the wild in December 2009 and January 2010 during Operation Aurora, aka ""HTML Object Memory Corruption Vulnerability.""",2010-01-15,Metasploit,cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2010-0266,0.0,,0.82804,"Microsoft Office Outlook 2002 SP3, 2003 SP3, and 2007 SP1 and SP2 does not properly verify e-mail attachments with a PR_ATTACH_METHOD property value of ATTACH_BY_REFERENCE, which allows user-assisted remote attackers to execute arbitrary code via a crafted message, aka ""Microsoft Outlook SMB Attachment Vulnerability.""",2010-07-15,Metasploit,cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2002:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2007:sp2:*:*:*:*:*:* CVE-2010-0304,0.0,,0.77116,"Multiple buffer overflows in the LWRES dissector in Wireshark 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5 allow remote attackers to cause a denial of service (crash) via a malformed packet, as demonstrated using a stack-based buffer overflow to the dissect_getaddrsbyname_request function.",2010-02-03,Metasploit,cpe:2.3:a:wireshark:wireshark:0.9.15:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.10:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2:*:*:*:*:*:*:* CVE-2010-0356,0.0,,0.65175,Stack-based buffer overflow in the MOVIEPLAYER.MoviePlayerCtrl.1 ActiveX control in MoviePlayer.ocx 6.8.0.0 in Viscom Software Movie Player Pro SDK ActiveX 6.8 allows remote attackers to execute arbitrary code via a long strFontName parameter to the DrawText method.,2010-01-18,Metasploit,cpe:2.3:a:viscomsoft:movie_player_pro_sdk_activex:6.8:*:*:*:*:*:*:* CVE-2010-0361,0.0,,0.88394,Stack-based buffer overflow in the WebDAV implementation in webservd in Sun Java System Web Server (aka SJWS) 7.0 Update 7 allows remote attackers to cause a denial of service (daemon crash) and possibly have unspecified other impact via a long URI in an HTTP OPTIONS request.,2010-01-20,Metasploit,cpe:2.3:a:sun:java_system_web_server:7.0:update_7:*:*:*:*:*:* CVE-2010-0425,0.0,,0.86822,"modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and ""orphaned callback pointers.""",2010-03-05,Metasploit,cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:vmware_ace_management_server:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.11:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.13:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.15:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.19:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.21:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.23:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.25:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.27:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.29:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.31:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.33:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.35:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.37:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.39:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.7:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2.9:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1.0.11:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1.0.13:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1.0.15:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1.0.17:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1.0.19:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1.0.21:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1.0.23:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1.0.25:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1.0.27:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1.0.29:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:ibm:http_server:6.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:z\/os:*:*;cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2010-0467,5.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N,0.24055,Directory traversal vulnerability in the ccNewsletter (com_ccnewsletter) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a ccnewsletter action to index.php.,2010-02-02,Nuclei,cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-0478,0.0,,0.80613,"Stack-based buffer overflow in nsum.exe in the Windows Media Unicast Service in Media Services for Microsoft Windows 2000 Server SP4 allows remote attackers to execute arbitrary code via crafted packets associated with transport information, aka ""Media Services Stack-based Buffer Overflow Vulnerability.""",2010-04-14,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:* CVE-2010-0480,0.0,,0.83493,"Multiple stack-based buffer overflows in the MPEG Layer-3 audio codecs in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to execute arbitrary code via a crafted AVI file, aka ""MPEG Layer-3 Audio Decoder Stack Overflow Vulnerability.""",2010-04-14,Metasploit,cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2010-0483,0.0,,0.81964,"vbscript.dll in VBScript 5.1, 5.6, 5.7, and 5.8 in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, when Internet Explorer is used, allows user-assisted remote attackers to execute arbitrary code by referencing a (1) local pathname, (2) UNC share pathname, or (3) WebDAV server with a crafted .hlp file in the fourth argument (aka helpfile argument) to the MsgBox function, leading to code execution involving winhlp32.exe when the F1 key is pressed, aka ""VBScript Help Keypress Vulnerability.""",2010-03-03,Metasploit,cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2010-0557,0.0,,0.79404,"IBM Cognos Express 9.0 allows attackers to obtain unspecified access to the Tomcat Manager component, and cause a denial of service, by leveraging hardcoded credentials.",2010-02-05,Metasploit,cpe:2.3:a:ibm:cognos_express:9.0:*:*:*:*:*:*:* CVE-2010-0679,0.0,,0.73238,Multiple stack-based buffer overflows in the HyleosChemView.HLChemView ActiveX control (HyleosChemView.ocx) in Hyleos ChemView 1.9.5.1 allow remote attackers to execute arbitrary code via a large number of white space characters in the filename argument to the (1) SaveasMolFile and (2) ReadMolFile methods.,2010-02-22,Metasploit,cpe:2.3:a:hyleos:chemview:1.9.5.1:*:*:*:*:*:*:* CVE-2010-0688,0.0,,0.69652,Stack-based buffer overflow in Orbital Viewer 1.04 allows user-assisted remote attackers to execute arbitrary code via a crafted (1) .orb or (2) .ov file.,2010-03-19,Metasploit,cpe:2.3:a:orbitals:orbital_viewer:1.04:*:*:*:*:*:*:* CVE-2010-0696,0.0,,0.51271,Directory traversal vulnerability in includes/download.php in the JoomlaWorks AllVideos (Jw_allVideos) plugin 3.0 through 3.2 for Joomla! allows remote attackers to read arbitrary files via a ./../.../ (modified dot dot) in the file parameter.,2010-02-23,Nuclei,cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:*;cpe:2.3:a:joomlaworks:jw_allvideos:3.1:*:*:*:*:*:*:*;cpe:2.3:a:joomlaworks:jw_allvideos:3.2:*:*:*:*:*:*:* CVE-2010-0738,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,0.92368,"The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.",2010-04-28,Metasploit/CISA,cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:-:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:-:*:*:*:*:*:* CVE-2010-0759,0.0,,0.06605,"Directory traversal vulnerability in plugins/system/cdscriptegrator/libraries/highslide/js/jsloader.php in the Core Design Scriptegrator plugin 1.4.1 for Joomla! allows remote attackers to read, and possibly include and execute, arbitrary files via directory traversal sequences in the files[] parameter, a different vector than CVE-2010-0760.",2010-02-27,Nuclei,cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-0805,0.0,,0.87692,"The Tabular Data Control (TDC) ActiveX control in Microsoft Internet Explorer 5.01 SP4, 6 on Windows XP SP2 and SP3, and 6 SP1 allows remote attackers to execute arbitrary code via a long URL (DataURL parameter) that triggers memory corruption in the CTDCCtl::SecurityCHeckDataURL function, aka ""Memory Corruption Vulnerability.""",2010-03-31,Metasploit,cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* CVE-2010-0806,0.0,,0.90864,"Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in the wild in March 2010, aka ""Uninitialized Memory Corruption Vulnerability.""",2010-03-10,Metasploit,cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2010-0822,0.0,,0.80447,"Stack-based buffer overflow in Microsoft Office Excel 2002 SP3, Office 2004 for Mac, Office 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via an Excel file with a crafted OBJ (0x5D) record, aka ""Excel Object Stack Overflow Vulnerability.""",2010-06-08,Metasploit,cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*;cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*;cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:* CVE-2010-0840,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92554,"Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) ""a similar trust issue with interfaces,"" aka ""Trusted Methods Chaining Remote Code Execution Vulnerability.""",2010-04-01,Metasploit/CISA,cpe:2.3:a:oracle:jre:1.4.2_25:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* CVE-2010-0842,0.0,,0.91327,"Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an uncontrolled array index that allows remote attackers to execute arbitrary code via a MIDI file with a crafted MixerSequencer object, related to the GM_Song structure.",2010-04-01,Metasploit,cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:* CVE-2010-0866,0.0,,0.59232,"Unspecified vulnerability in the JavaVM component in Oracle Database 11.1.0.7 and 11.2.0.1 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.",2010-04-13,Metasploit,cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_server:11.2.0.1:*:*:*:*:*:*:* CVE-2010-0870,0.0,,0.47666,"Unspecified vulnerability in the Change Data Capture component in Oracle Database 9.2.0.8 and 9.2.0.8DV allows remote authenticated users to affect confidentiality and integrity, related to SYS.DBMS_CDC_PUBLISH.",2010-04-13,Metasploit,cpe:2.3:a:oracle:database_server:9.2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_server:9.2.0.8dv:*:*:*:*:*:*:* CVE-2010-0886,0.0,,0.80974,"Unspecified vulnerability in the Java Deployment Toolkit component in Oracle Java SE and Java for Business JDK and JRE 6 Update 10 through 19 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.",2010-04-20,Metasploit,cpe:2.3:a:sun:jdk:1.6.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update19:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2010-0904,0.0,,0.88044,Unspecified vulnerability in Oracle Secure Backup 10.3.0.1 allows remote attackers to affect integrity via unknown vectors.,2010-07-13,Metasploit,cpe:2.3:a:oracle:secure_backup:10.3.0.1:*:*:*:*:*:*:* CVE-2010-0926,0.0,,0.27491,"The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.",2010-03-10,Metasploit,cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:* CVE-2010-0942,0.0,,0.04088,Directory traversal vulnerability in the jVideoDirect (com_jvideodirect) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-03-08,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:* CVE-2010-0943,0.0,,0.0204,Directory traversal vulnerability in the JA Showcase (com_jashowcase) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a jashowcase action to index.php.,2010-03-08,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:* CVE-2010-0944,0.0,,0.0143,Directory traversal vulnerability in the JCollection (com_jcollection) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-03-08,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:* CVE-2010-0972,0.0,,0.03709,Directory traversal vulnerability in the GCalendar (com_gcalendar) component 2.1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.,2010-03-16,Nuclei,cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-0982,0.0,,0.19011,Directory traversal vulnerability in the CARTwebERP (com_cartweberp) component 1.56.75 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-03-16,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:* CVE-2010-0985,0.0,,0.05737,Directory traversal vulnerability in the Abbreviations Manager (com_abbrev) component 1.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.,2010-03-16,Nuclei,cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1056,0.0,,0.06367,Directory traversal vulnerability in the RokDownloads (com_rokdownloads) component before 1.0.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.,2010-03-23,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:0.91:a:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:0.92:a:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:0.93:a:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:0.94:a:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:0.95:a:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:0.96:a:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:0.97:a:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:0.98:a:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:1.0:b1:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:1.0:b2:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:1.0:b3:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:1.0:b4:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:1.0:b5:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:1.0:b6:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:1.0:b7:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:1.0:b8:*:*:*:*:*:*;cpe:2.3:a:rockettheme:com_rokdownloads:1.0:b9:*:*:*:*:*:* CVE-2010-1081,0.0,,0.07807,"Directory traversal vulnerability in the Community Polls (com_communitypolls) component 1.5.2, and possibly earlier, for Core Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.",2010-03-23,Nuclei,cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:*;cpe:2.3:a:corejoomla:com_communitypolls:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:corejoomla:com_communitypolls:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:corejoomla:com_communitypolls:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:corejoomla:com_communitypolls:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:corejoomla:com_communitypolls:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:corejoomla:com_communitypolls:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:corejoomla:com_communitypolls:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:corejoomla:com_communitypolls:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:corejoomla:com_communitypolls:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:corejoomla:com_communitypolls:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:corejoomla:com_communitypolls:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1217,0.0,,0.0223,"Directory traversal vulnerability in the JE Form Creator (com_jeformcr) component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via directory traversal sequences in the view parameter to index.php. NOTE: the original researcher states that the affected product is JE Tooltip, not Form Creator; however, the exploit URL suggests that Form Creator is affected.",2010-03-30,Nuclei,cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* CVE-2010-1219,0.0,,0.06959,Directory traversal vulnerability in the JA News (com_janews) component 1.0 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.,2010-03-30,Nuclei,cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* CVE-2010-1240,0.0,,0.90565,"Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, do not restrict the contents of one text field in the Launch File warning dialog, which makes it easier for remote attackers to trick users into executing an arbitrary local program that was specified in a PDF document, as demonstrated by a text field that claims that the Open button will enable the user to read an encrypted message.",2010-04-05,Metasploit,cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2010-1297,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.93621,"Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010.",2010-06-08,Metasploit/CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:* CVE-2010-1302,0.0,,0.03654,Directory traversal vulnerability in dwgraphs.php in the DecryptWeb DW Graphs (com_dwgraphs) component 1.0 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.,2010-04-07,Nuclei,cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1304,0.0,,0.02086,Directory traversal vulnerability in userstatus.php in the User Status (com_userstatus) component 1.21.16 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-04-08,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:* CVE-2010-1305,0.0,,0.07358,"Directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.",2010-04-08,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:* CVE-2010-1306,0.0,,0.03358,Directory traversal vulnerability in the Picasa (com_joomlapicasa2) component 2.0 and 2.0.5 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.,2010-04-08,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.5:*:*:*:*:*:*:* CVE-2010-1307,0.0,,0.06493,Directory traversal vulnerability in the Magic Updater (com_joomlaupdater) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-04-08,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:1.1:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:1.2:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:1.4:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:software.realtyna:com_joomlaupdater:3.0.0:*:*:*:*:*:*:* CVE-2010-1308,0.0,,0.06232,Directory traversal vulnerability in the SVMap (com_svmap) component 1.1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-04-08,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:* CVE-2010-1312,0.0,,0.03303,Directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-04-08,Nuclei,cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ijoomla:com_news_portal:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ijoomla:com_news_portal:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ijoomla:com_news_portal:1.5.6:*:*:*:*:*:*:*;cpe:2.3:a:ijoomla:com_news_portal:1.5.7:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1313,0.0,,0.02581,"Directory traversal vulnerability in the Seber Cart (com_sebercart) component 1.0.0.12 and 1.0.0.13 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. NOTE: some of these details are obtained from third party information.",2010-04-08,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:seber:com_sebercart:1.0.0.12:*:*:*:*:*:*:*;cpe:2.3:a:seber:com_sebercart:1.0.0.13:*:*:*:*:*:*:* CVE-2010-1314,0.0,,0.01256,Directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.,2010-04-08,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:*;cpe:2.3:a:joomlanook:com_hsconfig:2.0.9:*:*:*:*:*:*:* CVE-2010-1315,0.0,,0.03853,Directory traversal vulnerability in weberpcustomer.php in the webERPcustomer (com_weberpcustomer) component 1.2.1 and 1.x before 1.06.02 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.,2010-04-08,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:* CVE-2010-1318,0.0,,0.77594,"Stack-based buffer overflow in the AgentX::receive_agentx function in AgentX++ 1.4.16, as used in RealNetworks Helix Server and Helix Mobile Server 11.x through 13.x and other products, allows remote attackers to execute arbitrary code via unspecified vectors.",2010-04-20,Metasploit,cpe:2.3:a:realnetworks:helix_mobile_server:*:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:helix_server:*:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:helix_server:11.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:helix_server:11.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:helix_server:12.0.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:helix_server:12.0.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:helix_server_mobile:11.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:helix_server_mobile:12.0.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:helix_server_mobile:13.0.0:*:*:*:*:*:*:* CVE-2010-1340,0.0,,0.02964,Directory traversal vulnerability in jresearch.php in the J!Research (com_jresearch) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-04-09,Nuclei,cpe:2.3:a:joomla-research:com_jresearch:*:*:*:*:*:*:*:*;cpe:2.3:a:joomla-research:com_jresearch:1.1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.0:*:*:*:*:*:*:* CVE-2010-1345,0.0,,0.02679,Directory traversal vulnerability in the Cookex Agency CKForms (com_ckforms) component 1.3.3 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-04-09,Nuclei,cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1352,0.0,,0.03585,Directory traversal vulnerability in the JOOFORGE Jutebox (com_jukebox) component 1.0 and 1.7 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.,2010-04-12,Nuclei,cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:*;cpe:2.3:a:jooforge:com_jukebox:1.7:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1353,0.0,,0.01291,Directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.,2010-04-12,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:* CVE-2010-1354,0.0,,0.03678,Directory traversal vulnerability in the VJDEO (com_vjdeo) component 1.0 and 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.,2010-04-12,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:ternaria:com_vjdeo:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ternaria:com_vjdeo:1.0:*:*:*:*:*:*:* CVE-2010-1423,0.0,,0.68947,"Argument injection vulnerability in the URI handler in (a) Java NPAPI plugin and (b) Java Deployment Toolkit in Java 6 Update 10, 19, and other versions, when running on Windows and possibly on Linux, allows remote attackers to execute arbitrary code via the (1) -J or (2) -XXaltjvm argument to javaws.exe, which is processed by the launch method. NOTE: some of these details are obtained from third party information.",2010-04-15,Metasploit,cpe:2.3:a:oracle:jdk:*:update19:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:update19:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update_10:*:*:*:*:*:* CVE-2010-1428,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.64971,"The Web Console (aka web-console) in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to obtain sensitive information via an unspecified request that uses a different method.",2010-04-28,Metasploit/CISA,cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:-:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:-:*:*:*:*:*:* CVE-2010-1429,0.0,,0.21185,"Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 allows remote attackers to obtain sensitive information about ""deployed web contexts"" via a request to the status servlet, as demonstrated by a full=true query string. NOTE: this issue exists because of a CVE-2008-3273 regression.",2010-04-28,Metasploit/Nuclei,cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp07:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp01:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp02:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp03:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp04:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp05:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp06:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp07:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp01:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp02:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp03:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp04:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp05:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp06:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3:*:*:*:*:*:*:* CVE-2010-1461,0.0,,0.03831,Directory traversal vulnerability in the Photo Battle (com_photobattle) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via the view parameter to index.php.,2010-04-16,Nuclei,cpe:2.3:a:gogoritas:com_photobattle:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1465,0.0,,0.65175,"Stack-based buffer overflow in Trellian FTP client 3.01, including 3.1.3.1789, allows remote attackers to execute arbitrary code via a long PASV response.",2010-04-16,Metasploit,cpe:2.3:a:trellian:ftp:3.01:*:*:*:*:*:*:*;cpe:2.3:a:trellian:ftp:3.1.3.1789:*:*:*:*:*:*:* CVE-2010-1469,0.0,,0.04188,Directory traversal vulnerability in the Ternaria Informatica JProject Manager (com_jprojectmanager) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-04-19,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:* CVE-2010-1470,0.0,,0.07329,Directory traversal vulnerability in the Web TV (com_webtv) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-04-19,Nuclei,cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* CVE-2010-1471,0.0,,0.0932,Directory traversal vulnerability in the AddressBook (com_addressbook) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-04-19,Nuclei,cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1472,0.0,,0.07018,Directory traversal vulnerability in the Daily Horoscope (com_horoscope) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-04-19,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:* CVE-2010-1473,0.0,,0.02925,Directory traversal vulnerability in the Advertising (com_advertising) component 0.25 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-04-19,Nuclei,cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1474,0.0,,0.01377,Directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper) component 1.5.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-04-19,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:supachai_teasakul:com_sweetykeeper:*:*:*:*:*:*:*:* CVE-2010-1475,0.0,,0.0244,Directory traversal vulnerability in the Preventive & Reservation (com_preventive) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-04-19,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:ternaria:com_preventive:1.0.5:*:*:*:*:*:*:* CVE-2010-1476,0.0,,0.05349,Directory traversal vulnerability in the AlphaUserPoints (com_alphauserpoints) component 1.5.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the view parameter to index.php.,2010-04-19,Nuclei,cpe:2.3:a:alphaplug:com_alphauserpoints:1.5.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1478,0.0,,0.02414,Directory traversal vulnerability in the Ternaria Informatica Jfeedback! (com_jfeedback) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-04-19,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:ternaria:com_jfeedback:1.2:*:*:*:*:*:*:* CVE-2010-1491,0.0,,0.03585,Directory traversal vulnerability in the MMS Blog (com_mmsblog) component 2.3.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-04-23,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:mms.pipp:com_mmsblog:2.3.0:*:*:*:*:*:*:* CVE-2010-1494,0.0,,0.04579,Directory traversal vulnerability in the AWDwall (com_awdwall) component 1.5.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-04-23,Nuclei,cpe:2.3:a:awdsolution:com_awdwall:1.5.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1495,0.0,,0.01501,Directory traversal vulnerability in the Matamko (com_matamko) component 1.01 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-04-23,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:matamko:com_matamko:1.01:*:*:*:*:*:*:* CVE-2010-1527,0.0,,0.61151,Stack-based buffer overflow in Novell iPrint Client before 5.44 allows remote attackers to execute arbitrary code via a long call-back-url parameter in an op-client-interface-version action.,2010-08-23,Metasploit,cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:* CVE-2010-1531,0.0,,0.04201,Directory traversal vulnerability in the redSHOP (com_redshop) component 1.0.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.,2010-04-26,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redshop:1.0.10:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redshop:1.0.11:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redshop:1.0.12:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redshop:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redshop:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redshop:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redshop:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redshop:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redshop:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redshop:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redshop:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redshop:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redshop:1.0:*:*:*:*:*:*:* CVE-2010-1532,0.0,,0.01736,Directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-04-26,Nuclei,cpe:2.3:a:givesight:com_powermail:1.53:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1533,0.0,,0.00957,Directory traversal vulnerability in the TweetLA (com_tweetla) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-04-26,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:peter_hocherl:com_tweetla:1.0.1:*:*:*:*:*:*:* CVE-2010-1534,0.0,,0.0317,Directory traversal vulnerability in the Shoutbox Pro (com_shoutbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-04-26,Nuclei,cpe:2.3:a:joomla.batjo:com_shoutbox:*:*:*:*:*:*:*:*;cpe:2.3:a:joomla.batjo:com_shoutbox:1.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla.batjo:com_shoutbox:1.2:beta2:*:*:*:*:*:*;cpe:2.3:a:joomla.batjo:com_shoutbox:1.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1535,0.0,,0.02609,Directory traversal vulnerability in the TRAVELbook (com_travelbook) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-04-26,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:peter_hocherl:com_travelbook:1.0.1:*:*:*:*:*:*:* CVE-2010-1540,0.0,,0.04267,Directory traversal vulnerability in index.php in the MyBlog (com_myblog) component 3.0.329 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the task parameter. NOTE: some of these details are obtained from third party information.,2010-04-26,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:myblog:com_myblog:3.0.329:*:*:*:*:*:*:* CVE-2010-1549,0.0,,0.88807,Unspecified vulnerability in the Agent in HP LoadRunner before 9.50 and HP Performance Center before 9.50 allows remote attackers to execute arbitrary code via unknown vectors.,2010-05-07,Metasploit,cpe:2.3:a:hp:loadrunner:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:7.02:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:7.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:7.5:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:7.6:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:7.8:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:8.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:8.12:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:8.13:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:8.14:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:performance_center:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2010-1552,0.0,,0.79947,"Stack-based buffer overflow in the doLoad function in snmpviewer.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via the act and app parameters.",2010-05-13,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:* CVE-2010-1553,0.0,,0.83929,"Stack-based buffer overflow in getnnmdata.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via an invalid MaxAge parameter.",2010-05-13,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:* CVE-2010-1554,0.0,,0.81439,"Stack-based buffer overflow in getnnmdata.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via an invalid iCount parameter.",2010-05-13,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:* CVE-2010-1555,0.0,,0.79791,"Stack-based buffer overflow in getnnmdata.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via an invalid Hostname parameter.",2010-05-13,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:* CVE-2010-1586,0.0,,0.00524,Open redirect vulnerability in red2301.html in HP System Management Homepage (SMH) 2.x.x.x allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the RedirectUrl parameter.,2010-04-28,Nuclei,cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.0-103:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.0-103\(a\):*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.0-109:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.0-118:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.10-186:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.11-197:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.12-118:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.12-200:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.2-127:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.3.132:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.5-146:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.6-156:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.7-168:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.7:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.8-177:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.8:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.9-178:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1.9:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.2.6:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:2.2.8:*:*:*:*:*:*:* CVE-2010-1587,0.0,,0.69946,"The Jetty ResourceHandler in Apache ActiveMQ 5.x before 5.3.2 and 5.4.x before 5.4.0 allows remote attackers to read JSP source code via a // (slash slash) initial substring in a URI for (1) admin/index.jsp, (2) admin/queues.jsp, or (3) admin/topics.jsp.",2010-04-28,Metasploit,cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.4-snapshot:*:*:*:*:*:*:* CVE-2010-1601,0.0,,0.03973,Directory traversal vulnerability in the JA Comment (com_jacomment) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.,2010-04-29,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlamart:com_jacomment:*:*:*:*:*:*:*:* CVE-2010-1602,0.0,,0.01427,Directory traversal vulnerability in the ZiMB Comment (com_zimbcomment) component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-04-29,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:zimbllc:com_zimbcomment:0.8.1:*:*:*:*:*:*:* CVE-2010-1603,0.0,,0.04031,Directory traversal vulnerability in the ZiMB Core (aka ZiMBCore or com_zimbcore) component 0.1 in the ZiMB Manager collection for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-04-29,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:zimbllc:com_zimbcore:0.1:*:*:*:*:*:*:* CVE-2010-1607,0.0,,0.02245,Directory traversal vulnerability in wmi.php in the Webmoney Web Merchant Interface (aka WMI or com_wmi) component 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.,2010-04-29,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:paysyspro:com_wmi:1.5.0:*:*:*:*:*:*:* CVE-2010-1653,0.0,,0.05171,Directory traversal vulnerability in graphics.php in the Graphics (com_graphics) component 1.0.6 and 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.,2010-05-03,Nuclei,cpe:2.3:a:htmlcoderhelper:com_graphics:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:htmlcoderhelper:com_graphics:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1657,0.0,,0.01457,Directory traversal vulnerability in the SmartSite (com_smartsite) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-05-03,Nuclei,cpe:2.3:a:recly:com_smartsite:1.0.0:*:*:*:*:*:*:* CVE-2010-1658,0.0,,0.04579,Directory traversal vulnerability in the Code-Garage NoticeBoard (com_noticeboard) component 1.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-05-03,Nuclei,cpe:2.3:a:code-garage:com_noticeboard:1.3:*:*:*:*:*:*:* CVE-2010-1659,0.0,,0.03335,Directory traversal vulnerability in the Ultimate Portfolio (com_ultimateportfolio) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-05-03,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:webkul:com_ultimateportfolio:1.0:*:*:*:*:*:*:* CVE-2010-1681,0.0,,0.79079,"Buffer overflow in VISIODWG.DLL before 10.0.6880.4 in Microsoft Office Visio allows user-assisted remote attackers to execute arbitrary code via a crafted DXF file, a different vulnerability than CVE-2010-0254 and CVE-2010-0256.",2010-05-06,Metasploit,cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:visio:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:visio:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:visio:2007:sp2:*:*:*:*:*:* CVE-2010-1714,0.0,,0.06091,Directory traversal vulnerability in the Arcade Games (com_arcadegames) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-05-04,Nuclei,cpe:2.3:a:dev.pucit.edu.pk:com_arcadegames:1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1715,0.0,,0.02144,Directory traversal vulnerability in the Online Examination (aka Online Exam or com_onlineexam) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.,2010-05-04,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:pucit.edu:com_onlineexam:1.5.0:*:*:*:*:*:*:* CVE-2010-1717,0.0,,0.05599,Directory traversal vulnerability in the iF surfALERT (com_if_surfalert) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-05-04,Nuclei,cpe:2.3:a:if_surfalert_project:if_surfalert:1.2:*:*:*:*:joomla\!:*:* CVE-2010-1718,0.0,,0.01887,Directory traversal vulnerability in archeryscores.php in the Archery Scores (com_archeryscores) component 1.0.6 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.,2010-05-04,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:lispeltuut:com_archeryscores:1.0.6:*:*:*:*:*:*:* CVE-2010-1719,0.0,,0.02884,Directory traversal vulnerability in the MT Fire Eagle (com_mtfireeagle) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-05-04,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:moto-treks:com_mtfireeagle:1.2:*:*:*:*:*:*:* CVE-2010-1722,0.0,,0.01377,Directory traversal vulnerability in the Online Market (com_market) component 2.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-05-04,Nuclei,cpe:2.3:a:dev.pucit.edu.pk:com_market:2.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1723,0.0,,0.0469,Directory traversal vulnerability in the iNetLanka Contact Us Draw Root Map (com_drawroot) component 1.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-05-04,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlacomponent.inetlanka:com_drawroot:1.1:*:*:*:*:*:*:* CVE-2010-1799,0.0,,0.67678,Stack-based buffer overflow in the error-logging functionality in Apple QuickTime before 7.6.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file.,2010-08-16,Metasploit,cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:4.1.2:*:*:ja:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:java:*:*;cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2:*:vista:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2:*:windows_sp_2:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2:*:windows_vista:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2:*:windows_xp:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2:*:windows_xp_sp2:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.4.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:windows:*:*;cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:windows:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2010-1818,0.0,,0.76511,"The IPersistPropertyBag2::Read function in QTPlugin.ocx in Apple QuickTime 6.x, 7.x before 7.6.8, and other versions allows remote attackers to execute arbitrary code via the _Marshaled_pUnk attribute, which triggers unmarshalling of an untrusted pointer.",2010-08-31,Metasploit,cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.7:*:*:*:*:*:*:* CVE-2010-1858,0.0,,0.02709,Directory traversal vulnerability in the SMEStorage (com_smestorage) component before 1.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.,2010-05-07,Nuclei,cpe:2.3:a:gelembjuk:com_smestorage:*:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1870,0.0,,0.9341,"The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the ""#"" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504.",2010-08-17,Metasploit/Nuclei,cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:* CVE-2010-1871,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.93818,"JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured.",2010-08-05,Metasploit/CISA,cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:* CVE-2010-1875,0.0,,0.01355,Directory traversal vulnerability in the Real Estate Property (com_properties) component 3.1.22-03 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.,2010-05-12,Nuclei,cpe:2.3:a:com-property:com_properties:3.1.22-03:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1878,0.0,,0.02086,Directory traversal vulnerability in the OrgChart (com_orgchart) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-05-12,Nuclei,cpe:2.3:a:blueflyingfish.no-ip:com_orgchart:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1885,0.0,,0.91196,"The MPC::HexToNum function in helpctr.exe in Microsoft Windows Help and Support Center in Windows XP and Windows Server 2003 does not properly handle malformed escape sequences, which allows remote attackers to bypass the trusted documents whitelist (fromHCP option) and execute arbitrary commands via a crafted hcp:// URL, aka ""Help Center URL Validation Vulnerability.""",2010-06-15,Metasploit,cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2010-1899,0.0,,0.8663,"Stack consumption vulnerability in the ASP implementation in Microsoft Internet Information Services (IIS) 5.1, 6.0, 7.0, and 7.5 allows remote attackers to cause a denial of service (daemon outage) via a crafted request, related to asp.dll, aka ""IIS Repeated Parameter Request Denial of Service Vulnerability.""",2010-09-15,Metasploit,cpe:2.3:a:microsoft:internet_information_server:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_services:7.5:*:*:*:*:*:*:* CVE-2010-1952,0.0,,0.04857,Directory traversal vulnerability in the BeeHeard (com_beeheard) and BeeHeard Lite (com_beeheardlite) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-05-19,Nuclei,cpe:2.3:a:cmstactics:com_beeheard:1.0:*:*:*:*:*:*:*;cpe:2.3:a:cmstactics:com_beeheardlite:1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1953,0.0,,0.02521,Directory traversal vulnerability in the iNetLanka Multiple Map (com_multimap) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-05-19,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlacomponent.inetlanka:com_multimap:1.0:*:*:*:*:*:*:* CVE-2010-1954,0.0,,0.0858,Directory traversal vulnerability in the iNetLanka Multiple root (com_multiroot) component 1.0 and 1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.,2010-05-19,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlacomponent.inetlanka:com_multiroot:1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomlacomponent.inetlanka:com_multiroot:1.1:*:*:*:*:*:*:* CVE-2010-1955,0.0,,0.01345,Directory traversal vulnerability in the Deluxe Blog Factory (com_blogfactory) component 1.1.2 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-05-19,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:thefactory:com_blogfactory:1.1.2:*:*:*:*:*:*:* CVE-2010-1956,0.0,,0.05092,Directory traversal vulnerability in the Gadget Factory (com_gadgetfactory) component 1.0.0 and 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.,2010-05-19,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:thefactory:com_gadgetfactory:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:thefactory:com_gadgetfactory:1.5.0:*:*:*:*:*:*:* CVE-2010-1957,0.0,,0.03563,Directory traversal vulnerability in the Love Factory (com_lovefactory) component 1.3.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-05-19,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:thefactory:com_lovefactory:1.3.4:*:*:*:*:*:*:* CVE-2010-1960,0.0,,0.73403,"Buffer overflow in the error handling functionality in ovwebsnmpsrv.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long, invalid option to jovgraph.exe.",2010-06-10,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:* CVE-2010-1961,0.0,,0.73403,"Buffer overflow in ovutil.dll in ovwebsnmpsrv.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via unspecified variables to jovgraph.exe, which are not properly handled in a call to the sprintf function.",2010-06-10,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:* CVE-2010-1964,0.0,,0.82131,"Buffer overflow in ovwebsnmpsrv.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via unspecified parameters to jovgraph.exe, aka ZDI-CAN-683.",2010-06-17,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:* CVE-2010-1977,0.0,,0.03322,Directory traversal vulnerability in the J!WHMCS Integrator (com_jwhmcs) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-05-19,Nuclei,cpe:2.3:a:gohigheris:com_jwhmcs:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1979,0.0,,0.03069,Directory traversal vulnerability in the Affiliate Datafeeds (com_datafeeds) component build 880 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-05-19,Nuclei,cpe:2.3:a:affiliatefeeds:com_datafeeds:build_880:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-1980,0.0,,0.04183,Directory traversal vulnerability in joomlaflickr.php in the Joomla Flickr (com_joomlaflickr) component 1.0.3 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.,2010-05-19,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:roberto_aloi:com_joomlaflickr:1.0.3:*:*:*:*:*:*:* CVE-2010-1981,0.0,,0.01654,Directory traversal vulnerability in the Fabrik (com_fabrik) component 2.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-05-19,Nuclei,cpe:2.3:a:fabrikar:fabrik:2.0:*:*:*:*:joomla\!:*:* CVE-2010-1982,0.0,,0.05071,Directory traversal vulnerability in the JA Voice (com_javoice) component 2.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.,2010-05-19,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlart:com_javoice:2.0:*:*:*:*:*:*:* CVE-2010-1983,0.0,,0.02013,Directory traversal vulnerability in the redTWITTER (com_redtwitter) component 1.0.x including 1.0b11 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. NOTE: some of these details are obtained from third party information.,2010-05-19,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redtwitter:1.0b10:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redtwitter:1.0b11:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redtwitter:1.0b8:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redtwitter:1.0b9.1:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redtwitter:1.0b94.2:*:*:*:*:*:*:*;cpe:2.3:a:redcomponent:com_redtwitter:1.0b9:*:*:*:*:*:*:* CVE-2010-2033,0.0,,0.00803,Directory traversal vulnerability in the Percha Multicategory Article (com_perchacategoriestree) component 0.6 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-05-25,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:percha:com_perchacategoriestree:0.6:*:*:*:*:*:*:* CVE-2010-2034,0.0,,0.0096,Directory traversal vulnerability in the Percha Image Attach (com_perchaimageattach) component 1.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-05-25,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:percha:com_perchaimageattach:1.1:*:*:*:*:*:*:* CVE-2010-2035,0.0,,0.0096,Directory traversal vulnerability in the Percha Gallery (com_perchagallery) component 1.6 Beta for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-05-25,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:percha:com_perchagallery:1.6:beta:*:*:*:*:*:* CVE-2010-2036,0.0,,0.00347,Directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach) component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-05-25,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:percha:com_perchafieldsattach:1.0:*:*:*:*:*:*:* CVE-2010-2037,0.0,,0.0096,Directory traversal vulnerability in the Percha Downloads Attach (com_perchadownloadsattach) component 1.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-05-25,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:percha:com_perchadownloadsattach:1.1:*:*:*:*:*:*:* CVE-2010-2045,0.0,,0.02392,Directory traversal vulnerability in the Dione Form Wizard (aka FDione or com_dioneformwizard) component 1.0.2 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.,2010-05-25,Nuclei,cpe:2.3:a:dionesoft:com_dioneformwizard:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-2050,0.0,,0.01775,Directory traversal vulnerability in the Moron Solutions MS Comment (com_mscomment) component 0.8.0b for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2010-05-25,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:m0r0n:com_mscomment:0.8.0:b:*:*:*:*:*:* CVE-2010-2063,0.0,,0.78178,Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.,2010-06-17,Metasploit,cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* CVE-2010-2075,0.0,,0.86802,"UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands.",2010-06-15,Metasploit,cpe:2.3:a:unrealircd:unrealircd:3.2.8.1:*:*:*:*:*:*:* CVE-2010-2115,0.0,,0.81786,SolarWinds TFTP Server 10.4.0.10 allows remote attackers to cause a denial of service (no new connections) via a crafted read request.,2010-05-28,Metasploit,cpe:2.3:a:solarwinds:tftp_server:10.4.0.10:*:*:*:*:*:*:* CVE-2010-2122,0.0,,0.01932,Directory traversal vulnerability in the SimpleDownload (com_simpledownload) component before 0.9.6 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.,2010-06-01,Nuclei,cpe:2.3:a:joelrowley:com_simpledownload:0.9.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-2128,0.0,,0.02321,Directory traversal vulnerability in the JE Quotation Form (com_jequoteform) component 1.0b1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the view parameter to index.php.,2010-06-01,Nuclei,cpe:2.3:a:harmistechnology:com_jequoteform:1.0:b1:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-2156,0.0,,0.8675,ISC DHCP 4.1 before 4.1.1-P1 and 4.0 before 4.0.2-P1 allows remote attackers to cause a denial of service (server exit) via a zero-length client ID.,2010-06-07,Metasploit,cpe:2.3:a:isc:dhcp:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:isc:dhcp:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:isc:dhcp:4.0.1:b1:*:*:*:*:*:*;cpe:2.3:a:isc:dhcp:4.0.1:rc1:*:*:*:*:*:*;cpe:2.3:a:isc:dhcp:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:isc:dhcp:4.0.2:b1:*:*:*:*:*:*;cpe:2.3:a:isc:dhcp:4.0.2:b2:*:*:*:*:*:*;cpe:2.3:a:isc:dhcp:4.0.2:b3:*:*:*:*:*:*;cpe:2.3:a:isc:dhcp:4.0.2:rc1:*:*:*:*:*:*;cpe:2.3:a:isc:dhcp:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:isc:dhcp:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*;cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*;cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*;cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:* CVE-2010-2227,0.0,,0.64738,"Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with ""recycling of a buffer.""",2010-07-13,Metasploit,cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:* CVE-2010-2259,0.0,,0.00893,Directory traversal vulnerability in the BF Survey (com_bfsurvey) component for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.,2010-06-09,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:tamlyncreative:com_bfsurvey_basic:*:*:*:*:*:*:*:*;cpe:2.3:a:tamlyncreative:com_bfsurvey_pro:*:*:*:*:*:*:*:*;cpe:2.3:a:tamlyncreative:com_bfsurvey_profree:1.2.6:*:*:*:*:*:*:* CVE-2010-2263,0.0,,0.44217,"nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.",2010-06-15,Metasploit,cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2010-2307,0.0,,0.04386,"Multiple directory traversal vulnerabilities in the web server for Motorola SURFBoard cable modem SBV6120E running firmware SBV6X2X-1.0.0.5-SCM-02-SHPC allow remote attackers to read arbitrary files via (1) ""//"" (multiple leading slash), (2) ../ (dot dot) sequences, and encoded dot dot sequences in a URL request.",2010-06-16,Nuclei,cpe:2.3:h:motorola:surfboard_sbv6120e:sbv6x2x-1.0.0.5-scm-02-shpc:*:*:*:*:*:*:* CVE-2010-2309,0.0,,0.86916,Buffer overflow in the web server for EvoLogical EvoCam 3.6.6 and 3.6.7 allows remote attackers to execute arbitrary code via a long GET request.,2010-06-16,Metasploit,cpe:2.3:a:evological:evocam:3.6.6:*:*:*:*:*:*:*;cpe:2.3:a:evological:evocam:3.6.7:*:*:*:*:*:*:* CVE-2010-2333,0.0,,0.76489,LiteSpeed Technologies LiteSpeed Web Server 4.0.x before 4.0.15 allows remote attackers to read the source code of scripts via an HTTP request with a null byte followed by a .txt file extension.,2010-06-18,Metasploit,cpe:2.3:a:litespeedtech:litespeed_web_server:4.0.10:*:*:*:*:*:*:*;cpe:2.3:a:litespeedtech:litespeed_web_server:4.0.11:*:*:*:*:*:*:*;cpe:2.3:a:litespeedtech:litespeed_web_server:4.0.12:*:*:*:*:*:*:*;cpe:2.3:a:litespeedtech:litespeed_web_server:4.0.13:*:*:*:*:*:*:*;cpe:2.3:a:litespeedtech:litespeed_web_server:4.0.14:*:*:*:*:*:*:*;cpe:2.3:a:litespeedtech:litespeed_web_server:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:litespeedtech:litespeed_web_server:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:litespeedtech:litespeed_web_server:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:litespeedtech:litespeed_web_server:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:litespeedtech:litespeed_web_server:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:litespeedtech:litespeed_web_server:4.0.6:*:*:*:*:*:*:*;cpe:2.3:a:litespeedtech:litespeed_web_server:4.0.7:*:*:*:*:*:*:*;cpe:2.3:a:litespeedtech:litespeed_web_server:4.0.8:*:*:*:*:*:*:*;cpe:2.3:a:litespeedtech:litespeed_web_server:4.0.9:*:*:*:*:*:*:*;cpe:2.3:a:litespeedtech:litespeed_web_server:4.0:*:*:*:*:*:*:* CVE-2010-2343,0.0,,0.75512,"Stack-based buffer overflow in D.R. Software Audio Converter 8.1, 2007, and 8.05 allows remote attackers to execute arbitrary code via a crafted pls playlist file.",2010-06-21,Metasploit,cpe:2.3:a:dennisre:audio_converter:2007:*:*:*:*:*:*:*;cpe:2.3:a:dennisre:audio_converter:8.05:*:*:*:*:*:*:*;cpe:2.3:a:dennisre:audio_converter:8.1:*:*:*:*:*:*:* CVE-2010-2415,0.0,,0.36531,"Unspecified vulnerability in the Change Data Capture component in Oracle Database Server 10.1.0.5, 10.2.0.4, 11.1.0.7, and 11.2.0.1 allows remote authenticated users to affect confidentiality and integrity, related to DBMS_CDC_PUBLISH.",2010-10-14,Metasploit,cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_server:11.2.0.1:*:*:*:*:*:*:* CVE-2010-2426,0.0,,0.36393,"Directory traversal vulnerability in TitanFTPd in South River Technologies Titan FTP Server 8.10.1125, and probably earlier versions, allows remote authenticated users to read arbitrary files, determine file size, via ""..//"" sequences in the xcrc command.",2010-06-24,Metasploit,cpe:2.3:a:southrivertech:titan_ftp_server:*:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.0.17:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.0.18:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.0.19:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.0.20:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.0.21:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.0.22:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.0.23:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.0.24:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.0.25:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.0.26:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.0.27:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.0.28:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.0.29:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.0.30:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.0.31:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.1.33:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:1.11.34:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:2.0.44:beta:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:2.00.95:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:2.01.96:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:2.02.99:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:2.10.119:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:2.10.120:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:2.10.121:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:2.11.132:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:2.20.140:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:2.21.142:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:2.30.151:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:2.31.152:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:2.40.155:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:3.00.162:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:3.01.163:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:3.02.165:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:3.10.169:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:3.12.172:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:3.20.175:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:3.21.177:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:3.22.178:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:3.30.186:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:4.00.245:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:4.01.246:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:4.02.248:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:4.03.249:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:4.05.252:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:4.10.256:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:4.11.257:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:4.13.260:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:4.14.261:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:4.20.263:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:4.21.264:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:4.22.265:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:4.23.266:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:4.30.269:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:4.31.272:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.00.303:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.01.306:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.02.307:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.03.308:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.03.309:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.03.310:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.04.311:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.04.312:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.04.313:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.04.314:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.04.315:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.05.316:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.05.317:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.05.318:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.05.319:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.05.320:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.05.321:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.05.322:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.05.323:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.05.324:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.05.325:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.05.326:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.05.327:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.10.328:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.10.329:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.11.330:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.11.331:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.12.332:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.12.333:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.12.334:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.12.335:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.12.336:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.20.342:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.21.347:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.22.350:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.23.351:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.24.352:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.25.356:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.26.361:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.27.362:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.30.367:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.31.373:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.32.376:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.33.380:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.33.381:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.35.385:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.36.386:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.37.387:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.38.388:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:5.39.389:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:6.00.492:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:6.01.512:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:6.03.537:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:6.04.545:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:6.05.550:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:6.06.555:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:6.10.560:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:6.20.587:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:6.21.596:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:6.23.616:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:6.24.621:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:6.25.622:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:6.26.630:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:7.00:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:7.01:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:7.02:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:7.10:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:7.12:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:8.00:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:8.01:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:8.10:*:*:*:*:*:*:* CVE-2010-2507,0.0,,0.0193,Directory traversal vulnerability in the Picasa2Gallery (com_picasa2gallery) component 1.2.8 and earlier for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-06-28,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:masselink:com_picasa2gallery:*:*:*:*:*:*:*:*;cpe:2.3:a:masselink:com_picasa2gallery:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:masselink:com_picasa2gallery:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:masselink:com_picasa2gallery:1.1.7:*:*:*:*:*:*:*;cpe:2.3:a:masselink:com_picasa2gallery:1.1.9:*:*:*:*:*:*:*;cpe:2.3:a:masselink:com_picasa2gallery:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:masselink:com_picasa2gallery:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:masselink:com_picasa2gallery:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:masselink:com_picasa2gallery:1.2.7:*:*:*:*:*:*:* CVE-2010-2550,0.0,,0.7975,"The SMB Server in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate fields in an SMB request, which allows remote attackers to execute arbitrary code via a crafted SMB packet, aka ""SMB Pool Overflow Vulnerability.""",2010-08-11,Metasploit,cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2010-2568,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.92376,"Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems.",2010-07-22,Metasploit/CISA,cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2010-2572,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.69871,"Buffer overflow in Microsoft PowerPoint 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint 95 document, aka ""PowerPoint Parsing Buffer Overflow Vulnerability.""",2010-11-10,CISA,cpe:2.3:a:microsoft:powerpoint:2002:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:powerpoint:2003:sp3:*:*:*:*:*:* CVE-2010-2590,0.0,,0.78972,Heap-based buffer overflow in the CrystalReports12.CrystalPrintControl.1 ActiveX control in PrintControl.dll 12.3.2.753 in SAP Crystal Reports 2008 SP3 Fix Pack 3.2 allows remote attackers to execute arbitrary code via a long ServerResourceVersion property value.,2010-12-22,Metasploit,cpe:2.3:a:sap:crystal_reports:2008:sp3_fp3.2:*:*:*:*:*:* CVE-2010-2620,0.0,,0.55672,"Open&Compact FTP Server (Open-FTPD) 1.2 and earlier allows remote attackers to bypass authentication by sending (1) LIST, (2) RETR, (3) STOR, or other commands without performing the required login steps first.",2010-07-02,Metasploit,cpe:2.3:a:open-ftpd:open-ftpd:*:*:*:*:*:*:*:*;cpe:2.3:a:open-ftpd:open-ftpd:1.0:*:*:*:*:*:*:* CVE-2010-2680,0.0,,0.00997,Directory traversal vulnerability in the JExtensions JE Section/Property Finder (jesectionfinder) component for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the view parameter to index.php.,2010-07-12,Nuclei,cpe:2.3:a:harmistechnology:com_jesectionfinder:*:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-2682,0.0,,0.00749,Directory traversal vulnerability in the Realtyna Translator (com_realtyna) component 1.0.15 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2010-07-12,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:realtyna:com_realtyna:1.0.15:*:*:*:*:*:*:* CVE-2010-2703,0.0,,0.82234,"Stack-based buffer overflow in the execvp_nc function in the ov.dll module in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53, when running on Windows, allows remote attackers to execute arbitrary code via a long HTTP request to webappmon.exe.",2010-07-28,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2010-2709,0.0,,0.85654,Stack-based buffer overflow in webappmon.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long OvJavaLocale value in a cookie.,2010-08-05,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:* CVE-2010-2729,0.0,,0.83059,"The Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when printer sharing is enabled, does not properly validate spooler access permissions, which allows remote attackers to create files in a system directory, and consequently execute arbitrary code, by sending a crafted print request over RPC, as exploited in the wild in September 2010, aka ""Print Spooler Service Impersonation Vulnerability.""",2010-09-15,Metasploit,cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2010-2731,0.0,,0.66776,"Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.1 on Windows XP SP3, when directory-based Basic Authentication is enabled, allows remote attackers to bypass intended access restrictions and execute ASP files via a crafted request, aka ""Directory Authentication Bypass Vulnerability.""",2010-09-15,Metasploit,cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* CVE-2010-2743,0.0,,0.07024,"The kernel-mode drivers in Microsoft Windows XP SP3 do not properly perform indexing of a function-pointer table during the loading of keyboard layouts from disk, which allows local users to gain privileges via a crafted application, as demonstrated in the wild in July 2010 by the Stuxnet worm, aka ""Win32k Keyboard Layout Vulnerability."" NOTE: this might be a duplicate of CVE-2010-3888 or CVE-2010-3889.",2011-01-20,Metasploit,cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2010-2857,0.0,,0.01332,Directory traversal vulnerability in the Music Manager component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the cid parameter to album.html.,2010-07-25,Nuclei,cpe:2.3:a:danieljamesscott:com_music:0.10:*:*:*:*:*:*:*;cpe:2.3:a:danieljamesscott:com_music:0.11:*:*:*:*:*:*:*;cpe:2.3:a:danieljamesscott:com_music:0.12:*:*:*:*:*:*:*;cpe:2.3:a:danieljamesscott:com_music:0.1:-:*:*:*:*:*:*;cpe:2.3:a:danieljamesscott:com_music:0.2:*:*:*:*:*:*:*;cpe:2.3:a:danieljamesscott:com_music:0.3:*:*:*:*:*:*:*;cpe:2.3:a:danieljamesscott:com_music:0.4:*:*:*:*:*:*:*;cpe:2.3:a:danieljamesscott:com_music:0.5:*:*:*:*:*:*:*;cpe:2.3:a:danieljamesscott:com_music:0.6:*:*:*:*:*:*:*;cpe:2.3:a:danieljamesscott:com_music:0.7:*:*:*:*:*:*:*;cpe:2.3:a:danieljamesscott:com_music:0.8:*:*:*:*:*:*:*;cpe:2.3:a:danieljamesscott:com_music:0.9:*:*:*:*:*:*:* CVE-2010-2861,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94254,"Multiple directory traversal vulnerabilities in the administrator console in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files via the locale parameter to (1) CFIDE/administrator/settings/mappings.cfm, (2) logging/settings.cfm, (3) datasources/index.cfm, (4) j2eepackaging/editarchive.cfm, and (5) enter.cfm in CFIDE/administrator/.",2010-08-11,Metasploit/Nuclei/CISA,cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:* CVE-2010-2883,7.3,CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H,0.92996,"Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.",2010-09-09,Metasploit/CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2010-2918,0.0,,0.01604,PHP remote file inclusion vulnerability in core/include/myMailer.class.php in the Visites (com_joomla-visites) component 1.1 RC2 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.,2010-07-30,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:visocrea:com_joomla_visites:1.1:rc2:*:*:*:*:*:* CVE-2010-2920,0.0,,0.01429,Directory traversal vulnerability in the Foobla Suggestions (com_foobla_suggestions) component 1.5.1.2 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.,2010-07-30,Nuclei,cpe:2.3:a:foobla:com_foobla_suggestions:1.5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-3007,0.0,,0.2984,"Unspecified vulnerability in HP Data Protector Express, and Data Protector Express Single Server Edition (SSE), 3.x before build 56936 and 4.x before build 56906 allows local users to gain privileges or cause a denial of service via unknown vectors.",2010-09-09,Metasploit,cpe:2.3:a:hp:data_protector_express:3.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:data_protector_express:3.1:*:single_server:*:*:*:*:*;cpe:2.3:a:hp:data_protector_express:3.5:sp1:*:*:*:*:*:*;cpe:2.3:a:hp:data_protector_express:3.5:sp1:single_server:*:*:*:*:*;cpe:2.3:a:hp:data_protector_express:3.5:sp2:*:*:*:*:*:*;cpe:2.3:a:hp:data_protector_express:3.5:sp2:single_server:*:*:*:*:*;cpe:2.3:a:hp:data_protector_express:4.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:data_protector_express:4.0:*:single_server:*:*:*:*:*;cpe:2.3:a:hp:data_protector_express:4.0:sp1:*:*:*:*:*:*;cpe:2.3:a:hp:data_protector_express:4.0:sp1:single_server:*:*:*:*:* CVE-2010-3035,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.03675,"Cisco IOS XR 3.4.0 through 3.9.1, when BGP is enabled, does not properly handle unrecognized transitive attributes, which allows remote attackers to cause a denial of service (peering reset) via a crafted prefix announcement, as demonstrated in the wild in August 2010 with attribute type code 99, aka Bug ID CSCti62211.",2010-08-30,CISA,cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:* CVE-2010-3106,0.0,,0.5577,"The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client before 5.42 does not properly validate the debug parameter, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value with a crafted length, related to the ExecuteRequest method.",2010-08-23,Metasploit,cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:* CVE-2010-3189,0.0,,0.7604,The extSetOwner function in the UfProxyBrowserCtrl ActiveX control (UfPBCtrl.dll) in Trend Micro Internet Security Pro 2010 allows remote attackers to execute arbitrary code via an invalid address that is dereferenced as a pointer.,2010-08-31,Metasploit,cpe:2.3:a:trendmicro:internet_security:2010:-:pro:*:*:*:*:* CVE-2010-3203,0.0,,0.02686,Directory traversal vulnerability in the PicSell (com_picsell) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dflink parameter in a prevsell dwnfree action to index.php.,2010-09-03,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:xmlswf:com_picsell:1.0:*:*:*:*:*:*:* CVE-2010-3275,0.0,,0.86478,"libdirectx_plugin.dll in VideoLAN VLC Media Player before 1.1.8 allows remote attackers to execute arbitrary code via a crafted width in an AMV file, related to a ""dangling pointer vulnerability.""",2011-03-28,Metasploit,cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:* CVE-2010-3333,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.93852,"Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka ""RTF Stack Buffer Overflow Vulnerability.""",2010-11-10,Metasploit/CISA,cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:2010:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2011:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:open_xml_file_format_converter:-:*:*:*:*:macos:*:* CVE-2010-3338,0.0,,0.48801,"The Windows Task Scheduler in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly determine the security context of scheduled tasks, which allows local users to gain privileges via a crafted application, aka ""Task Scheduler Vulnerability."" NOTE: this might overlap CVE-2010-3888.",2010-12-16,Metasploit,cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* CVE-2010-3407,0.0,,0.77741,"Stack-based buffer overflow in the MailCheck821Address function in nnotes.dll in the nrouter.exe service in the server in IBM Lotus Domino 8.0.x before 8.0.2 FP5 and 8.5.x before 8.5.1 FP2 allows remote attackers to execute arbitrary code via a long e-mail address in an ORGANIZER:mailto header in an iCalendar calendar-invitation e-mail message, aka SPR NRBY7ZPJ9V.",2010-09-16,Metasploit,cpe:2.3:a:ibm:lotus_domino:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:8.0.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:8.0.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:8.0.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:8.0.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:8.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:8.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:8.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:8.5.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:8.5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:8.5.1:*:*:*:*:*:*:* CVE-2010-3426,0.0,,0.00506,Directory traversal vulnerability in jphone.php in the JPhone (com_jphone) component 1.0 Alpha 3 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.,2010-09-16,Nuclei,cpe:2.3:a:4you-studio:com_jphone:1.0:alpha3:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-3552,0.0,,0.82665,"Unspecified vulnerability in the New Java Plug-in component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.",2010-10-19,Metasploit,cpe:2.3:a:sun:jdk:*:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:* CVE-2010-3563,0.0,,0.88762,"Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to ""how Web Start retrieves security policies,"" BasicServiceImpl, and forged policies that bypass sandbox restrictions.",2010-10-19,Metasploit,cpe:2.3:a:sun:jdk:*:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:* CVE-2010-3585,0.0,,0.63697,"Unspecified vulnerability in the OracleVM component in Oracle VM 2.2.1 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to ovs-agent. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a third party researcher that this is related to the exposure of unspecified functions using XML-RPC.",2010-10-14,Metasploit,cpe:2.3:a:oracle:vm:2.2.1:*:*:*:*:*:*:* CVE-2010-3600,0.0,,0.76971,"Unspecified vulnerability in the Client System Analyzer component in Oracle Database Server 11.1.0.7 and 11.2.0.1 and Enterprise Manager Grid Control 10.2.0.5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that this issue involves an exposed JSP script that accepts XML uploads in conjunction with NULL bytes in an unspecified parameter that allow execution of arbitrary code.",2011-01-19,Metasploit,cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_server:11.2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_grid_control:10.2.0.5:*:*:*:*:*:*:* CVE-2010-3653,0.0,,0.77779,"The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information.",2010-10-26,Metasploit,cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*;cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:* CVE-2010-3654,0.0,,0.93396,"Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.",2010-10-29,Metasploit,cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*;cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*;cpe:2.3:a:macromedia:flash_player:5.0_r50:*:*:*:*:*:*:*;cpe:2.3:a:macromedia:flash_player:6.0.29.0:*:*:*:*:*:*:*;cpe:2.3:a:macromedia:flash_player:6.0.40.0:*:*:*:*:*:*:*;cpe:2.3:a:macromedia:flash_player:6.0.47.0:*:*:*:*:*:*:*;cpe:2.3:a:macromedia:flash_player:6.0.65.0:*:*:*:*:*:*:*;cpe:2.3:a:macromedia:flash_player:6.0.79.0:*:*:*:*:*:*:*;cpe:2.3:a:macromedia:flash_player:6.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:*:*:*:*:*:*:*:* CVE-2010-3714,0.0,,0.32406,"The jumpUrl (aka access tracking) implementation in tslib/class.tslib_fe.php in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 does not properly compare certain hash values during access-control decisions, which allows remote attackers to read arbitrary files via unspecified vectors.",2010-10-25,Metasploit,cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.10:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.11:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.12:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.13:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.14:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.6:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.7:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.8:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.9:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.3.3:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.3.4:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.3.5:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.3.6:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.4.1:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.4.2:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.4.3:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.4:*:*:*:*:*:*:* CVE-2010-3747,0.0,,0.685,"An ActiveX control in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.4, and RealPlayer Enterprise 2.1.2 does not properly initialize an unspecified object component during parsing of a CDDA URI, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer dereference and application crash) via a long URI.",2010-10-19,Metasploit,cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:* CVE-2010-3765,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.8721,"Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.",2010-10-28,Metasploit/CISA,cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:* CVE-2010-3847,0.0,,0.04991,"elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.",2011-01-07,Metasploit,cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:* CVE-2010-3856,0.0,,0.05862,"ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.",2011-01-07,Metasploit,cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*;cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:* CVE-2010-3867,0.0,,0.00202,"Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD before 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequences in a (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, or (4) SITE UTIME command.",2010-11-09,Nuclei,cpe:2.3:a:proftpd:proftpd:1.2.10:*:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.2.10:rc1:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.2.10:rc2:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.2.10:rc3:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.0:a:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.0:rc1:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.0:rc2:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.0:rc3:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.0:rc4:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.0:rc5:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.1:rc1:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.1:rc2:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.1:rc3:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:a:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:b:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:c:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:d:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:e:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:rc1:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:rc2:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:rc3:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:rc4:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.3:*:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.3:a:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.3:b:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.3:rc1:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.3:rc2:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.3:rc3:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.3:rc4:*:*:*:*:*:* CVE-2010-3904,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.01698,"The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.",2010-12-06,Metasploit/CISA,cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:* CVE-2010-3962,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.86935,"Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an ""invalid flag reference"" issue or ""Uninitialized Memory Corruption Vulnerability,"" as exploited in the wild in November 2010.",2010-11-05,Metasploit/CISA,cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2010-3964,0.0,,0.90105,"Unrestricted file upload vulnerability in the Document Conversions Launcher Service in Microsoft Office SharePoint Server 2007 SP2, when the Document Conversions Load Balancer Service is enabled, allows remote attackers to execute arbitrary code via a crafted SOAP request to TCP port 8082, aka ""Malformed Request Code Execution Vulnerability.""",2010-12-16,Metasploit,cpe:2.3:a:microsoft:sharepoint_server:2007:sp2:x32:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2007:sp2:x64:*:*:*:*:* CVE-2010-3970,0.0,,0.81209,"Stack-based buffer overflow in the CreateSizedDIBSECTION function in shimgvw.dll in the Windows Shell graphics processor (aka graphics rendering engine) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted .MIC or unspecified Office document containing a thumbnail bitmap with a negative biClrUsed value, as reported by Moti and Xu Hao, aka ""Windows Shell Graphics Processing Overrun Vulnerability.""",2010-12-22,Metasploit,cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2010-3971,0.0,,0.856,"Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll, as used in Microsoft Internet Explorer 6 through 8 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a self-referential @import rule in a stylesheet, aka ""CSS Memory Corruption Vulnerability.""",2010-12-22,Metasploit,cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:* CVE-2010-3972,0.0,,0.91689,"Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka ""IIS FTP Service Heap Buffer Overrun Vulnerability."" NOTE: some of these details are obtained from third party information.",2010-12-23,Metasploit,cpe:2.3:a:microsoft:internet_information_services:7.5:*:*:*:*:*:*:* CVE-2010-3973,0.0,,0.78176,"The WMITools ActiveX control in WBEMSingleView.ocx 1.50.1131.0 in Microsoft WMI Administrative Tools 1.1 and earlier in Microsoft Windows XP SP2 and SP3 allows remote attackers to execute arbitrary code via a crafted argument to the AddContextRef method, possibly an untrusted pointer dereference, aka ""Microsoft WMITools ActiveX Control Vulnerability.""",2010-12-23,Metasploit,cpe:2.3:a:microsoft:wmi_administrative_tools:*:*:*:*:*:*:*:* CVE-2010-4094,0.0,,0.84158,"The Tomcat server in IBM Rational Quality Manager and Rational Test Lab Manager has a default password for the ADMIN account, which makes it easier for remote attackers to execute arbitrary code by leveraging access to the manager role. NOTE: this might overlap CVE-2009-3548.",2010-10-26,Metasploit,cpe:2.3:a:ibm:rational_quality_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:rational_test_lab_manager:*:*:*:*:*:*:*:* CVE-2010-4142,0.0,,0.49079,"Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests.",2010-11-02,Metasploit,cpe:2.3:a:realflex:realwin:1.06:*:*:*:*:*:*:*;cpe:2.3:a:realflex:realwin:2.0:*:*:*:*:*:*:* CVE-2010-4170,0.0,,0.24078,"The staprun runtime tool in SystemTap 1.3 does not properly clear the environment before executing modprobe, which allows local users to gain privileges by setting the MODPROBE_OPTIONS environment variable to specify a malicious configuration file.",2010-12-07,Metasploit,cpe:2.3:a:systemtap:systemtap:1.3:*:*:*:*:*:*:* CVE-2010-4221,0.0,,0.92288,Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.,2010-11-09,Metasploit,cpe:2.3:a:proftpd:proftpd:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:a:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:b:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:c:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:d:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:e:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:rc3:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.2:rc4:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.3:*:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.3:a:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.3:b:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.3:rc1:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.3:rc2:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.3:rc3:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.3:rc4:*:*:*:*:*:* CVE-2010-4231,0.0,,0.04373,Directory traversal vulnerability in the web-based administration interface on the Camtron CMNC-200 Full HD IP Camera and TecVoz CMNC-200 Megapixel IP Camera with firmware 1.102A-008 allows remote attackers to read arbitrary files via a .. (dot dot) in the URI.,2010-11-17,Nuclei,cpe:2.3:a:camtron:cmnc-200_firmware:1.102a-008:*:*:*:*:*:*:*;cpe:2.3:a:tecvoz:cmnc-200_firmware:1.102a-008:*:*:*:*:*:*:*;cpe:2.3:h:camtron:cmnc-200:*:*:*:*:*:*:*:*;cpe:2.3:h:tecvoz:cmnc-200:*:*:*:*:*:*:*:* CVE-2010-4239,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.55795,Tiki Wiki CMS Groupware 5.2 has Local File Inclusion,2019-10-28,Nuclei,cpe:2.3:a:tiki:tikiwiki_cms\/groupware:5.2:*:*:*:*:*:*:* CVE-2010-4279,0.0,,0.85037,"The default configuration of Pandora FMS 3.1 and earlier specifies an empty string for the loginhash_pwd field, which allows remote attackers to bypass authentication by sending a request to index.php with ""admin"" in the loginhash_user parameter, in conjunction with the md5 hash of ""admin"" in the loginhash_data parameter.",2010-12-02,Metasploit,cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:1.2:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:1.3:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:1.3:beta1:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:1.3:beta2:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:1.3:beta3:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:1.3:beta:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:2.0:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:2.0:beta:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:2.1:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:3.0:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:3.0:rc1:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:3.0:rc2:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:3.1:rc1:*:*:*:*:*:* CVE-2010-4282,0.0,,0.03744,"Multiple directory traversal vulnerabilities in Pandora FMS before 3.1.1 allow remote attackers to include and execute arbitrary local files via (1) the page parameter to ajax.php or (2) the id parameter to general/pandora_help.php, and allow remote attackers to include and execute, create, modify, or delete arbitrary local files via (3) the layout parameter to operation/agentes/networkmap.php.",2010-12-02,Nuclei,cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:1.2:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:1.3:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:1.3:beta1:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:1.3:beta2:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:1.3:beta3:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:1.3:beta:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:2.0:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:2.0:beta:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:2.1:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:3.0:*:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:3.0:rc1:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:3.0:rc2:*:*:*:*:*:*;cpe:2.3:a:artica:pandora_fms:3.1:rc1:*:*:*:*:*:* CVE-2010-4321,0.0,,0.56603,"Stack-based buffer overflow in an ActiveX control in ienipp.ocx in Novell iPrint Client 5.52 allows remote attackers to execute arbitrary code via a long argument to (1) the GetDriverSettings2 method, as reachable by (2) the GetDriverSettings method.",2010-12-30,Metasploit,cpe:2.3:a:novell:iprint_client:5.52:*:*:*:*:*:*:* CVE-2010-4335,0.0,,0.82639,"The _validatePost function in libs/controller/components/security.php in CakePHP 1.3.x through 1.3.5 and 1.2.8 allows remote attackers to modify the internal Cake cache and execute arbitrary code via a crafted data[_Token][fields] value that is processed by the unserialize function, as demonstrated by modifying the file_map cache to execute arbitrary local files.",2011-01-14,Metasploit,cpe:2.3:a:cakefoundation:cakephp:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:cakephp:cakephp:1.2.8:*:*:*:*:*:*:*;cpe:2.3:a:cakephp:cakephp:1.3.0:alpha:*:*:*:*:*:*;cpe:2.3:a:cakephp:cakephp:1.3.0:beta:*:*:*:*:*:*;cpe:2.3:a:cakephp:cakephp:1.3.0:rc1:*:*:*:*:*:*;cpe:2.3:a:cakephp:cakephp:1.3.0:rc2:*:*:*:*:*:*;cpe:2.3:a:cakephp:cakephp:1.3.0:rc3:*:*:*:*:*:*;cpe:2.3:a:cakephp:cakephp:1.3.0:rc4:*:*:*:*:*:*;cpe:2.3:a:cakephp:cakephp:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:cakephp:cakephp:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:cakephp:cakephp:1.3.3:*:*:*:*:*:*:*;cpe:2.3:a:cakephp:cakephp:1.3.4:*:*:*:*:*:*:*;cpe:2.3:a:cakephp:cakephp:1.3.5:*:*:*:*:*:*:*;cpe:2.3:a:cakephp:cakephp:1.3:dev:*:*:*:*:*:* CVE-2010-4344,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.61461,"Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.",2010-12-14,Metasploit/CISA,cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:* CVE-2010-4345,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.04024,"Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.",2010-12-14,Metasploit/CISA,cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:* CVE-2010-4398,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.12712,"Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges, and bypass the User Account Control (UAC) feature, via a crafted REG_BINARY value for a SystemDefaultEUDCFont registry key, aka ""Driver Improper Interaction with Windows Kernel Vulnerability.""",2010-12-06,CISA,cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2010-4417,0.0,,0.72458,"Unspecified vulnerability in the Services for Beehive component in Oracle Fusion Middleware 2.0.1.0, 2.0.1.1, 2.0.1.2, 2.0.1.2.1, and 2.0.1.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that voice-servlet/prompt-qa/Index.jspf does not properly handle null (%00) bytes in the evaluation parameter that is used in a filename, which allows attackers to create a file with an executable extension and execute arbitrary JSP code.",2011-01-19,Metasploit,cpe:2.3:a:oracle:beehive:2.0.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:beehive:2.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:beehive:2.0.1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:beehive:2.0.1.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:beehive:2.0.1.3:*:*:*:*:*:*:* CVE-2010-4452,0.0,,0.87785,"Unspecified vulnerability in the Deployment component in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.",2011-02-17,Metasploit,cpe:2.3:a:sun:jdk:*:update_23:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update_23:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:* CVE-2010-4566,0.0,,0.71849,"The web authentication form in the NT4 authentication component in Citrix Access Gateway Enterprise Edition 9.2-49.8 and earlier, and the NTLM authentication component in Access Gateway Standard and Advanced Editions before Access Gateway 5.0, allows attackers to execute arbitrary commands via shell metacharacters in the password field.",2011-01-14,Metasploit,cpe:2.3:a:citrix:access_gateway:*:*:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:.8.0:m50.3:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5.5:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5.6:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5.7:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5:*:advanced:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5:hf1:*:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5:hf1:advanced:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.6.1:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.6.2:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.6.3:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:8.0:m48.7:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:8.0:m49.2:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:8.0:m59.1:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:8.1-69.4:*:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:9.0.71.3:*:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:9.1-104.5:*:enterprise:*:*:*:*:* CVE-2010-4617,0.0,,0.00377,Directory traversal vulnerability in the JotLoader (com_jotloader) component 2.2.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the section parameter to index.php.,2010-12-29,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:kanich:com_jotloader:2.2.1:*:*:*:*:*:*:* CVE-2010-4719,0.0,,0.03407,Directory traversal vulnerability in JRadio (com_jradio) component before 1.5.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.,2011-02-01,Nuclei,cpe:2.3:a:fxwebdesign:com_jradio:*:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-4740,0.0,,0.5913,"Stack-based buffer overflow in WTclient.dll in SCADA Engine BACnet OPC Client before 1.0.25 allows user-assisted remote attackers to execute arbitrary code via a crafted .csv file, related to a status log message.",2011-02-16,Metasploit,cpe:2.3:a:scadaengine:bacnet_opc_client:*:*:*:*:*:*:*:* CVE-2010-4741,0.0,,0.48589,Stack-based buffer overflow in MDMUtil.dll in MDMTool.exe in MDM Tool before 2.3 in Moxa Device Manager allows remote MDM Gateways to execute arbitrary code via crafted data in a session on TCP port 54321.,2011-02-18,Metasploit,cpe:2.3:a:moxa:device_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:moxa:mdm_tool:*:*:*:*:*:*:*:* CVE-2010-4742,0.0,,0.50638,Stack-based buffer overflow in a certain ActiveX control in MediaDBPlayback.DLL 2.2.0.5 in the Moxa ActiveX SDK allows remote attackers to execute arbitrary code via a long PlayFileName property value.,2011-02-18,Metasploit,cpe:2.3:a:moxa:activex_sdk:*:*:*:*:*:*:*:* CVE-2010-4769,0.0,,0.02614,Directory traversal vulnerability in the Jimtawl (com_jimtawl) component 1.0.2 Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the task parameter to index.php.,2011-03-23,Nuclei,cpe:2.3:a:janguo:com_jimtawl:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-4804,0.0,,0.63498,"The Android browser in Android before 2.3.4 allows remote attackers to obtain SD card contents via crafted content:// URIs, related to (1) BrowserActivity.java and (2) BrowserSettings.java in com/android/browser/.",2011-06-09,Metasploit,cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:1.5:*:*:*:*:*:*:*;cpe:2.3:o:google:android:1.6:*:*:*:*:*:*:*;cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*;cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*;cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*;cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*;cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*;cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:* CVE-2010-4977,0.0,,0.03909,SQL injection vulnerability in menu.php in the Canteen (com_canteen) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the mealid parameter to index.php.,2011-11-01,Nuclei,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:miniwork:com_canteen:1.0:*:*:*:*:*:*:* CVE-2010-5028,0.0,,0.09308,SQL injection vulnerability in the JExtensions JE Job (com_jejob) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in an item action to index.php.,2011-11-02,Nuclei,cpe:2.3:a:harmistechnology:com_jejob:1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-5081,0.0,,0.59696,Stack-based buffer overflow in Mini-Stream RM-MP3 Converter 3.1.2.1 allows remote attackers to execute arbitrary code via a long URL in a .pls file.,2011-12-25,Metasploit,cpe:2.3:a:mini-stream:rm-mp3_converter:3.1.2.1:*:*:*:*:*:*:* CVE-2010-5193,0.0,,0.55762,Stack-based buffer overflow in the TIFMergeMultiFiles function in the SCRIBBLE.ScribbleCtrl.1 ActiveX control (ImageViewer2.ocx) in Viscom Image Viewer CP Pro 8.0 and Gold 6.0 allows remote attackers to execute arbitrary code via a long strDelimit parameter.,2012-08-31,Metasploit,cpe:2.3:a:viscomsoft:image_viewer_cp_gold_sdk:6.0:*:*:*:*:*:*:*;cpe:2.3:a:viscomsoft:image_viewer_cp_pro_sdk:8.0:*:*:*:*:*:*:* CVE-2010-5278,0.0,,0.19684,"Directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter. NOTE: some of these details are obtained from third party information.",2012-10-07,Nuclei,cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:* CVE-2010-5286,0.0,,0.32162,Directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.,2012-11-26,Nuclei,cpe:2.3:a:joobi:com_jstore:-:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2010-5299,0.0,,0.68264,"Stack-based buffer overflow in MicroP 0.1.1.1600 allows remote attackers to execute arbitrary code via a crafted .mppl file. NOTE: it has been reported that the overflow is in the lpFileName parameter of the CreateFileA function, but the overflow is probably caused by a separate, unnamed function.",2014-05-23,Metasploit,cpe:2.3:a:microp_project:microp:0.1.1.1600:*:*:*:*:*:*:* CVE-2010-5324,0.0,,0.7407,"Directory traversal vulnerability in UploadServlet in the Remote Management component in Novell ZENworks Configuration Management (ZCM) 10 before 10.3 allows remote attackers to execute arbitrary code via a zenworks-fileupload request with a crafted directory name in the type parameter, in conjunction with a WAR filename in the filename parameter and WAR content in the POST data, a different vulnerability than CVE-2010-5323.",2015-06-07,Metasploit,cpe:2.3:a:novell:zenworks_configuration_management:10.0:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:10.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:10.2:*:*:*:*:*:*:* CVE-2010-5326,10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,0.26416,"The Invoker Servlet on SAP NetWeaver Application Server Java platforms, possibly before 7.3, does not require authentication, which allows remote attackers to execute arbitrary code via an HTTP or HTTPS request, as exploited in the wild in 2013 through 2016, aka a ""Detour"" attack.",2016-05-13,CISA,cpe:2.3:a:sap:netweaver_application_server_java:*:*:*:*:*:*:*:* CVE-2010-5330,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.52725,"On certain Ubiquiti devices, Command Injection exists via a GET request to stainfo.cgi (aka Show AP info) because the ifname variable is not sanitized, as demonstrated by shell metacharacters. The fixed version is v4.0.1 for 802.11 ISP products, v5.3.5 for AirMax ISP products, and v5.4.5 for AirSync firmware. For example, Nanostation5 (Air OS) is affected.",2019-06-11,CISA,cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:* CVE-2011-0049,0.0,,0.91269,"Directory traversal vulnerability in the _list_file_get function in lib/Majordomo.pm in Majordomo 2 before 20110131 allows remote attackers to read arbitrary files via .. (dot dot) sequences in the help command, as demonstrated using (1) a crafted email and (2) cgi-bin/mj_wwwusr in the web interface.",2011-02-04,Metasploit/Nuclei,cpe:2.3:a:mj2:majordomo_2:*:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110101:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110102:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110103:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110104:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110105:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110106:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110107:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110108:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110109:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110110:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110111:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110112:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110113:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110114:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110115:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110116:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110117:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110118:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110119:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110120:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110121:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110122:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110123:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110124:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110125:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110126:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110127:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110128:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110129:*:*:*:*:*:*:* CVE-2011-0063,0.0,,0.89981,"The _list_file_get function in lib/Majordomo.pm in Majordomo 2 20110203 and earlier allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ./.../ sequence in the ""extra"" parameter to the help command, which causes the regular expression to produce .. (dot dot) sequences. NOTE: this vulnerability is due to an incomplete fix for CVE-2011-0049.",2011-03-15,Metasploit,cpe:2.3:a:mj2:majordomo_2:*:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110101:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110102:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110103:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110104:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110105:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110106:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110107:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110108:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110109:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110110:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110111:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110112:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110113:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110114:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110115:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110116:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110117:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110118:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110119:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110120:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110121:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110122:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110123:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110124:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110125:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110126:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110127:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110128:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110129:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110130:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110131:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110201:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110202:*:*:*:*:*:*:* CVE-2011-0065,0.0,,0.83259,"Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.",2011-05-07,Metasploit,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:* CVE-2011-0073,0.0,,0.81161,"Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, does not properly use nsTreeRange data structures, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a ""dangling pointer.""",2011-05-07,Metasploit,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:* CVE-2011-0105,0.0,,0.89418,"Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac obtain a certain length value from an uninitialized memory location, which allows remote attackers to trigger a buffer overflow and execute arbitrary code via a crafted Excel file, aka ""Excel Data Initialization Vulnerability.""",2011-04-13,Metasploit,cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*;cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*;cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:* CVE-2011-0257,0.0,,0.83296,Integer signedness error in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PnSize opcode in a PICT file that triggers a stack-based buffer overflow.,2011-08-15,Metasploit,cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.7:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.8:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.66.71.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.67.75.0:*:*:*:*:*:*:* CVE-2011-0266,0.0,,0.77535,"Buffer overflow in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long nameParams parameter, a different vulnerability than CVE-2011-0267.2.",2011-01-13,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:* CVE-2011-0267,0.0,,0.78987,"Multiple buffer overflows in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allow remote attackers to execute arbitrary code via a long (1) schdParams or (2) nameParams parameter, a different vulnerability than CVE-2011-0266.",2011-01-13,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:* CVE-2011-0276,0.0,,0.85731,"HP OpenView Performance Insight Server 5.2, 5.3, 5.31, 5.4, and 5.41 contains a ""hidden account"" in the com.trinagy.security.XMLUserManager Java class, which allows remote attackers to execute arbitrary code via the doPost method in the com.trinagy.servlet.HelpManagerServlet class.",2011-02-02,Metasploit,cpe:2.3:a:hp:openview_performance_insight:5.2:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_performance_insight:5.31:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_performance_insight:5.3:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_performance_insight:5.41:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_performance_insight:5.4:*:*:*:*:*:*:* CVE-2011-0340,0.0,,0.47349,"Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method.",2011-05-04,Metasploit,cpe:2.3:a:advantech:advantech_studio:6.1:sp6_61.6.01.05:*:*:*:*:*:*;cpe:2.3:a:indusoft:thin_client:7.0:*:*:*:*:*:*:*;cpe:2.3:a:indusoft:web_studio:*:*:*:*:*:*:*:*;cpe:2.3:a:indusoft:web_studio:6.1:*:*:*:*:*:*:*;cpe:2.3:a:indusoft:web_studio:6.1:sp6:*:*:*:*:*:* CVE-2011-0404,0.0,,0.78809,"Stack-based buffer overflow in NetSupport Manager Agent for Linux 11.00, for Solaris 9.50, and for Mac OS X 11.00 allows remote attackers to execute arbitrary code via a long control hostname to TCP port 5405, probably a different vulnerability than CVE-2007-5252.",2011-01-11,Metasploit,cpe:2.3:a:netsupport:netsupport_manager_agent:11.00:*:linux:*:*:*:*:*;cpe:2.3:a:netsupport:netsupport_manager_agent:11.00:*:mac_os_x:*:*:*:*:*;cpe:2.3:a:netsupport:netsupport_manager_agent:9.50:*:solaris:*:*:*:*:* CVE-2011-0499,0.0,,0.59532,"Buffer overflow in VideoSpirit Pro 1.6.8.1 and possibly earlier versions, and VideoSpirit Lite 1.4.0.1 and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via a VideoSpirit project (.visprj) file containing a valitem element with a long ""name"" attribute. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.",2011-01-20,Metasploit,cpe:2.3:a:verytools:videospirit_lite:*:*:*:*:*:*:*:*;cpe:2.3:a:verytools:videospirit_pro:*:*:*:*:*:*:*:*;cpe:2.3:a:verytools:videospirit_pro:1.68:*:*:*:*:*:*:* CVE-2011-0500,0.0,,0.64306,"Buffer overflow in VideoSpirit Pro 1.6.8.1, 1.68, and earlier; and VideoSpirit Lite 1.4.0.1 and possibly other versions; allows user-assisted remote attackers to execute arbitrary code via a VideoSpirit project (.visprj) file containing a valitem element with a long ""value"" attribute, as demonstrated using a valitem with the mp3 name.",2011-01-20,Metasploit,cpe:2.3:a:verytools:videospirit_lite:1.4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:verytools:videospirit_pro:*:*:*:*:*:*:*:*;cpe:2.3:a:verytools:videospirit_pro:1.6.8.1:*:*:*:*:*:*:* CVE-2011-0514,0.0,,0.71443,The RDS service (rds.exe) in HP Data Protector Manager 6.11 allows remote attackers to cause a denial of service (crash) via a packet with a large data size to TCP port 1530.,2011-01-20,Metasploit,cpe:2.3:a:hp:data_protector_manager:6.11:*:*:*:*:*:*:* CVE-2011-0517,0.0,,0.71601,"Stack-based buffer overflow in Sielco Sistemi Winlog Pro 2.07.00 and earlier, when Run TCP/IP server is enabled, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted 0x02 opcode to TCP port 46823.",2011-01-20,Metasploit,cpe:2.3:a:sielcosistemi:winlog_pro:*:*:*:*:*:*:*:* CVE-2011-0518,0.0,,0.6172,"Directory traversal vulnerability in core/lib/router.php in LotusCMS Fraise 3.0, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via the system parameter to index.php.",2011-01-20,Metasploit,cpe:2.3:a:lotuscms:fraise:3.0:*:*:*:*:*:*:* CVE-2011-0531,0.0,,0.73766,"demux/mkv/mkv.hpp in the MKV demuxer plugin in VideoLAN VLC media player 1.1.6.1 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary commands via a crafted MKV (WebM or Matroska) file that triggers memory corruption, related to ""class mismatching"" and the MKV_IS_ID macro.",2011-02-07,Metasploit,cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:* CVE-2011-0609,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.92398,"Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011.",2011-03-15,Metasploit/CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:* CVE-2011-0611,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.92899,"Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a ""group of included constants,"" object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011.",2011-04-13,Metasploit/CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:* CVE-2011-0647,0.0,,0.72633,The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542.,2011-02-10,Metasploit,cpe:2.3:a:emc:networker_module:2.1:-:microsoft_applications:*:*:*:*:*;cpe:2.3:a:emc:networker_module:2.2:-:microsoft_applications:*:*:*:*:*;cpe:2.3:a:emc:replication_manager:*:*:client:*:*:*:*:*;cpe:2.3:a:emc:replication_manager:2.0:*:client:*:*:*:*:*;cpe:2.3:a:emc:replication_manager:5.2.2:*:client:*:*:*:*:*;cpe:2.3:a:emc:replication_manager:5.2:*:client:*:*:*:*:* CVE-2011-0654,0.0,,0.81012,"Integer underflow in the BowserWriteErrorLogEntry function in the Common Internet File System (CIFS) browser service in Mrxsmb.sys or bowser.sys in Active Directory in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via a malformed BROWSER ELECTION message, leading to a heap-based buffer overflow, aka ""Browser Pool Corruption Vulnerability."" NOTE: some of these details are obtained from third party information.",2011-02-16,Metasploit,cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:r2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:r2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* CVE-2011-0657,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.46929,"DNSAPI.dll in the DNS client in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process DNS queries, which allows remote attackers to execute arbitrary code via (1) a crafted LLMNR broadcast query or (2) a crafted application, aka ""DNS Query Vulnerability.""",2011-04-13,Metasploit,cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2011-0762,0.0,,0.36866,"The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.",2011-03-02,Metasploit/Nuclei,cpe:2.3:a:vsftpd_project:vsftpd:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* CVE-2011-0807,0.0,,0.87545,"Unspecified vulnerability in Oracle Sun GlassFish Enterprise Server 2.1, 2.1.1, and 3.0.1, and Sun Java System Application Server 9.1, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Administration.",2011-04-20,Metasploit,cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:glassfish_server:2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:sun:java_system_application_server:9.1:*:*:*:*:*:*:* CVE-2011-0922,0.0,,0.82006,The client in HP Data Protector allows remote attackers to execute arbitrary programs via an EXEC_SETUP command that references a UNC share pathname.,2011-02-09,Metasploit,cpe:2.3:a:hp:data_protector:*:*:*:*:*:*:*:* CVE-2011-0923,0.0,,0.89891,"The client in HP Data Protector does not properly validate EXEC_CMD arguments, which allows remote attackers to execute arbitrary Perl code via a crafted command, related to the ""local bin directory.""",2011-02-09,Metasploit,cpe:2.3:a:hp:data_protector:*:*:*:*:*:*:*:* CVE-2011-0951,0.0,,0.65335,"The web-based management interface in Cisco Secure Access Control System (ACS) 5.1 before 5.1.0.44.6 and 5.2 before 5.2.0.26.3 allows remote attackers to change arbitrary user passwords via unspecified vectors, aka Bug ID CSCtl77440.",2011-04-04,Metasploit,cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.3:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.4:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.5:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26.2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.2:*:*:*:*:*:*:* CVE-2011-1140,0.0,,0.30766,"Multiple stack consumption vulnerabilities in the dissect_ms_compressed_string and dissect_mscldap_string functions in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allow remote attackers to cause a denial of service (infinite recursion) via a crafted (1) SMB or (2) Connection-less LDAP (CLDAP) packet.",2011-03-03,Metasploit,cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.10:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.11:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.12:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.13:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.14:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.15:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.16:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.10:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.11:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.12:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.13:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.14:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:* CVE-2011-1213,0.0,,0.78656,"Integer underflow in lzhsr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via a crafted header in a .lzh attachment that triggers a stack-based buffer overflow, aka SPR PRAD88MJ2W.",2011-05-31,Metasploit,cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:3.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:3.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.6.7a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.6.7h:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.1.02:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.1a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.1b:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.1c:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.2a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.2b:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.2c:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.4a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.5.01:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.5.02:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.6a.01:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.6a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.7a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.9a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.02:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.1:cf1:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.1:cf2:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.1:cf3:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.2:cf1:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.2:cf2:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.4.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.6.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.6.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.6.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5:*:*:*:*:*:*:* CVE-2011-1220,0.0,,0.63306,"Stack-based buffer overflow in lcfd.exe in Tivoli Endpoint in IBM Tivoli Management Framework 3.7.1, 4.1, 4.1.1, and 4.3.1 allows remote authenticated users to execute arbitrary code via a long opts field.",2011-06-02,Metasploit,cpe:2.3:a:ibm:tivoli_management_framework:3.7.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_management_framework:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_management_framework:4.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_management_framework:4.3.1:*:*:*:*:*:*:* CVE-2011-1260,0.0,,0.85848,"Microsoft Internet Explorer 8 and 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka ""Layout Memory Corruption Vulnerability.""",2011-06-16,Metasploit,cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2011-1485,0.0,,0.08018,"Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit) 0.96 allows local users to gain privileges by executing a setuid program from pkexec, related to the use of the effective user ID instead of the real user ID.",2011-05-31,Metasploit,cpe:2.3:a:redhat:policykit:0.96:*:*:*:*:*:*:* CVE-2011-1563,0.0,,0.58365,"Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified ""On_FC_BINFILE_FCS_*FILE"", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910.",2011-04-05,Metasploit,cpe:2.3:a:realflex:realwin:*:*:*:*:*:*:*:*;cpe:2.3:a:realflex:realwin:1.06:*:*:*:*:*:*:*;cpe:2.3:a:realflex:realwin:2.0:*:*:*:*:*:*:* CVE-2011-1565,0.0,,0.69054,Directory traversal vulnerability in IGSSdataServer.exe 9.00.00.11063 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allows remote attackers to (1) read (opcode 0x3) or (2) create or write (opcode 0x2) arbitrary files via ..\ (dot dot backslash) sequences to TCP port 12401.,2011-04-05,Metasploit,cpe:2.3:a:7t:igss:*:*:*:*:*:*:*:* CVE-2011-1566,0.0,,0.77663,Directory traversal vulnerability in dc.exe 9.00.00.11059 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allows remote attackers to execute arbitrary programs via ..\ (dot dot backslash) sequences in opcodes (1) 0xa and (2) 0x17 to TCP port 12397.,2011-04-05,Metasploit,cpe:2.3:a:7t:igss:*:*:*:*:*:*:*:* CVE-2011-1567,0.0,,0.78999,"Multiple stack-based buffer overflows in IGSSdataServer.exe 9.00.00.11063 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted (1) ListAll, (2) Write File, (3) ReadFile, (4) Delete, (5) RenameFile, and (6) FileInfo commands in an 0xd opcode; (7) the Add, (8) ReadFile, (9) Write File, (10) Rename, (11) Delete, and (12) Add commands in an RMS report templates (0x7) opcode; and (13) 0x4 command in an STDREP request (0x8) opcode to TCP port 12401.",2011-04-05,Metasploit,cpe:2.3:a:7t:igss:*:*:*:*:*:*:*:* CVE-2011-1574,0.0,,0.67035,Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.,2011-05-09,Metasploit,cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:* CVE-2011-1591,0.0,,0.77801,Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.,2011-04-29,Metasploit,cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:* CVE-2011-1653,0.0,,0.74059,"Multiple SQL injection vulnerabilities in the Unified Network Control (UNC) Server in CA Total Defense (TD) r12 before SE2 allow remote attackers to execute arbitrary SQL commands via vectors involving the (1) UnAssignFunctionalRoles, (2) UnassignAdminRoles, (3) DeleteFilter, (4) NonAssignedUserList, (5) DeleteReportLayout, (6) DeleteReports, and (7) RegenerateReport stored procedures.",2011-04-18,Metasploit,cpe:2.3:a:broadcom:total_defense:r12:*:*:*:*:*:*:* CVE-2011-1669,0.0,,0.01195,Directory traversal vulnerability in wp-download.php in the WP Custom Pages module 0.5.0.1 for WordPress allows remote attackers to read arbitrary files via ..%2F (encoded dot dot) sequences in the url parameter.,2011-04-10,Nuclei,cpe:2.3:a:mikoviny:wp_custom_pages:0.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* CVE-2011-1774,0.0,,0.76747,"WebKit in Apple Safari before 5.0.6 has improper libxslt security settings, which allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via a crafted web site. NOTE: this may overlap CVE-2011-1425.",2011-07-21,Metasploit,cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.6.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.6.9:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.6.9:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* CVE-2011-1823,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.54882,"The vold volume manager daemon on Android 3.0 and 2.x before 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative index that bypasses a maximum-only signed integer check in the DirectVolume::handlePartitionAdded method, which triggers memory corruption, as demonstrated by Gingerbreak.",2011-06-09,CISA,cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:* CVE-2011-1865,0.0,,0.87606,Multiple stack-based buffer overflows in the inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allow remote attackers to execute arbitrary code via a request containing crafted parameters.,2011-07-01,Metasploit,cpe:2.3:a:hp:openview_storage_data_protector:6.00:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_storage_data_protector:6.10:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_storage_data_protector:6.11:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_storage_data_protector:6.20:*:*:*:*:*:*:* CVE-2011-1889,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.87382,"The NSPLookupServiceNext function in the client in Microsoft Forefront Threat Management Gateway (TMG) 2010 allows remote attackers to execute arbitrary code via vectors involving unspecified requests, aka ""TMG Firewall Client Memory Corruption Vulnerability.""",2011-06-16,CISA,cpe:2.3:a:microsoft:forefront_threat_management_gateway:2010:*:*:*:*:*:*:* CVE-2011-1900,0.0,,0.49258,Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 6.1 and 7.x before 7.0+Patch 1 allows remote attackers to execute arbitrary code via an invalid request.,2011-05-04,Metasploit,cpe:2.3:a:indusoft:web_studio:6.1:*:*:*:*:*:*:*;cpe:2.3:a:indusoft:web_studio:7.0:*:*:*:*:*:*:* CVE-2011-1996,0.0,,0.79505,"Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka ""Option Element Remote Code Execution Vulnerability.""",2011-10-12,Metasploit,cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2011-2005,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.5755,"afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka ""Ancillary Function Driver Elevation of Privilege Vulnerability.""",2011-10-12,Metasploit/CISA,cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2011-2039,0.0,,0.84123,"The helper application in Cisco AnyConnect Secure Mobility Client (formerly AnyConnect VPN Client) before 2.3.185 on Windows, and on Windows Mobile, downloads a client executable file (vpndownloader.exe) without verifying its authenticity, which allows remote attackers to execute arbitrary code via the url property to a certain ActiveX control in vpnweb.ocx, aka Bug ID CSCsy00904.",2011-06-02,Metasploit,cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.128:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.133:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.136:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.140:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_mobile:*:*:*:*:*:*:*:* CVE-2011-2089,0.0,,0.76007,Stack-based buffer overflow in the SetActiveXGUID method in the VersionInfo ActiveX control in GenVersion.dll 8.0.138.0 in the WebHMI subsystem in ICONICS BizViz 9.x before 9.22 and GENESIS32 9.x before 9.22 allows remote attackers to execute arbitrary code via a long string in the argument. NOTE: some of these details are obtained from third party information.,2011-05-13,Metasploit,cpe:2.3:a:iconics:bizviz:9.01:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.0:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.13:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.1:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.20:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.21:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.2:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.01:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.0:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.13:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.1:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.20:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.21:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.2:*:*:*:*:*:*:* CVE-2011-2110,0.0,,0.9143,"Adobe Flash Player before 10.3.181.26 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.23 and earlier on Android, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in June 2011.",2011-06-16,Metasploit,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.154.25:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.156.12:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.157.51:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.185.21:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:* CVE-2011-2140,0.0,,0.89835,"Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425.",2011-08-10,Metasploit,cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.154.25:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.156.12:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.157.51:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.23:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.185.21:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.185.23:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:* CVE-2011-2217,0.0,,0.88252,"Certain ActiveX controls in (1) tsgetxu71ex552.dll and (2) tsgetx71ex552.dll in Tom Sawyer GET Extension Factory 5.5.2.237, as used in VI Client (aka VMware Infrastructure Client) 2.0.2 before Build 230598 and 2.5 before Build 204931 in VMware Infrastructure 3, do not properly handle attempted initialization within Internet Explorer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HTML document.",2011-06-06,Metasploit,cpe:2.3:a:tomsawyer:get_extension_factory:5.5.2.237:*:*:*:*:*:*:*;cpe:2.3:a:vmware:infrastructure:3:*:*:*:*:*:*:*;cpe:2.3:a:vmware:virtual_infrastructure_client:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:vmware:virtual_infrastructure_client:2.5:*:*:*:*:*:*:* CVE-2011-2371,0.0,,0.87002,"Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.",2011-06-30,Metasploit,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:* CVE-2011-2386,0.0,,0.74908,"VisiWaveReport.exe in AZO Technologies, Inc. VisiWave Site Survey before 2.1.9 allows user-assisted remote attackers to execute arbitrary code via a (1) vws and (2) vwr file with an invalid Type property, which triggers an untrusted pointer dereference.",2011-06-08,Metasploit,cpe:2.3:a:visiwave:site_survey:*:*:*:*:*:*:*:*;cpe:2.3:a:visiwave:site_survey:1.6.12:*:*:*:*:*:*:*;cpe:2.3:a:visiwave:site_survey:2.0.12:*:*:*:*:*:*:* CVE-2011-2404,0.0,,0.80489,"A certain ActiveX control in HPTicketMgr.dll in HP Easy Printer Care Software 2.5 and earlier allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via unspecified vectors, a different vulnerability than CVE-2011-4786 and CVE-2011-4787.",2011-08-11,Metasploit,cpe:2.3:a:hp:easy_printer_care_software:*:*:*:*:*:*:*:* CVE-2011-2462,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9255,"Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.",2011-12-07,Metasploit/CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:* CVE-2011-2474,0.0,,0.08976,Directory traversal vulnerability in the HTTP Server in Sybase EAServer 6.3.1 Developer Edition allows remote attackers to read arbitrary files via a /.\../\../\ sequence in a path.,2011-06-09,Metasploit,cpe:2.3:a:sybase:easerver:6.3.1:*:developer:*:*:*:*:* CVE-2011-2523,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94261,vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.,2019-11-27,Nuclei,cpe:2.3:a:vsftpd_project:vsftpd:2.3.4:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2011-2595,0.0,,0.74003,Multiple stack-based buffer overflows in ACDSee FotoSlate 4.0 Build 146 allow remote attackers to execute arbitrary code via a long id parameter in a (1) String or (2) Int tag in a FotoSlate Project (aka PLP) file.,2011-09-14,Metasploit,cpe:2.3:a:acdsee:fotoslate:4.0:*:*:*:*:*:*:* CVE-2011-2653,0.0,,0.85146,Directory traversal vulnerability in the rtrlet component in Novell ZENworks Asset Management (ZAM) 7.5 allows remote attackers to execute arbitrary code by uploading an executable file.,2011-12-08,Metasploit,cpe:2.3:a:novell:zenworks_asset_management:7.5:*:*:*:*:*:*:* CVE-2011-2657,0.0,,0.74401,"Directory traversal vulnerability in the LaunchProcess function in the LaunchHelp.HelpLauncher.1 ActiveX control in LaunchHelp.dll in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.2, 10.3, and 11 SP1 allows remote attackers to execute arbitrary commands via a pathname in the first argument.",2012-07-26,Metasploit,cpe:2.3:a:novell:zenworks_configuration_management:10.2:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11:sp1:*:*:*:*:*:* CVE-2011-2744,0.0,,0.11749,Directory traversal vulnerability in Chyrp 2.1 and earlier allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the action parameter to the default URI.,2011-07-19,Nuclei,cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:*;cpe:2.3:a:chyrp:chyrp:2.0:*:*:*:*:*:*:*;cpe:2.3:a:chyrp:chyrp:2.1:beta1:*:*:*:*:*:*;cpe:2.3:a:chyrp:chyrp:2.1:beta2:*:*:*:*:*:*;cpe:2.3:a:chyrp:chyrp:2.1:rc:*:*:*:*:*:* CVE-2011-2750,0.0,,0.65376,NFRAgent.exe in Novell File Reporter 1.0.4.2 and earlier allows remote attackers to delete arbitrary files via a full pathname in an SRS OPERATION 4 CMD 5 request to /FSF/CMD.,2011-07-17,Metasploit,cpe:2.3:a:novell:file_reporter:*:*:*:*:*:*:*:*;cpe:2.3:a:novell:file_reporter:1.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:file_reporter:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:file_reporter:1.0.2:*:*:*:*:*:*:* CVE-2011-2763,0.0,,0.7071,The web interface on the LifeSize Room appliance LS_RM1_3.5.3 (11) and 4.7.18 allows remote attackers to execute arbitrary commands via a modified request to the LSRoom_Remoting.doCommand function in gateway.php.,2011-09-02,Metasploit,cpe:2.3:a:lifesize:lifesize_room_appliance_software:4.7.18:*:*:*:*:*:*:*;cpe:2.3:a:lifesize:lifesize_room_appliance_software:ls_rm1_3.5.3:*:*:*:*:*:*:*;cpe:2.3:h:lifesize:lifesize_room_appliance:*:*:*:*:*:*:*:* CVE-2011-2780,0.0,,0.05859,"Directory traversal vulnerability in includes/lib/gz.php in Chyrp 2.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, a different vulnerability than CVE-2011-2744.",2011-07-19,Nuclei,cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:* CVE-2011-2882,0.0,,0.75017,"Stack-based buffer overflow in the NSEPA.NsepaCtrl.1 ActiveX control in nsepa.ocx in Citrix Access Gateway Enterprise Edition 8.1 before 8.1-67.7, 9.0 before 9.0-70.5, and 9.1 before 9.1-96.4 allows remote attackers to execute arbitrary code via crafted HTTP header data.",2011-07-21,Metasploit,cpe:2.3:a:citrix:access_gateway:8.1:*:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:9.0:*:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:9.1:*:enterprise:*:*:*:*:* CVE-2011-2921,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.71594,"ktsuss versions 1.4 and prior has the uid set to root and does not drop privileges prior to executing user specified commands, which can result in command execution with root privileges.",2019-11-19,Metasploit,cpe:2.3:a:ktsuss_project:ktsuss:*:*:*:*:*:*:*:* CVE-2011-2950,0.0,,0.70013,Heap-based buffer overflow in qcpfformat.dll in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.5 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a crafted QCP file.,2011-08-18,Metasploit,cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:* CVE-2011-3011,0.0,,0.65966,"BaseServiceImpl.class in CA ARCserve D2D r15 does not properly handle sessions, which allows remote attackers to obtain credentials, and consequently execute arbitrary commands, via unspecified vectors.",2011-08-15,Metasploit,cpe:2.3:a:ca:arcserve_d2d:r15:*:*:*:*:*:*:* CVE-2011-3167,0.0,,0.7621,"Unspecified vulnerability in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1210.",2011-11-02,Metasploit,cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:* CVE-2011-3171,0.0,,0.0002,"Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwrite arbitrary files via unknown vectors.",2011-11-04,Nuclei,cpe:2.3:a:pureftpd:pure-ftpd:*:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.90:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.91:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.92:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.93:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.94:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre2:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre3:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre4:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.96.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.96:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.96:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97-final:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.3:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.4:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.5:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.6:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre2:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre3:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre2:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre3:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre4:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre5:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.2:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.3:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.4:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.5:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.6:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.7:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98:final:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98:pre2:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:b:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.2:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.3:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.4:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.9:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99:b:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99:pre2:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.10:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.11:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.12:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.13:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.14:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.15:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:b:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:c:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.17:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.17:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.18:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.19:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.20:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.21:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.9:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:vmware:*:*:*:*:* CVE-2011-3175,0.0,,0.76219,Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x6c request.,2012-04-09,Metasploit,cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.1a:*:*:*:*:*:*:* CVE-2011-3176,0.0,,0.836,Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x4c request.,2012-04-09,Metasploit,cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.1a:*:*:*:*:*:*:* CVE-2011-3192,0.0,,0.92835,"The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.",2011-08-29,Metasploit,cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:* CVE-2011-3200,0.0,,0.64777,Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.,2011-09-06,Metasploit,cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.6:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.7:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.10:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.4:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.5:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.6:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.7:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.8:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.9:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.8.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.8.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.8.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.8.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.8.4:*:*:*:*:*:*:* CVE-2011-3230,0.0,,0.67284,"Apple Safari before 5.1.1 on Mac OS X does not enforce an intended policy for file: URLs, which allows remote attackers to execute arbitrary code via a crafted web site.",2011-10-14,Metasploit,cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* CVE-2011-3305,0.0,,0.42002,"Directory traversal vulnerability in Cisco Network Admission Control (NAC) Manager 4.8.x allows remote attackers to read arbitrary files via crafted traffic to TCP port 443, aka Bug ID CSCtq10755.",2011-10-06,Metasploit,cpe:2.3:a:cisco:nac_manager:4.8:*:*:*:*:*:*:*;cpe:2.3:a:cisco:nac_manager:4.8\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:nac_manager:4.8\(2\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:nac_appliance:*:*:*:*:*:*:*:* CVE-2011-3315,0.0,,0.51143,"Directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049.",2011-10-27,Nuclei,cpe:2.3:a:cisco:unified_ccx:6.0\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_ccx:7.0\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_ccx:7.0\(2\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_ccx:8.0\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_ccx:8.0\(2\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_ccx:8.5\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:5.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:5.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:5.1\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:5.1\(1b\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:5.1\(1c\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:5.1\(2\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:5.1\(2a\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:5.1\(2b\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:5.1\(3\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:5.1\(3a\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:5.1\(3c\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:5.1\(3d\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:5.1\(3e\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(1a\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(1b\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(2\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(2\)su1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(2\)su1a:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(3\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(3a\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(3b\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(3b\)su1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(4\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(4\)su1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(4a\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(4a\)su2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(5\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:6.1\(5\)su1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.0\(1\)su1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.0\(1\)su1a:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.0\(2\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.0\(2a\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.0\(2a\)su1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.0\(2a\)su2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(2a\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(2a\)su1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(2b\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(2b\)su1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(3\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(3a\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(3a\)su1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(3a\)su1a:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(3b\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(3b\)su1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(3b\)su2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(5\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(5\)su1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(5\)su1a:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(5a\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(5b\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(5b\)su1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:7.1\(5b\)su1a:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:8.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:8.0\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:8.0\(2\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:8.0\(2a\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:8.0\(2b\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:8.0\(2c\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_manager:8.0\(2c\)su1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_ip_ivr:6.0\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_ip_ivr:7.0\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_ip_ivr:7.0\(2\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_ip_ivr:8.0\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_ip_ivr:8.0\(2\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_ip_ivr:8.5\(1\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:unified_ip_interactive_voice_response:-:*:*:*:*:*:*:* CVE-2011-3322,0.0,,0.79226,"Core Server HMI Service (Coreservice.exe) in Scadatec Limited Procyon SCADA 1.06, and other versions before 1.14, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password to the Telnet (TCP/23) port, which triggers an out-of-bounds read or write, leading to a stack-based buffer overflow.",2011-09-15,Metasploit,cpe:2.3:a:scadatec:procyon_scada:1.06:*:*:*:*:*:*:*;cpe:2.3:a:scadatec:procyon_scada:1.13:*:*:*:*:*:*:* CVE-2011-3360,0.0,,0.65771,Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory.,2011-09-20,Metasploit,cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:* CVE-2011-3368,0.0,,0.79132,"The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.",2011-10-05,Metasploit,cpe:2.3:a:apache:http_server:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.30:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.31:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.32:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.33:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.34:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.35:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.36:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.37:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.38:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.39:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.41:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.42:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.65:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.68:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.64:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:* CVE-2011-3389,0.0,,0.04513,"The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a ""BEAST"" attack.",2011-09-06,Metasploit,cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*;cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera_browser:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_rf615r:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_rf68xr:-:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_rf615r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_rf68xr_firmware:*:*:*:*:*:*:*:* CVE-2011-3400,0.0,,0.84374,"Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 do not properly handle OLE objects in memory, which allows remote attackers to execute arbitrary code via a crafted object in a file, aka ""OLE Property Vulnerability.""",2011-12-14,Metasploit,cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2011-3402,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.89746,"Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page, as exploited in the wild in November 2011 by Duqu, aka ""TrueType Font Parsing Vulnerability.""",2011-11-04,Metasploit/CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* CVE-2011-3486,0.0,,0.61661,"Beckhoff TwinCAT 2.11.0.2004 and earlier allows remote attackers to cause a denial of service via a crafted request to UDP port 48899, which triggers an out-of-bounds read.",2011-09-16,Metasploit,cpe:2.3:a:beckhoff:twincat:*:*:*:*:*:*:*:*;cpe:2.3:a:beckhoff:twincat:2.10:*:*:*:*:*:*:*;cpe:2.3:a:beckhoff:twincat:2.7:*:*:*:*:*:*:*;cpe:2.3:a:beckhoff:twincat:2.8:*:*:*:*:*:*:*;cpe:2.3:a:beckhoff:twincat:2.9:*:*:*:*:*:*:* CVE-2011-3492,0.0,,0.78299,Stack-based buffer overflow in Azeotech DAQFactory 5.85 build 1853 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted NETB packet to UDP port 20034.,2011-09-16,Metasploit,cpe:2.3:a:azeotech:daqfactory:*:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:3.03:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:3.05:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:3.09:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:3.0:-:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:3.10:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:3.11:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:3.51:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:3.52:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:3.53:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:3.55:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:3.5:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:4.00:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:4.10:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:4.11:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.01:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.02:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.03:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.04:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.05:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.0:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.10:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.11:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.12:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.15:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.30:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.31:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.32:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.33:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.34:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.35:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.36:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.37:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.38:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.39:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.40:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.70:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.71:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.72:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.73:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.74:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.75:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.76:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.77:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.78:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.79:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.80:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.82:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.83:*:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.83:a:*:*:*:*:*:*;cpe:2.3:a:azeotech:daqfactory:5.84:*:*:*:*:*:*:* CVE-2011-3494,0.0,,0.72445,"WinSig.exe in eSignal 10.6.2425 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a long StyleTemplate element in a QUO, SUM or POR file, which triggers a stack-based buffer overflow, or (2) a long Font->FaceName field (aka FaceName element), which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.",2011-09-16,Metasploit,cpe:2.3:a:interactivedata:esignal:*:*:*:*:*:*:*:*;cpe:2.3:a:interactivedata:esignal:10.6:*:*:*:*:*:*:* CVE-2011-3497,0.0,,0.722,"service.exe in Measuresoft ScadaPro 4.0.0 and earlier allows remote attackers to execute arbitrary DLL functions via the XF function, possibly related to an insecure exposed method.",2011-09-16,Metasploit,cpe:2.3:a:measuresoft:scadapro:*:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.1:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.2:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.3:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.4.1:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.4.2:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.4.3:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.4.4:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.4.5:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.4.6:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.4:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.5.2:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.5.3:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.5.4:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.5.5:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.5:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.6.0:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.7.0:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.7.1:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.7.2:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.8.0:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:2.9.0:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.2.8:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.2.9:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.0:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.10:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.11:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.12:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.13:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.14:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.15:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.1:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.2:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.3:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.4:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.5:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.6:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.7:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.8:*:*:*:*:*:*:*;cpe:2.3:a:measuresoft:scadapro:3.9.9:*:*:*:*:*:*:* CVE-2011-3544,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93041,"Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",2011-10-19,Metasploit/CISA,cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update7_b32:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update9_b31:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update9_b32:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update8:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update9:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update10_b31:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update17_b31:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update17_b32:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update21_b31:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update25_b33:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update25_b34:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update25_b35:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update7_b32:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*;cpe:2.3:a:redhat:satellite_with_embedded_oracle:5.4:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:* CVE-2011-3556,0.0,,0.89141,"Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",2011-10-19,Metasploit,cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jrockit:r28.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jrockit:r28.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jrockit:r28.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jrockit:r28.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jrockit:r28.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jrockit:r28.1.3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:*:update31:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:*:update_27:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_25:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_26:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_27:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_28:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_29:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_30:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_31:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_32:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update28:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update29:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_23:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_24:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_25:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_26:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update31:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update_27:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_29:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_30:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_31:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_32:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_23:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_24:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_25:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_26:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.7.0:*:*:*:*:*:*:* CVE-2011-3587,0.0,,0.90592,"Unspecified vulnerability in Zope 2.12.x and 2.13.x, as used in Plone 4.0.x through 4.0.9, 4.1, and 4.2 through 4.2a2, allows remote attackers to execute arbitrary commands via vectors related to the p_ class in OFS/misc_.py and the use of Python modules.",2011-10-10,Metasploit,cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*;cpe:2.3:a:plone:plone:4.0.7:*:*:*:*:*:*:*;cpe:2.3:a:plone:plone:4.0.8:*:*:*:*:*:*:*;cpe:2.3:a:plone:plone:4.0.9:*:*:*:*:*:*:*;cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*;cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*;cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*;cpe:2.3:a:plone:plone:4.2a1:*:*:*:*:*:*:*;cpe:2.3:a:plone:plone:4.2a2:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.0:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.0:a1:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.0:a2:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.0:a3:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.0:a4:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.0:b1:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.0:b2:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.0:b3:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.0:b4:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.10:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.11:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.12:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.13:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.14:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.15:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.16:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.17:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.18:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.19:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.1:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.20:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.2:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.3:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.4:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.5:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.6:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.7:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.8:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.12.9:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.0:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.0:a1:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.0:a2:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.0:a3:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.0:a4:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.0:b1:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.0:c1:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.10:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.1:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.2:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.3:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.4:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.5:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.6:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.7:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.8:*:*:*:*:*:*:*;cpe:2.3:a:zope:zope:2.13.9:*:*:*:*:*:*:* CVE-2011-3658,0.0,,0.75876,"The SVG implementation in Mozilla Firefox 8.0, Thunderbird 8.0, and SeaMonkey 2.5 does not properly interact with DOMAttrModified event handlers, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via vectors involving removal of SVG elements.",2011-12-21,Metasploit,cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:* CVE-2011-3659,0.0,,0.76075,"Use-after-free vulnerability in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 might allow remote attackers to execute arbitrary code via vectors related to incorrect AttributeChildRemoved notifications that affect access to removed nsDOMAttribute child nodes.",2012-02-01,Metasploit,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:* CVE-2011-3829,0.0,,0.36121,"ftp_upload_file.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated users to obtain sensitive information via the file name, which reveals the installation path in an error message.",2012-01-29,Metasploit,cpe:2.3:a:sitracker:support_incident_tracker:3.65:*:*:*:*:*:*:* CVE-2011-3833,0.0,,0.21003,"Unrestricted file upload vulnerability in ftp_upload_file.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated users to execute arbitrary PHP code by uploading a PHP file, then accessing it via a direct request to the file in an unspecified directory.",2012-01-29,Metasploit,cpe:2.3:a:sitracker:support_incident_tracker:3.65:*:*:*:*:*:*:* CVE-2011-3923,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.90651,Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.,2019-11-01,Metasploit,cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:* CVE-2011-3976,0.0,,0.64359,"Stack-based buffer overflow in AmmSoft ScriptFTP 3.3 allows remote FTP servers to execute arbitrary code via a long filename in a response to a LIST command, as demonstrated using (1) GETLIST or (2) GETFILE in a ScriptFTP script.",2011-10-04,Metasploit,cpe:2.3:a:ammsoft:scriptftp:3.3:*:*:*:*:*:*:* CVE-2011-4040,0.0,,0.76489,Buffer overflow in MiniSmtp 3.0.11818 in NJStar Communicator allows remote attackers to execute arbitrary code via a crafted packet.,2011-11-21,Metasploit,cpe:2.3:a:njstar:njstar_communicator:3.0.11818:*:*:*:*:*:*:* CVE-2011-4044,0.0,,0.61857,"An unspecified ActiveX control in SVUIGrd.ocx in ARC Informatique PcVue 6.0 through 10.0, FrontVue, and PlantVue allows remote attackers to modify files via calls to unknown methods.",2012-04-03,Metasploit,cpe:2.3:a:arcinfo:frontvue:-:*:*:*:*:*:*:*;cpe:2.3:a:arcinfo:pcvue:10.0:*:*:*:*:*:*:*;cpe:2.3:a:arcinfo:pcvue:6.0:*:*:*:*:*:*:*;cpe:2.3:a:arcinfo:pcvue:8.2:*:*:*:*:*:*:*;cpe:2.3:a:arcinfo:pcvue:9.0:*:*:*:*:*:*:*;cpe:2.3:a:arcinfo:plantvue:-:*:*:*:*:*:*:* CVE-2011-4050,0.0,,0.75943,Buffer overflow in 7-Technologies (7T) Interactive Graphical SCADA System (IGSS) 9.0.0.11200 allows remote attackers to cause a denial of service via a crafted packet to TCP port 12401.,2011-12-27,Metasploit,cpe:2.3:a:7t:igss:9.0.0.11200:*:*:*:*:*:*:* CVE-2011-4051,0.0,,0.7479,"CEServer.exe in the CEServer component in the Remote Agent module in InduSoft Web Studio 6.1 and 7.0 does not require authentication, which allows remote attackers to execute arbitrary code via vectors related to creation of a file, loading a DLL, and process control.",2011-12-05,Metasploit,cpe:2.3:a:indusoft:web_studio:6.1:*:*:*:*:*:*:*;cpe:2.3:a:indusoft:web_studio:7.0:*:*:*:*:*:*:* CVE-2011-4075,0.0,,0.83233,"The masort function in lib/functions.php in phpLDAPadmin 1.2.x before 1.2.2 allows remote attackers to execute arbitrary PHP code via the orderby parameter (aka sortby variable) in a query_engine action to cmd.php, as exploited in the wild in October 2011.",2011-11-02,Metasploit,cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.1:*:*:*:*:*:*:* CVE-2011-4166,0.0,,0.66269,Directory traversal vulnerability in the MPAUploader.Uploader.1.UploadFiles method in HP Managed Printing Administration before 2.6.4 allows remote attackers to create arbitrary files via crafted form data.,2011-12-27,Metasploit,cpe:2.3:a:hp:managed_printing_administration:*:*:*:*:*:*:*:* CVE-2011-4336,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.00927,"Tiki Wiki CMS Groupware 7.0 has XSS via the GET ""ajax"" parameter to snarf_ajax.php.",2020-01-15,Nuclei,cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:* CVE-2011-4350,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,0.25878,Yaws 1.91 has a directory traversal vulnerability in the way certain URLs are processed. A remote authenticated user could use this flaw to obtain content of arbitrary local files via specially-crafted URL request.,2019-11-26,Metasploit,cpe:2.3:a:yaws:yaws:1.91:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2011-4404,0.0,,0.83606,"The default configuration of the HTTP server in Jetty in vSphere Update Manager in VMware vCenter Update Manager 4.0 before Update 4 and 4.1 before Update 2 allows remote attackers to conduct directory traversal attacks and read arbitrary files via unspecified vectors, a related issue to CVE-2009-1523.",2011-11-19,Metasploit,cpe:2.3:a:vmware:vcenter_update_manager:4.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_update_manager:4.0:update_1:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_update_manager:4.0:update_2:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_update_manager:4.0:update_3:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_update_manager:4.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_update_manager:4.1:update_1:*:*:*:*:*:* CVE-2011-4451,0.0,,0.63617,"libs/Wakka.class.php in WikkaWiki 1.3.1 and 1.3.2, when the spam_logging option is enabled, allows remote attackers to write arbitrary PHP code to the spamlog_path file via the User-Agent HTTP header in an addcomment request. NOTE: the vendor disputes this issue because the rendering of the spamlog_path file never uses the PHP interpreter",2012-09-05,Metasploit,cpe:2.3:a:wikkawiki:wikkawiki:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:wikkawiki:wikkawiki:1.3.2:*:*:*:*:*:*:* CVE-2011-4453,0.0,,0.84819,"The PageListSort function in scripts/pagelist.php in PmWiki 2.x before 2.2.35 allows remote attackers to execute arbitrary code via PHP sequences in a crafted order parameter in a pagelist directive, leading to unintended use of the PHP create_function function.",2011-12-22,Metasploit,cpe:2.3:a:pmwiki:pmwiki:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.0.13:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.10:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.11:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.12:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.13:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.14:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.15:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.16:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.17:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.18:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.19:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.20:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.21:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.22:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.23:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.24:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.25:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.26:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.27:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.6:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.7:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.8:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.1.9:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta10:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta11:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta12:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta13:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta14:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta15:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta16:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta17:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta18:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta19:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta1:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta20:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta21:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta22:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta23:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta24:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta25:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta26:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta27:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta28:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta29:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta2:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta30:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta31:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta32:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta33:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta34:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta35:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta36:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta37:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta38:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta39:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta3:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta40:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta41:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta42:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta43:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta44:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta45:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta46:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta47:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta48:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta49:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta4:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta50:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta51:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta52:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta53:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta54:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta55:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta56:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta57:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta58:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta59:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta5:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta60:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta61:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta62:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta63:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta64:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta65:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta66:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta67:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta68:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta6:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta7:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta8:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.0:beta9:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.10:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.11:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.12:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.13:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.14:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.15:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.16:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.17:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.18:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.19:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.20:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.21:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.22:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.23:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.24:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.25:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.26:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.27:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.28:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.29:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.30:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.32:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.33:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.34:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.6:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.7:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.8:*:*:*:*:*:*:*;cpe:2.3:a:pmwiki:pmwiki:2.2.9:*:*:*:*:*:*:* CVE-2011-4535,0.0,,0.74359,"Buffer overflow in TurboPower Abbrevia before 4.0, as used in ScadaTEC ScadaPhone 5.3.11.1230 and earlier, ScadaTEC ModbusTagServer 4.1.1.81 and earlier, and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ZIP file.",2012-04-03,Metasploit,cpe:2.3:a:craig_peterson:turbopower_abbrevia:*:*:*:*:*:*:*:*;cpe:2.3:a:scadatec:modbustagserver:*:*:*:*:*:*:*:*;cpe:2.3:a:scadatec:scadaphone:*:*:*:*:*:*:*:* CVE-2011-4542,0.0,,0.75454,Hastymail2 2.1.1 before RC2 allows remote attackers to execute arbitrary commands via the (1) rs or (2) rsargs[] parameter in a mailbox Drafts action to the default URI.,2011-11-30,Metasploit,cpe:2.3:a:hastymail:hastymail2:*:beta1:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:*:beta2:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:*:beta3:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:*:rc1:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:*:rc2:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:*:rc3:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:*:rc4:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:*:rc5:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:*:rc6:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:*:rc7:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:*:rc8:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:*:rc9:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:1.01:*:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:1.0:*:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:1.1:rc1:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:1.1:rc2:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:2.0:*:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:2.0:a1:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:2.0:a2:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:2.0:b1:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:2.0:b2:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:2.0:b3:*:*:*:*:*:*;cpe:2.3:a:hastymail:hastymail2:2.0:rc1:*:*:*:*:*:* CVE-2011-4618,0.0,,0.04723,Cross-site scripting (XSS) vulnerability in advancedtext.php in Advanced Text Widget plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter.,2013-01-24,Nuclei,cpe:2.3:a:simplerealtytheme:advanced_text_widget_plugin:*:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2011-4624,0.0,,0.05988,Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.,2014-10-01,Nuclei,cpe:2.3:a:codeasily:grand_flagallery:*:*:*:*:*:wordpress:*:* CVE-2011-4640,0.0,,0.27508,Directory traversal vulnerability in logs-x.php in SpamTitan WebTitan before 3.60 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the fname parameter in a view action.,2012-10-08,Nuclei,cpe:2.3:a:spamtitan:webtitan:*:*:*:*:*:*:*:* CVE-2011-4642,0.0,,0.1923,"mappy.py in Splunk Web in Splunk 4.2.x before 4.2.5 does not properly restrict use of the mappy command to access Python classes, which allows remote authenticated administrators to execute arbitrary code by leveraging the sys module in a request to the search application, as demonstrated by a cross-site request forgery (CSRF) attack, aka SPL-45172.",2012-01-03,Metasploit,cpe:2.3:a:splunk:splunk:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:splunk:splunk:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:splunk:splunk:4.2.3:*:*:*:*:*:*:*;cpe:2.3:a:splunk:splunk:4.2.4:*:*:*:*:*:*:*;cpe:2.3:a:splunk:splunk:4.2:*:*:*:*:*:*:* CVE-2011-4722,0.0,,0.18741,Directory traversal vulnerability in the TFTP Server 1.0.0.24 in Ipswitch WhatsUp Gold allows remote attackers to read arbitrary files via a .. (dot dot) in the Filename field of an RRQ operation.,2014-12-28,Metasploit,cpe:2.3:a:ipswitch:tftp_server:1.0.0.24:*:*:*:*:*:*:* CVE-2011-4723,5.7,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,0.08337,"The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information via unspecified vectors.",2011-12-20,CISA,cpe:2.3:h:dlink:dir-300:*:*:*:*:*:*:*:* CVE-2011-4786,0.0,,0.6444,"A certain ActiveX control in HPTicketMgr.dll in HP Easy Printer Care Software 2.5 and earlier allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via unspecified vectors, a different vulnerability than CVE-2011-2404 and CVE-2011-4787.",2012-01-12,Metasploit,cpe:2.3:a:hp:easy_printer_care_software:*:*:*:*:*:*:*:* CVE-2011-4789,0.0,,0.79608,"Stack-based buffer overflow in magentservice.exe in the server in HP LoadRunner 11.00 before patch 4 allows remote attackers to execute arbitrary code via a crafted size value in a packet. NOTE: it was originally reported that the affected product is HP Diagnostics Server, but HP states that ""the vulnerable product is actually HP LoadRunner.""",2012-01-13,Metasploit,cpe:2.3:a:hp:diagnostics:*:*:*:*:*:*:*:* CVE-2011-4804,0.0,,0.20131,Directory traversal vulnerability in the obSuggest (com_obsuggest) component before 1.8 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.,2011-12-14,Nuclei,cpe:2.3:a:foobla:com_obsuggest:*:*:*:*:*:*:*:*;cpe:2.3:a:foobla:com_obsuggest:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:foobla:com_obsuggest:1.5.1.1.20090922:*:*:*:*:*:*:*;cpe:2.3:a:foobla:com_obsuggest:1.5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:foobla:com_obsuggest:1.5.1.4:*:*:*:*:*:*:*;cpe:2.3:a:foobla:com_obsuggest:1.5.1.5:*:*:*:*:*:*:*;cpe:2.3:a:foobla:com_obsuggest:1.5.1.6:*:*:*:*:*:*:*;cpe:2.3:a:foobla:com_obsuggest:1.5.1.7:*:*:*:*:*:*:*;cpe:2.3:a:foobla:com_obsuggest:1.6.1:b7:*:*:*:*:*:*;cpe:2.3:a:foobla:com_obsuggest:1.6.1:b8:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2011-4825,0.0,,0.83036,"Static code injection vulnerability in inc/function.base.php in Ajax File and Image Manager before 1.1, as used in tinymce before 1.4.2, phpMyFAQ 2.6 before 2.6.19 and 2.7 before 2.7.1, and possibly other products, allows remote attackers to inject arbitrary PHP code into data.php via crafted parameters.",2011-12-15,Metasploit,cpe:2.3:a:phpletter:ajax_file_and_image_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.5.5:*:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.5.7:*:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.5:*:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.6.12:*:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.6:*:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.7.10:*:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.7.8:*:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.8.24:*:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.8.8:*:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.8.9:*:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.8:*:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.9:*:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:1.0:beta1:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:1.0:beta2:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:1.0:rc1:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:1.0:rc2:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:1.0:rc3:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:1.0:rc4:*:*:*:*:*:*;cpe:2.3:a:phpletter:ajax_file_and_image_manager:1.0:rc5:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.0:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.10:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.11:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.12:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.13:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.14:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.15:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.16:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.17:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.18:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.2:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.3:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.4:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.5:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.6:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.7:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.8:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.6.9:*:*:*:*:*:*:*;cpe:2.3:a:phpmyfaq:phpmyfaq:2.7.0:*:*:*:*:*:*:*;cpe:2.3:a:tinymce:tinymce:*:*:*:*:*:*:*:* CVE-2011-4828,0.0,,0.81217,"Unrestricted file upload vulnerability in includes/inline_image_upload.php in AutoSec Tools V-CMS 1.0 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in temp/.",2011-12-15,Metasploit,cpe:2.3:a:autosectools:v-cms:1.0:*:*:*:*:*:*:* CVE-2011-4858,0.0,,0.73855,"Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.",2012-01-05,Metasploit,cpe:2.3:a:apache:tomcat:5.5.35:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.34:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:* CVE-2011-4862,0.0,,0.92409,"Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.",2011-12-25,Metasploit,cpe:2.3:a:gnu:inetutils:*:*:*:*:*:*:*:*;cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*;cpe:2.3:a:mit:krb5-appl:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:-:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:* CVE-2011-4885,0.0,,0.88576,"PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.",2011-12-30,Metasploit,cpe:2.3:a:php:php:*:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*;cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*;cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*;cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*;cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*;cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*;cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*;cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.15:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.16:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.17:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:* CVE-2011-4908,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.61853,TinyBrowser plugin for Joomla! before 1.5.13 allows arbitrary file upload via upload.php.,2020-02-12,Metasploit,cpe:2.3:a:tiny:tinybrowser:*:*:*:*:*:joomla\!:*:* CVE-2011-4926,0.0,,0.03165,Cross-site scripting (XSS) vulnerability in adminimize/adminimize_page.php in the Adminimize plugin before 1.7.22 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter.,2012-08-29,Nuclei,cpe:2.3:a:bueltge:adminimize:*:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:0.6.9:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:0.7.1:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:0.7.2:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:0.7.3:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:0.7.5:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:0.7.6:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:0.7.7:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:0.7.8:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:0.7.9:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:0.7:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:0.8.1:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:0.8:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.0:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.1:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.2:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.3:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.4.3-6:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.4.7:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.4:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.5.3-8:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.5:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.6.1:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.6.3:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.6.4:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.6.5:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.6.6-7:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.6.8:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.6.9:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.10:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.11:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.12:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.13:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.14:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.15:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.16:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.17:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.18:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.19:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.20:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.3:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.4:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.5:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.6:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.7:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.8:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7.9:*:*:*:*:*:*:*;cpe:2.3:a:bueltge:adminimize:1.7:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2011-4929,0.0,,0.73607,Unspecified vulnerability in the bazaar repository adapter in Redmine 0.9.x and 1.0.x before 1.0.5 allows remote attackers to execute arbitrary commands via unknown vectors.,2012-10-08,Metasploit,cpe:2.3:a:redmine:redmine:0.9.0:*:*:*:*:*:*:*;cpe:2.3:a:redmine:redmine:0.9.1:*:*:*:*:*:*:*;cpe:2.3:a:redmine:redmine:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:redmine:redmine:0.9.3:*:*:*:*:*:*:*;cpe:2.3:a:redmine:redmine:0.9.4:*:*:*:*:*:*:*;cpe:2.3:a:redmine:redmine:0.9.5:*:*:*:*:*:*:*;cpe:2.3:a:redmine:redmine:0.9.6:*:*:*:*:*:*:*;cpe:2.3:a:redmine:redmine:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:redmine:redmine:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:redmine:redmine:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:redmine:redmine:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:redmine:redmine:1.0.4:*:*:*:*:*:*:* CVE-2011-4971,0.0,,0.53158,"Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet.",2013-12-12,Metasploit,cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*;cpe:2.3:a:memcached:memcached:1.2.7:*:*:*:*:*:*:*;cpe:2.3:a:memcached:memcached:1.2.8:*:*:*:*:*:*:*;cpe:2.3:a:memcached:memcached:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:memcached:memcached:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:memcached:memcached:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:memcached:memcached:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:memcached:memcached:1.4.4:*:*:*:*:*:*:* CVE-2011-5001,0.0,,0.74706,Stack-based buffer overflow in the CGenericScheduler::AddTask function in cmdHandlerRedAlertController.dll in CmdProcessor.exe in Trend Micro Control Manager 5.5 before Build 1613 allows remote attackers to execute arbitrary code via a crafted IPC packet to TCP port 20101.,2011-12-25,Metasploit,cpe:2.3:a:trend_micro:control_manager:*:*:*:*:*:*:*:* CVE-2011-5003,0.0,,0.74706,Stack-based buffer overflow in the Phonetic Indexer (AvidPhoneticIndexer.exe) in Avid Media Composer 5.5.3 and earlier allows remote attackers to execute arbitrary code via a long request to TCP port 4659.,2011-12-25,Metasploit,cpe:2.3:a:avid:media_composer:*:*:*:*:*:*:*:* CVE-2011-5007,0.0,,0.81576,"Stack-based buffer overflow in the CmpWebServer component in 3S CoDeSys 3.4 SP4 Patch 2 and earlier, as used on the ABB AC500 PLC and possibly other products, allows remote attackers to execute arbitrary code via a long URI to TCP port 8080.",2011-12-25,Metasploit,cpe:2.3:a:3ssoftware:codesys:*:sp4:*:*:*:*:*:* CVE-2011-5010,0.0,,0.84461,"apps/a3/cfg_ethping.cgi in the Ctek SkyRouter 4200 and 4300 allows remote attackers to execute arbitrary commands via shell metacharacters in the PINGADDRESS parameter for a ""u"" action.",2011-12-25,Metasploit,cpe:2.3:h:ctekproducts:skyrouter:4200:*:*:*:*:*:*:*;cpe:2.3:h:ctekproducts:skyrouter:4300:*:*:*:*:*:*:* CVE-2011-5034,0.0,,0.66459,"Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.",2011-12-30,Metasploit,cpe:2.3:a:apache:geronimo:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:2.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:2.1.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:2.1.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:2.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:geronimo:2.2:*:*:*:*:*:*:* CVE-2011-5035,0.0,,0.52412,"Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.",2011-12-30,Metasploit,cpe:2.3:a:oracle:glassfish_server:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:*:*:*:* CVE-2011-5052,0.0,,0.52628,Stack-based buffer overflow in CoCSoft Stream Down 6.8.0 allows remote web servers to execute arbitrary code via a long response to a download request.,2012-01-04,Metasploit,cpe:2.3:a:cocsoft:stream_down:6.8:*:*:*:*:*:*:* CVE-2011-5106,0.0,,0.02815,Cross-site scripting (XSS) vulnerability in edit-post.php in the Flexible Custom Post Type plugin before 0.1.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter.,2012-08-23,Nuclei,cpe:2.3:a:fractalia:flexible_custom_post_type:0.1.3:*:*:*:*:*:*:*;cpe:2.3:a:fractalia:flexible_custom_post_type:0.1.4:*:*:*:*:*:*:*;cpe:2.3:a:fractalia:flexible_custom_post_type:0.1.5:*:*:*:*:*:*:*;cpe:2.3:a:fractalia:flexible_custom_post_type:0.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2011-5107,0.0,,0.02203,"Cross-site scripting (XSS) vulnerability in post_alert.php in Alert Before Your Post plugin, possibly 0.1.1 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the name parameter.",2012-08-23,Nuclei,cpe:2.3:a:wordpress:alert_before_you_post:*:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2011-5124,0.0,,0.70248,"Stack-based buffer overflow in the BCAAA component before build 60258, as used by Blue Coat ProxySG 4.2.3 through 6.1 and ProxyOne, allows remote attackers to execute arbitrary code via a large packet to the synchronization port (16102/tcp).",2012-08-26,Metasploit,cpe:2.3:a:bluecoat:proxyone:*:*:*:*:*:*:*:*;cpe:2.3:a:bluecoat:proxysg:4.2.6:*:*:*:*:*:*:*;cpe:2.3:a:bluecoat:proxysg:4.3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:bluecoat:proxysg:5.1.6.1:*:*:*:*:*:*:*;cpe:2.3:a:bluecoat:proxysg:5.1:*:*:*:*:*:*:*;cpe:2.3:a:bluecoat:proxysg:5.2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:bluecoat:proxysg:5.2.5.2:*:*:*:*:*:*:*;cpe:2.3:a:bluecoat:proxysg:5.2:*:*:*:*:*:*:*;cpe:2.3:a:bluecoat:proxysg:5.3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:bluecoat:proxysg:5.3:*:*:*:*:*:*:*;cpe:2.3:a:bluecoat:proxysg:5.4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:bluecoat:proxysg:5.4:*:*:*:*:*:*:*;cpe:2.3:h:bluecoat:proxysg:6:*:*:*:*:*:*:* CVE-2011-5130,0.0,,0.74506,"dev/less.php in Family Connections CMS (FCMS) 2.5.0 - 2.7.1, when register_globals is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in the argv[1] parameter.",2012-08-30,Metasploit,cpe:2.3:a:haudenschilt:family_connections_cms:2.5.0:*:*:*:*:*:*:*;cpe:2.3:a:haudenschilt:family_connections_cms:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:haudenschilt:family_connections_cms:2.5.2:*:*:*:*:*:*:*;cpe:2.3:a:haudenschilt:family_connections_cms:2.5.3:*:*:*:*:*:*:*;cpe:2.3:a:haudenschilt:family_connections_cms:2.5.4:*:*:*:*:*:*:*;cpe:2.3:a:haudenschilt:family_connections_cms:2.6.0:*:*:*:*:*:*:*;cpe:2.3:a:haudenschilt:family_connections_cms:2.7.0:*:*:*:*:*:*:*;cpe:2.3:a:haudenschilt:family_connections_cms:2.7.1:*:*:*:*:*:*:* CVE-2011-5164,0.0,,0.55543,Stack-based buffer overflow in VanDyke Software AbsoluteFTP 1.9.6 through 2.2.10 allows remote FTP servers to execute arbitrary code via a crafted file name in a LIST command response.,2012-09-15,Metasploit,cpe:2.3:a:vandyke:absoluteftp:1.9.6:*:*:*:*:*:*:*;cpe:2.3:a:vandyke:absoluteftp:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:vandyke:absoluteftp:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:vandyke:absoluteftp:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:vandyke:absoluteftp:2.2.10:*:*:*:*:*:*:*;cpe:2.3:a:vandyke:absoluteftp:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:vandyke:absoluteftp:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:vandyke:absoluteftp:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:vandyke:absoluteftp:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:vandyke:absoluteftp:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:vandyke:absoluteftp:2.2.6:*:*:*:*:*:*:*;cpe:2.3:a:vandyke:absoluteftp:2.2.7:*:*:*:*:*:*:*;cpe:2.3:a:vandyke:absoluteftp:2.2.8:*:*:*:*:*:*:*;cpe:2.3:a:vandyke:absoluteftp:2.2.9:*:*:*:*:*:*:* CVE-2011-5165,0.0,,0.76441,"Stack-based buffer overflow in Free MP3 CD Ripper 1.1, 2.6 and earlier, when converting a file, allows user-assisted remote attackers to execute arbitrary code via a crafted .wav file.",2012-09-15,Metasploit,cpe:2.3:a:cleanersoft:free_mp3_cd_ripper:*:*:*:*:*:*:*:*;cpe:2.3:a:cleanersoft:free_mp3_cd_ripper:1.1:*:*:*:*:*:*:*;cpe:2.3:a:cleanersoft:free_mp3_cd_ripper:2.5:*:*:*:*:*:*:* CVE-2011-5170,0.0,,0.6559,Stack-based buffer overflow in Castillo Bueno Systems CCMPlayer 1.5 allows remote attackers to execute arbitrary code via a long track name in an m3u playlist.,2012-09-15,Metasploit,cpe:2.3:a:castillobueno:ccmplayer:1.5:*:*:*:*:*:*:* CVE-2011-5171,0.0,,0.59811,Multiple stack-based buffer overflows in CyberLink Power2Go 7 (build 196) and 8 (build 1031) allow remote attackers to execute arbitrary code via the (1) src and (2) name parameters in a p2g project file.,2012-09-15,Metasploit,cpe:2.3:a:cyberlink:power2go:7.0:*:*:*:*:*:*:*;cpe:2.3:a:cyberlink:power2go:8.0:*:*:*:*:*:*:* CVE-2011-5179,0.0,,0.02203,"Cross-site scripting (XSS) vulnerability in skysa-official/skysa.php in Skysa App Bar Integration plugin, possibly before 1.04, for WordPress allows remote attackers to inject arbitrary web script or HTML via the submit parameter.",2012-09-20,Nuclei,cpe:2.3:a:skysa:skysa_app_bar_integration_plugin:*:*:*:*:*:*:*:*;cpe:2.3:a:skysa:skysa_app_bar_integration_plugin:1.01:*:*:*:*:*:*:*;cpe:2.3:a:skysa:skysa_app_bar_integration_plugin:1.02:*:*:*:*:*:*:*;cpe:2.3:a:skysa:skysa_app_bar_integration_plugin:1.0:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2011-5181,0.0,,0.01422,Cross-site scripting (XSS) vulnerability in clickdesk.php in ClickDesk Live Support - Live Chat plugin 2.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cdwidgetid parameter. NOTE: some of these details are obtained from third party information.,2012-09-20,Nuclei,cpe:2.3:a:clickdesk:clickdesk_live_support-live_chat_plugin:2.0:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2011-5227,0.0,,0.77999,Stack-based buffer overflow in the Syslog service (nssyslogd.exe) in Enterasys Network Management Suite (NMS) before 4.1.0.80 allows remote attackers to execute arbitrary code via a long PRIO field in a message to UDP port 514.,2012-10-25,Metasploit,cpe:2.3:a:enterasys:netsight:*:*:*:*:*:*:*:*;cpe:2.3:h:enterasys:netsight:*:*:*:*:*:*:*:* CVE-2011-5252,0.0,,0.26961,"Open redirect vulnerability in Users/Account/LogOff in Orchard 1.0.x before 1.0.21, 1.1.x before 1.1.31, 1.2.x before 1.2.42, and 1.3.x before 1.3.10 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the ReturnUrl parameter.",2013-01-12,Nuclei,cpe:2.3:a:orchardproject:orchard:1.0.20:*:*:*:*:*:*:*;cpe:2.3:a:orchardproject:orchard:1.0:*:*:*:*:*:*:*;cpe:2.3:a:orchardproject:orchard:1.1.30:*:*:*:*:*:*:*;cpe:2.3:a:orchardproject:orchard:1.1:*:*:*:*:*:*:*;cpe:2.3:a:orchardproject:orchard:1.2.41:*:*:*:*:*:*:*;cpe:2.3:a:orchardproject:orchard:1.2:*:*:*:*:*:*:*;cpe:2.3:a:orchardproject:orchard:1.3.10:*:*:*:*:*:*:*;cpe:2.3:a:orchardproject:orchard:1.3.9:*:*:*:*:*:*:*;cpe:2.3:a:orchardproject:orchard:1.3:*:*:*:*:*:*:* CVE-2011-5265,0.0,,0.06376,Cross-site scripting (XSS) vulnerability in cached_image.php in the Featurific For WordPress plugin 1.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the snum parameter. NOTE: this has been disputed by a third party.,2013-02-12,Nuclei,cpe:2.3:a:featurific_for_wordpress_project:featurific-for-wordpress:1.6.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2012-0002,0.0,,0.8547,"The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, aka ""Remote Desktop Protocol Vulnerability.""",2012-03-13,Metasploit,cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2012-0003,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.87848,"Unspecified vulnerability in winmm.dll in Windows Multimedia Library in Windows Media Player (WMP) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows remote attackers to execute arbitrary code via a crafted MIDI file, aka ""MIDI Remote Code Execution Vulnerability.""",2012-01-10,Metasploit,cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:2005:sp3:media_center:*:*:*:*:* CVE-2012-0013,0.0,,0.87034,"Incomplete blacklist vulnerability in the Windows Packager configuration in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted ClickOnce application in a Microsoft Office document, related to .application files, aka ""Assembly Execution Vulnerability.""",2012-01-10,Metasploit,cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* CVE-2012-0124,0.0,,0.75005,Unspecified vulnerability in HP Data Protector Express (aka DPX) 5.0.00 before build 59287 and 6.0.00 before build 11974 allows remote attackers to execute arbitrary code or cause a denial of service via unknown vectors.,2012-03-14,Metasploit,cpe:2.3:a:hp:data_protector_express:5.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:data_protector_express:6.0:*:*:*:*:*:*:* CVE-2012-0151,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.88659,"The Authenticode Signature Verification function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute arbitrary code via a modified file with additional content, aka ""WinVerifyTrust Signature Validation Vulnerability.""",2012-04-10,CISA,cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2012-0158,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.94314,"The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers ""system state"" corruption, as exploited in the wild in April 2012, aka ""MSCOMCTL.OCX RCE Vulnerability.""",2012-04-10,Metasploit/CISA,cpe:2.3:a:microsoft:biztalk_server:2002:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:commerce_server:2002:sp4:*:*:*:*:*:*;cpe:2.3:a:microsoft:commerce_server:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:commerce_server_2009:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:commerce_server_2009:r2:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2010:*:*:*:*:*:x86:*;cpe:2.3:a:microsoft:office:2010:sp1:*:*:*:*:x86:*;cpe:2.3:a:microsoft:office_web_components:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server_2005:-:sp4:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server_2008:-:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server_2008:r2:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_basic:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_foxpro:8.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_foxpro:9.0:sp2:*:*:*:*:*:* CVE-2012-0198,0.0,,0.68443,Stack-based buffer overflow in the RunAndUploadFile method in the Isig.isigCtl.1 ActiveX control in IBM Tivoli Provisioning Manager Express for Software Distribution 4.1.1 allows remote attackers to execute arbitrary code via vectors related to an Asset Information file.,2012-03-06,Metasploit,cpe:2.3:a:ibm:tivoli_provisioning_manager_express_for_software_distribution:4.1.1:*:*:*:*:*:*:* CVE-2012-0201,0.0,,0.76345,Stack-based buffer overflow in pcspref.dll in pcsws.exe in IBM Personal Communications 5.9.x before 5.9.8 and 6.0.x before 6.0.4 might allow remote attackers to execute arbitrary code via a long profile string in a WorkStation (aka .ws) file.,2012-03-02,Metasploit,cpe:2.3:a:ibm:personal_communications:5.9.7.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:personal_communications:5.9.7.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:personal_communications:6.0.3.0:*:*:*:*:*:*:* CVE-2012-0202,0.0,,0.74106,Multiple stack-based buffer overflows in tm1admsd.exe in the Admin Server in IBM Cognos TM1 9.4.x and 9.5.x before 9.5.2 FP2 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted data.,2012-05-04,Metasploit,cpe:2.3:a:ibm:cognos_tm1:9.4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:cognos_tm1:9.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:cognos_tm1:9.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:cognos_tm1:9.5.2:*:*:*:*:*:*:* CVE-2012-0209,0.0,,0.64772,"Horde 3.3.12, Horde Groupware 1.2.10, and Horde Groupware Webmail Edition 1.2.10, as distributed by FTP between November 2011 and February 2012, contains an externally introduced modification (Trojan Horse) in templates/javascript/open_calendar.js, which allows remote attackers to execute arbitrary PHP code.",2012-09-25,Metasploit,cpe:2.3:a:horde:groupware:1.2.10:*:*:*:*:*:*:*;cpe:2.3:a:horde:groupware:1.2.10:*:webmail:*:*:*:*:*;cpe:2.3:a:horde:horde:3.3.12:*:*:*:*:*:*:* CVE-2012-0217,0.0,,0.86536,"The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.",2012-06-12,Metasploit,cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*;cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*;cpe:2.3:o:illumos:illumos:*:*:*:*:*:*:*:*;cpe:2.3:o:joyent:smartos:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:*:beta:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*;cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*;cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*;cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*;cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*;cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*;cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*;cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*;cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:* CVE-2012-0261,0.0,,0.86451,license.php in system-portal before 1.6.2 in op5 Monitor and op5 Appliance before 5.5.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the timestamp parameter for an install action.,2013-12-31,Metasploit,cpe:2.3:a:op5:monitor:*:*:*:*:*:*:*:*;cpe:2.3:a:op5:monitor:5.3.5:*:*:*:*:*:*:*;cpe:2.3:a:op5:monitor:5.4.0:*:*:*:*:*:*:*;cpe:2.3:a:op5:monitor:5.4.2:*:*:*:*:*:*:*;cpe:2.3:a:op5:monitor:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:op5:system-portal:*:*:*:*:*:*:*:* CVE-2012-0262,0.0,,0.91146,op5config/welcome in system-op5config before 2.0.3 in op5 Monitor and op5 Appliance before 5.5.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the password parameter.,2013-12-31,Metasploit,cpe:2.3:a:op5:monitor:*:*:*:*:*:*:*:*;cpe:2.3:a:op5:monitor:5.3.5:*:*:*:*:*:*:*;cpe:2.3:a:op5:monitor:5.4.0:*:*:*:*:*:*:*;cpe:2.3:a:op5:monitor:5.4.2:*:*:*:*:*:*:*;cpe:2.3:a:op5:monitor:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:op5:system-op5config:*:*:*:*:*:*:*:* CVE-2012-0266,0.0,,0.73656,"Multiple stack-based buffer overflows in the NTR ActiveX control before 2.0.4.8 allow remote attackers to execute arbitrary code via (1) a long bstrUrl parameter to the StartModule method, (2) a long bstrParams parameter to the Check method, a long bstrUrl parameter to the (3) Download or (4) DownloadModule method during construction of a .ntr pathname, or a long bstrUrl parameter to the (5) Download or (6) DownloadModule method during construction of a URL.",2012-01-15,Metasploit,cpe:2.3:a:ntrglobal:ntr_activex_control:*:*:*:*:*:*:*:* CVE-2012-0267,0.0,,0.73275,The StopModule method in the NTR ActiveX control before 2.0.4.8 allows remote attackers to execute arbitrary code via a crafted lModule parameter that triggers use of an arbitrary memory address as a function pointer.,2012-01-15,Metasploit,cpe:2.3:a:ntrglobal:ntr_activex_control:*:*:*:*:*:*:*:* CVE-2012-0270,0.0,,0.75449,Multiple stack-based buffer overflows in Csound before 5.16.6 allow remote attackers to execute arbitrary code via a crafted (1) hetro file to the getnum function in util/heti_main.c or (2) PVOC file to the getnum function in util/pv_import.c.,2014-02-17,Metasploit,cpe:2.3:a:csounds:csound:*:*:*:*:*:*:*:*;cpe:2.3:a:csounds:csound:5.12.4:*:*:*:*:*:*:*;cpe:2.3:a:csounds:csound:5.13.0:*:*:*:*:*:*:*;cpe:2.3:a:csounds:csound:5.13.1:*:*:*:*:*:*:*;cpe:2.3:a:csounds:csound:5.14.0:*:*:*:*:*:*:*;cpe:2.3:a:csounds:csound:5.14.1:*:*:*:*:*:*:*;cpe:2.3:a:csounds:csound:5.14.2:*:*:*:*:*:*:*;cpe:2.3:a:csounds:csound:5.15.0:*:*:*:*:*:*:*;cpe:2.3:a:csounds:csound:5.16:*:*:*:*:*:*:* CVE-2012-0284,0.0,,0.6745,Stack-based buffer overflow in the SetSource method in the Cisco Linksys PlayerPT ActiveX control 1.0.0.15 in PlayerPT.ocx on the Cisco WVC200 Wireless-G PTZ Internet video camera allows remote attackers to execute arbitrary code via a long URL in the first argument (aka the sURL argument).,2012-07-19,Metasploit,cpe:2.3:a:cisco:linksys_playerpt_activex_control:1.0.0.15:*:*:*:*:*:*:*;cpe:2.3:h:cisco:wvc200_wireless-g_ptz_internet_video_camera:*:*:*:*:*:*:*:* CVE-2012-0297,0.0,,0.89461,"The management GUI in Symantec Web Gateway 5.0.x before 5.0.3 does not properly restrict access to application scripts, which allows remote attackers to execute arbitrary code by (1) injecting crafted data or (2) including crafted data.",2012-05-21,Metasploit,cpe:2.3:a:symantec:web_gateway:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec:web_gateway:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec:web_gateway:5.0:*:*:*:*:*:*:* CVE-2012-0299,0.0,,0.8227,"The file-management scripts in the management GUI in Symantec Web Gateway 5.0.x before 5.0.3 allow remote attackers to upload arbitrary code to a designated pathname, and possibly execute this code, via unspecified vectors.",2012-05-21,Metasploit,cpe:2.3:a:symantec:web_gateway:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec:web_gateway:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec:web_gateway:5.0:*:*:*:*:*:*:* CVE-2012-0391,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.90877,"The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter.",2012-01-08,Metasploit/CISA,cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* CVE-2012-0392,0.0,,0.91467,"The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method.",2012-01-08,Nuclei,cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* CVE-2012-0394,0.0,,0.93567,"The DebuggingInterceptor component in Apache Struts before 2.3.1.1, when developer mode is used, allows remote attackers to execute arbitrary commands via unspecified vectors. NOTE: the vendor characterizes this behavior as not ""a security vulnerability itself.",2012-01-08,Metasploit/Nuclei,cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* CVE-2012-0419,0.0,,0.78808,Directory traversal vulnerability in the agent HTTP interfaces in Novell GroupWise 8.0 before Support Pack 3 and 2012 before Support Pack 1 allows remote attackers to read arbitrary files via directory traversal sequences in a request.,2012-09-28,Metasploit,cpe:2.3:a:novell:groupwise:2012:*:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.00:hp1:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.00:hp2:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.00:hp3:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.01:*:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.01:hp:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.02:*:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.02:hp1:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.02:hp2:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.02:hp3:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.0:*:*:*:*:*:*:* CVE-2012-0432,0.0,,0.85177,Stack-based buffer overflow in the Novell NCP implementation in NetIQ eDirectory 8.8.7.x before 8.8.7.2 allows remote attackers to have an unspecified impact via unknown vectors.,2012-12-25,Metasploit,cpe:2.3:a:microfocus:edirectory:8.8.7.0:*:*:*:*:*:*:*;cpe:2.3:a:microfocus:edirectory:8.8.7.1:*:*:*:*:*:*:* CVE-2012-0439,0.0,,0.68302,An ActiveX control in gwcls1.dll in the client in Novell GroupWise 8.0 before 8.0.3 HP2 and 2012 before SP1 HP1 allows remote attackers to execute arbitrary code via (1) a pointer argument to the SetEngine method or (2) an XPItem pointer argument to an unspecified method.,2013-02-24,Metasploit,cpe:2.3:a:novell:groupwise:2012:*:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:2012:sp1:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.00:hp1:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.00:hp2:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.00:hp3:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.01:*:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.01:hp:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.02:*:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.02:hp1:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.02:hp2:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.02:hp3:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.03:*:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.03:hp1:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise:8.0:*:*:*:*:*:*:* CVE-2012-0500,0.0,,0.74853,"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and JavaFX 2.0.2 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",2012-02-15,Metasploit,cpe:2.3:a:oracle:javafx:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:javafx:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:javafx:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:javafx:1.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:javafx:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:javafx:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:javafx:2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:update30:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:* CVE-2012-0507,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9378,"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.",2012-06-07,Metasploit/CISA,cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:-:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:-:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_java:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:* CVE-2012-0518,4.7,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N,0.24098,"Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware 10.1.4.3.0 allows remote attackers to affect integrity via unknown vectors related to Redirects, a different vulnerability than CVE-2012-3175.",2012-10-16,CISA,cpe:2.3:a:oracle:fusion_middleware:10.1.4.3:*:*:*:*:*:*:* CVE-2012-0549,0.0,,0.8507,"Unspecified vulnerability in the Oracle AutoVue Office component in Oracle Supply Chain Products Suite 20.1.1 allows remote attackers to affect confidentiality, integrity, and availability, related to Desktop API.",2012-05-03,Metasploit,cpe:2.3:a:oracle:supply_chain_products_suite:20.1.1:*:*:*:*:*:*:* CVE-2012-0663,0.0,,0.74043,Multiple stack-based buffer overflows in Apple QuickTime before 7.7.2 on Windows allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TeXML file.,2012-05-16,Metasploit,cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.7:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.8:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.9:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.60.92.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.62.14.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.64.17.73:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.65.17.80:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.66.71.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.67.75.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.68.75.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.69.80.9:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.7.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2012-0694,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.83749,"SugarCRM CE <= 6.3.1 contains scripts that use ""unserialize()"" with user controlled input which allows remote attackers to execute arbitrary PHP code.",2019-10-29,Metasploit,cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:community:*:*:* CVE-2012-0708,0.0,,0.66566,"Heap-based buffer overflow in the Ole API in the CQOle ActiveX control in cqole.dll in IBM Rational ClearQuest 7.1.1 before 7.1.1.9, 7.1.2 before 7.1.2.6, and 8.0.0 before 8.0.0.2 allows remote attackers to execute arbitrary code via a crafted web page that leverages a RegisterSchemaRepoFromFileByDbSet function-prototype mismatch.",2012-04-22,Metasploit,cpe:2.3:a:ibm:rational_clearquest:7.1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:rational_clearquest:7.1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:rational_clearquest:7.1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:rational_clearquest:7.1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:rational_clearquest:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:rational_clearquest:7.1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:rational_clearquest:7.1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:rational_clearquest:7.1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:rational_clearquest:7.1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:rational_clearquest:7.1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:rational_clearquest:7.1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:rational_clearquest:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:rational_clearquest:8.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:rational_clearquest:8.0.0:*:*:*:*:*:*:* CVE-2012-0754,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93101,"Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.",2012-02-16,Metasploit/CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:* CVE-2012-0767,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.16382,"Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka ""Universal XSS (UXSS),"" as exploited in the wild in February 2012.",2012-02-16,CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:* CVE-2012-0779,0.0,,0.90067,"Adobe Flash Player before 10.3.183.19 and 11.x before 11.2.202.235 on Windows, Mac OS X, and Linux; before 11.1.111.9 on Android 2.x and 3.x; and before 11.1.115.8 on Android 4.x allows remote attackers to execute arbitrary code via a crafted file, related to an ""object confusion vulnerability,"" as exploited in the wild in May 2012.",2012-05-04,Metasploit,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2012-0896,0.0,,0.04929,Absolute path traversal vulnerability in download.php in the Count Per Day module before 3.1.1 for WordPress allows remote attackers to read arbitrary files via the f parameter.,2012-01-20,Nuclei,cpe:2.3:a:count_per_day_project:count_per_day:2.15.1:*:*:*:*:*:*:*;cpe:2.3:a:count_per_day_project:count_per_day:2.15:*:*:*:*:*:*:*;cpe:2.3:a:count_per_day_project:count_per_day:2.16:*:*:*:*:*:*:*;cpe:2.3:a:count_per_day_project:count_per_day:2.2:*:*:*:*:*:*:*;cpe:2.3:a:tom_braider:count_per_day:*:*:*:*:*:*:*:*;cpe:2.3:a:tom_braider:count_per_day:1.0:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* CVE-2012-0897,0.0,,0.67088,Stack-based buffer overflow in the JPEG2000 plugin in IrfanView PlugIns before 4.33 allows remote attackers to execute arbitrary code via a JPEG2000 (JP2) file with a crafted Quantization Default (QCD) marker segment.,2012-01-20,Metasploit,cpe:2.3:a:irfanview:irfanview:*:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:1.70:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:1.75:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:1.80:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:1.85:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:1.90:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:1.95:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:1.97:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:1.98:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:1.98a:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:1.99:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.00:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.05:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.07:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.10:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.12:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.15:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.17:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.18:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.20:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.22:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.25:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.27:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.30:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.32:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.35:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.37:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.40:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.50:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.52:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.55:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.60:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.62:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.63:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.65:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.66:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.68:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.80:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.82:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.83:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.85:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.90:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.92:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.95:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.97:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:2.98:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.00:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.02:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.05:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.07:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.10:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.12:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.15:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.17:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.20:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.21:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.25:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.30:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.33:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.35:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.36:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.50:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.51:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.60:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.61:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.70:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.75:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.80:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.85:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.90:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.91:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.92:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.95:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.97:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.98:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:3.99:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:4.00:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:4.10:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:4.20:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:4.22:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:4.23:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:4.25:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:4.27:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:4.28:*:*:*:*:*:*:*;cpe:2.3:a:irfanview:irfanview:4.30:*:*:*:*:*:*:* CVE-2012-0901,0.0,,0.00686,Cross-site scripting (XSS) vulnerability in yousaytoo.php in YouSayToo auto-publishing plugin 1.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the submit parameter.,2012-01-20,Nuclei,cpe:2.3:a:attenzione:yousaytoo:1.0:*:*:*:*:*:*:* CVE-2012-0911,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.77945,"TikiWiki CMS/Groupware before 6.7 LTS and before 8.4 allows remote attackers to execute arbitrary PHP code via a crafted serialized object in the (1) cookieName to lib/banners/bannerlib.php; (2) printpages or (3) printstructures parameter to (a) tiki-print_multi_pages.php or (b) tiki-print_pages.php; or (4) sendpages, (5) sendstructures, or (6) sendarticles parameter to tiki-send_objects.php, which is not properly handled when processed by the unserialize function.",2012-07-12,Metasploit,cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:-:*:*:*;cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:lts:*:*:* CVE-2012-0938,0.0,,0.29424,"Multiple SQL injection vulnerabilities in TestLink 1.9.3, 1.8.5b, and earlier allow remote authenticated users with certain permissions to execute arbitrary SQL commands via the root_node parameter in the display_children function to (1) getrequirementnodes.php or (2) gettprojectnodes.php in lib/ajax/; the (3) cfield_id parameter in an edit action to lib/cfields/cfieldsEdit.php; the (4) id parameter in an edit action or (5) plan_id parameter in a create action to lib/plan/planMilestonesEdit.php; or the req_spec_id parameter to (6) reqImport.php or (7) in a create action to reqEdit.php in lib/requirements/. NOTE: some of these details are obtained from third party information.",2014-08-14,Metasploit,cpe:2.3:a:testlink:testlink:1.8.5b:*:*:*:*:*:*:*;cpe:2.3:a:testlink:testlink:1.9.3:*:*:*:*:*:*:* CVE-2012-0981,0.0,,0.11483,Directory traversal vulnerability in phpShowtime 2.0 allows remote attackers to list arbitrary directories and image files via a .. (dot dot) in the r parameter to index.php. NOTE: Some of these details are obtained from third party information.,2012-02-02,Nuclei,cpe:2.3:a:kybernetika:phpshowtime:2.0:*:*:*:*:*:*:* CVE-2012-0991,0.0,,0.70708,"Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter.",2012-02-07,Nuclei,cpe:2.3:a:openemr:openemr:4.1.0:*:*:*:*:*:*:* CVE-2012-0996,0.0,,0.14497,Multiple directory traversal vulnerabilities in 11in1 1.2.1 stable 12-31-2011 allow remote attackers to read arbitrary files via a .. (dot dot) in the class parameter to (1) index.php or (2) admin/index.php.,2012-02-24,Nuclei,cpe:2.3:a:11in1:11in1:1.2.1:stable_12-31-2011:*:*:*:*:*:* CVE-2012-1153,0.0,,0.79543,"Unrestricted file upload vulnerability in addons/uploadify/uploadify.php in appRain CMF 0.1.5 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in the uploads directory.",2012-10-06,Metasploit,cpe:2.3:a:apprain:apprain:*:*:*:*:*:*:*:*;cpe:2.3:a:apprain:apprain:0.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apprain:apprain:0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apprain:apprain:0.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apprain:apprain:0.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apprain:apprain:0.1.4:*:*:*:*:*:*:* CVE-2012-1182,0.0,,0.78172,"The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.",2012-04-10,Metasploit,cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:* CVE-2012-1195,0.0,,0.86542,"Unrestricted file upload vulnerability in andesk/managementsuite/core/core.anonymous/ServerSetup.asmx in the ServerSetup web service in Lenovo ThinkManagement Console 9.0.3 allows remote attackers to execute arbitrary code by uploading a file with an executable extension via a PutUpdateFileCore command in a RunAMTCommand SOAP request, then accessing the file via a direct request to the file in the web root.",2012-02-18,Metasploit,cpe:2.3:a:landesk:lenovo_thinkmanagement_console:9.0.3:*:*:*:*:*:*:* CVE-2012-1196,0.0,,0.83137,Directory traversal vulnerability in the VulCore web service (WSVulnerabilityCore/VulCore.asmx) in Lenovo ThinkManagement Console 9.0.3 allows remote attackers to delete arbitrary files via a .. (dot dot) in the filename parameter in a SetTaskLogByFile SOAP request.,2012-02-18,Metasploit,cpe:2.3:a:landesk:lenovo_thinkmanagement_console:9.0.3:*:*:*:*:*:*:* CVE-2012-1226,0.0,,0.10327,Multiple directory traversal vulnerabilities in Dolibarr CMS 3.2.0 Alpha allow remote attackers to read arbitrary files and possibly execute arbitrary code via a .. (dot dot) in the (1) file parameter to document.php or (2) backtopage parameter in a create action to comm/action/fiche.php.,2012-02-21,Nuclei,cpe:2.3:a:dolibarr:dolibarr_erp\/crm:3.2.0:alpha:*:*:*:*:*:* CVE-2012-1465,0.0,,0.82771,Stack-based buffer overflow in the HTTP Server in NetMechanica NetDecision before 4.6.1 allows remote attackers to cause a denial of service (application crash) via a long URL in an HTTP request. NOTE: some of these details are obtained from third party information.,2012-03-19,Metasploit,cpe:2.3:a:netmechanica:netdecision:*:*:*:*:*:*:*:* CVE-2012-1493,0.0,,0.84375,"F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers' installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option.",2012-07-09,Metasploit,cpe:2.3:a:f5:big-ip_application_security_manager:10.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:10.2.3:hf1:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:11.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:11.0.0:hf1:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:11.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:11.1.0:hf2:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:9.2.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:9.2.0:hf4:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:9.4.4:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:9.4.5:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:9.4.6:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:9.4.7:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:9.4.8:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:10.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.3:hf1:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:11.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:11.0.0:hf1:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:11.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:11.1.0:hf2:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:9.2.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:9.4.8:hf4:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:10.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.3:hf1:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:11.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:11.0.0:hf1:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:11.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:11.1.0:hf2:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:9.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:9.4.8:hf4:*:*:*:*:*:*;cpe:2.3:a:f5:enterprise_manager:*:*:virtual:*:*:*:*:*;cpe:2.3:a:f5:enterprise_manager:1.0:*:virtual:*:*:*:*:*;cpe:2.3:a:f5:enterprise_manager:2.0:*:virtual:*:*:*:*:*;cpe:2.3:a:f5:enterprise_manager:2.1.0:*:virtual:*:*:*:*:*;cpe:2.3:a:f5:enterprise_manager:2.1.0:hf1:virtual:*:*:*:*:*;cpe:2.3:a:f5:enterprise_manager:2.2.0:*:virtual:*:*:*:*:*;cpe:2.3:a:f5:enterprise_manager:2.3.0:*:virtual:*:*:*:*:*;cpe:2.3:a:f5:enterprise_manager:2.3.0:hf2:virtual:*:*:*:*:*;cpe:2.3:h:f5:big-ip_1000:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_11000:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_11050:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_1500:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_1600:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_2400:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_3400:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_3410:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_3600:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_3900:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_4100:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_5100:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_5110:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_6400:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_6800:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_6900:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_8400:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_8800:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_8900:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:big-ip_8950:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:enterprise_manager:*:*:*:*:*:*:*:*;cpe:2.3:h:f5:enterprise_manager:1.0:*:*:*:*:*:*:*;cpe:2.3:h:f5:enterprise_manager:2.0:*:*:*:*:*:*:*;cpe:2.3:h:f5:enterprise_manager:2.1.0:*:*:*:*:*:*:*;cpe:2.3:h:f5:enterprise_manager:2.1.0:hf1:*:*:*:*:*:*;cpe:2.3:h:f5:enterprise_manager:2.2.0:*:*:*:*:*:*:*;cpe:2.3:h:f5:enterprise_manager:2.3.0:*:*:*:*:*:*:*;cpe:2.3:h:f5:enterprise_manager:2.3.0:hf2:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:*:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:10.0.0:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:10.0.1:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:10.1.0:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:10.2.0:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:2.0:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:4.0:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:4.2:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:4.3:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:4.4:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:4.5.10:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:4.5.11:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:4.5.12:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:4.5.6:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:4.5.9:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:4.5:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:4.6.2:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:4.6:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.0.1:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.0.2:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.0.3:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.0.4:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.0.5:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.0:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.1.1:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.1.2:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.1.3:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.1:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.2.2:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.2.3:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.2.4:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.2.5:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.2:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.3.1:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.3:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.4.1:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.4.2:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.4.3:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.4.4:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.4.5:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.4.6:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.4.7:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.4.8:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.4:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.6.0:*:*:*:*:*:*:*;cpe:2.3:o:f5:tmos:9.6.1:*:*:*:*:*:*:* CVE-2012-1495,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.88484,install/index.php in WebCalendar before 1.2.5 allows remote attackers to execute arbitrary code via the form_single_user_login parameter.,2020-01-27,Metasploit,cpe:2.3:a:webcalendar_project:webcalendar:*:*:*:*:*:*:*:* CVE-2012-1533,0.0,,0.66165,"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-3159.",2012-10-16,Metasploit,cpe:2.3:a:oracle:jdk:*:update35:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:*:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:update35:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0.200:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0.210:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:* CVE-2012-1535,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.923,"Unspecified vulnerability in Adobe Flash Player before 11.3.300.271 on Windows and Mac OS X and before 11.2.202.238 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted SWF content, as exploited in the wild in August 2012 with SWF content in a Word document.",2012-08-15,Metasploit/CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:* CVE-2012-1675,0.0,,0.92162,"The TNS Listener, as used in Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, and 10g 10.2.0.3, 10.2.0.4, and 10.2.0.5, as used in Oracle Fusion Middleware, Enterprise Manager, E-Business Suite, and possibly other products, allows remote attackers to execute arbitrary database commands by performing a remote registration of a database (1) instance or (2) service name that already exists, then conducting a man-in-the-middle (MITM) attack to hijack database connections, aka ""TNS Poison.""",2012-05-08,Metasploit,cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_server:10.2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_server:11.2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:* CVE-2012-1710,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.74567,"Unspecified vulnerability in the Oracle WebCenter Forms Recognition component in Oracle Fusion Middleware 10.1.3.5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Designer, a different vulnerability than CVE-2012-1709.",2012-05-03,CISA,cpe:2.3:a:oracle:fusion_middleware:10.1.3.5:*:*:*:*:*:*:* CVE-2012-1723,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94083,"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.",2012-06-16,Metasploit/CISA,cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update27:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update28:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update29:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update30:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update31:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update32:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update33:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update34:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update35:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update32_b31:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update32_b32:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update27:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update28:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update29:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update30:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update31:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update32:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update33:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update34:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update35:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:redhat:icedtea6:*:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2012-1775,0.0,,0.72888,Stack-based buffer overflow in VideoLAN VLC media player before 2.0.1 allows remote attackers to execute arbitrary code via a crafted MMS:// stream.,2012-03-19,Metasploit,cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99a:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99c:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99d:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.50:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.3-ac3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.7.1a:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.7.2:test2:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.7.2:test3:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.4:test2:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.5:test3:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.5:test4:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.7:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.8:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.10.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.10:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.11:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.13:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.7:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.8:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.9:*:*:*:*:*:*:* CVE-2012-1803,0.0,,0.61252,"RuggedCom Rugged Operating System (ROS) 3.10.x and earlier has a factory account with a password derived from the MAC Address field in the banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address value, and then establishing a (1) TELNET, (2) remote shell (aka rsh), or (3) serial-console session.",2012-04-28,Metasploit,cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:*:*:*:*:*:*:*:* CVE-2012-1823,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94386,"sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.",2012-05-11,Metasploit/Nuclei/CISA,cpe:2.3:a:php:php:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:application_stack:2.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:* CVE-2012-1835,0.0,,0.0077,"Multiple cross-site scripting (XSS) vulnerabilities in the All-in-One Event Calendar plugin 1.4 and 1.5 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) title parameter to app/view/agenda-widget-form.php; (2) args, (3) title, (4) before_title, or (5) after_title parameter to app/view/agenda-widget.php; (6) button_value parameter to app/view/box_publish_button.php; or (7) msg parameter to /app/view/save_successful.php.",2012-08-14,Nuclei,cpe:2.3:a:timely:all-in-one_event_calendar:1.4:*:*:*:*:*:*:*;cpe:2.3:a:timely:all-in-one_event_calendar:1.5:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2012-1856,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.92142,"The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka ""MSCOMCTL.OCX RCE Vulnerability.""",2012-08-15,CISA,cpe:2.3:a:microsoft:commerce_server:2002:sp4:*:*:*:*:*:*;cpe:2.3:a:microsoft:commerce_server:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:commerce_server:2009:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:commerce_server:2009:r2:*:*:*:*:*:*;cpe:2.3:a:microsoft:host_integration_server:2004:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2010:sp1:x86:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:sp4:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:sp4:analysis_services:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2005:sp3:express_advanced_services:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2005:sp4:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2008:r2_sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2008:r2_sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2008:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2008:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_basic:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_foxpro:8.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_foxpro:9.0:sp2:*:*:*:*:*:* CVE-2012-1875,0.0,,0.82181,"Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka ""Same ID Property Remote Code Execution Vulnerability.""",2012-06-12,Metasploit,cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2012-1876,0.0,,0.86119,"Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka ""Col Element Remote Code Execution Vulnerability,"" as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.",2012-06-12,Metasploit,cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2012-1889,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.92781,"Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.",2012-06-13,Metasploit/CISA,cpe:2.3:a:microsoft:expression_web:2:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:expression_web:sp1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:groove:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:groove:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:groove_server:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:groove_server:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:-:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:xml_core_services:3.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:xml_core_services:4.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:xml_core_services:5.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:xml_core_services:6.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2012-2019,0.0,,0.756,"Unspecified vulnerability in HP Operations Agent before 11.03.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1325.",2012-07-11,Metasploit,cpe:2.3:a:hp:operations_agent:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:7.36:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.51.102:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.52:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.53:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.60.005:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.60.006:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.60.007:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.60.008:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.60.501:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.60.7:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.60:*:*:*:*:*:*:* CVE-2012-2020,0.0,,0.756,"Unspecified vulnerability in HP Operations Agent before 11.03.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1326.",2012-07-11,Metasploit,cpe:2.3:a:hp:operations_agent:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:7.36:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.51.102:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.52:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.53:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.60.005:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.60.006:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.60.007:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.60.008:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.60.501:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.60.7:*:*:*:*:*:*:*;cpe:2.3:a:hp:operations_agent:8.60:*:*:*:*:*:*:* CVE-2012-2034,7.5,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,0.25628,"Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2037.",2012-06-09,CISA,cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* CVE-2012-2122,0.0,,0.94058,"sql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6.x before 5.6.6, and MariaDB 5.1.x before 5.1.62, 5.2.x before 5.2.12, 5.3.x before 5.3.6, and 5.5.x before 5.5.23, when running in certain environments with certain implementations of the memcmp function, allows remote attackers to bypass authentication by repeatedly authenticating with the same incorrect password, which eventually causes a token comparison to succeed due to an improperly-checked return value.",2012-06-26,Metasploit/Nuclei,cpe:2.3:a:mariadb:mariadb:5.1.41:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.1.42:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.1.44:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.1.47:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.1.49:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.1.50:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.1.51:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.1.53:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.1.55:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.1.60:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.1.61:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.2.10:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.2.11:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.2.3:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.2.4:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.2.5:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.2.6:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.2.7:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.2.8:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.2.9:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.3.4:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.3.5:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.3.6:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.5.20:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.5.21:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:5.5.22:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:* CVE-2012-2174,0.0,,0.68526,The URL handler in IBM Lotus Notes 8.x before 8.5.3 FP2 allows remote attackers to execute arbitrary code via a crafted notes:// URL.,2012-06-20,Metasploit,cpe:2.3:a:ibm:lotus_notes:8.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5:*:*:*:*:*:*:* CVE-2012-2175,0.0,,0.66496,Buffer overflow in the Attachment_Times method in a certain ActiveX control in dwa85W.dll in IBM Lotus iNotes 8.5.x before 8.5.3 FP2 allows remote attackers to execute arbitrary code via a long argument.,2012-06-20,Metasploit,cpe:2.3:a:ibm:lotus_inotes:8.5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_inotes:8.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_inotes:8.5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_inotes:8.5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_inotes:8.5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_inotes:8.5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_inotes:8.5.1.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_inotes:8.5.1.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_inotes:8.5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_inotes:8.5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_inotes:8.5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_inotes:8.5.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_inotes:8.5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_inotes:8.5.3.1:*:*:*:*:*:*:* CVE-2012-2176,0.0,,0.61923,Multiple stack-based buffer overflows in a certain ActiveX control in qp2.cab in IBM Lotus Quickr 8.2 before 8.2.0.27-002a for Domino allow remote attackers to execute arbitrary code via a long argument to the (1) Attachment_Times or (2) Import_Times method.,2012-05-25,Metasploit,cpe:2.3:a:ibm:lotus_quickr:8.2:*:*:*:*:*:*:* CVE-2012-2215,0.0,,0.32682,Directory traversal vulnerability in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to read arbitrary files via an opcode 0x21 request.,2012-04-09,Metasploit,cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.1a:*:*:*:*:*:*:* CVE-2012-2288,0.0,,0.68887,"Format string vulnerability in the nsrd RPC service in EMC NetWorker 7.6.3 and 7.6.4 before 7.6.4.1, and 8.0 before 8.0.0.1, allows remote attackers to execute arbitrary code via format string specifiers in a message.",2012-09-04,Metasploit,cpe:2.3:a:emc:networker:7.6.3:*:*:*:*:*:*:*;cpe:2.3:a:emc:networker:7.6.4:*:*:*:*:*:*:*;cpe:2.3:a:emc:networker:8.0:*:*:*:*:*:*:* CVE-2012-2329,0.0,,0.79567,Buffer overflow in the apache_request_headers function in sapi/cgi/cgi_main.c in PHP 5.4.x before 5.4.3 allows remote attackers to cause a denial of service (application crash) via a long string in the header of an HTTP request.,2012-05-11,Metasploit,cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:* CVE-2012-2371,0.0,,0.03673,Cross-site scripting (XSS) vulnerability in index.php in the WP-FaceThumb plugin 0.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the pagination_wp_facethumb parameter.,2012-08-13,Nuclei,cpe:2.3:a:mnt-tech:wp-facethumb:0.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2012-2515,0.0,,0.64836,"Multiple stack-based buffer overflows in the KeyHelp.KeyCtrl.1 ActiveX control in KeyHelp.ocx 1.2.312 in KeyWorks KeyHelp Module (aka the HTML Help component), as used in EMC Documentum ApplicationXtender Desktop 5.4; EMC Captiva Quickscan Pro 4.6 SP1; GE Intelligent Platforms Proficy Historian 3.1, 3.5, 4.0, and 4.5; GE Intelligent Platforms Proficy HMI/SCADA iFIX 5.0 and 5.1; GE Intelligent Platforms Proficy Pulse 1.0; GE Intelligent Platforms Proficy Batch Execution 5.6; GE Intelligent Platforms SI7 I/O Driver 7.20 through 7.42; and other products, allow remote attackers to execute arbitrary code via a long string in the second argument to the (1) JumpMappedID or (2) JumpURL method.",2012-07-05,Metasploit,cpe:2.3:a:emc:captiva_quickscan_pro:4.6:sp1:*:*:*:*:*:*;cpe:2.3:a:emc:documentum_applicationxtender_desktop:5.4:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_batch_execution:5.6:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_historian:3.1:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_historian:3.5:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_historian:4.0:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_historian:4.5:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\/scada_ifix:5.0:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\/scada_ifix:5.1:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_pulse:1.0:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_si7_i\/o_driver:7.20:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_si7_i\/o_driver:7.42:*:*:*:*:*:*:* CVE-2012-2516,0.0,,0.69414,"An ActiveX control in KeyHelp.ocx in KeyWorks KeyHelp Module (aka the HTML Help component), as used in GE Intelligent Platforms Proficy Historian 3.1, 3.5, 4.0, and 4.5; Proficy HMI/SCADA iFIX 5.0 and 5.1; Proficy Pulse 1.0; Proficy Batch Execution 5.6; SI7 I/O Driver 7.20 through 7.42; and other products, allows remote attackers to execute arbitrary commands via crafted input, related to a ""command injection vulnerability.""",2012-07-05,Metasploit,cpe:2.3:a:ge:intelligent_platforms_proficy_batch_execution:5.6:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_historian:3.1:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_historian:3.5:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_historian:4.0:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_historian:4.5:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\/scada_ifix:5.0:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\/scada_ifix:5.1:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_pulse:1.0:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_si7_i\/o_driver:7.20:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_si7_i\/o_driver:7.42:*:*:*:*:*:*:* CVE-2012-2539,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.81896,"Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; and Office Web Apps 2010 SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, aka ""Word RTF 'listoverridecount' Remote Code Execution Vulnerability.""",2012-12-12,CISA,cpe:2.3:a:microsoft:office_compatibility_pack:-:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_apps:2010:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2010:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2010:sp1:*:*:*:*:*:* CVE-2012-2611,0.0,,0.77664,"The DiagTraceR3Info function in the Dialog processor in disp+work.exe 7010.29.15.58313 and 7200.70.18.23869 in the Dispatcher in SAP NetWeaver 7.0 EHP1 and EHP2, when a certain Developer Trace configuration is enabled, allows remote attackers to execute arbitrary code via a crafted SAP Diag packet.",2012-05-15,Metasploit,cpe:2.3:a:sap:netweaver:7.0:ehp1:*:*:*:*:*:*;cpe:2.3:a:sap:netweaver:7.0:ehp2:*:*:*:*:*:* CVE-2012-2626,0.0,,0.75978,"cgi-bin/admin.cgi in the web console in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) before 9.5.0 does not require token authentication, which allows remote attackers to add administrative accounts via a userprefs action.",2012-07-31,Metasploit,cpe:2.3:a:sonicwall:scrutinizer:*:*:*:*:*:*:*:* CVE-2012-2686,0.0,,0.55985,crypto/evp/e_aes_cbc_hmac_sha1.c in the AES-NI functionality in the TLS 1.1 and 1.2 implementations in OpenSSL 1.0.1 before 1.0.1d allows remote attackers to cause a denial of service (application crash) via crafted CBC data.,2013-02-08,Metasploit,cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:* CVE-2012-2763,0.0,,0.88834,"Buffer overflow in the readstr_upto function in plug-ins/script-fu/tinyscheme/scheme.c in GIMP 2.6.12 and earlier, and possibly 2.6.13, allows remote attackers to execute arbitrary code via a long string in a command to the script-fu server.",2012-07-12,Metasploit,cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:* CVE-2012-2915,0.0,,0.66074,Stack-based buffer overflow in Lattice Semiconductor PAC-Designer 6.2.1344 allows remote attackers to execute arbitrary code via a long string in a Value tag in a SymbolicSchematicData definition tag in PAC Design (.pac) file.,2012-05-21,Metasploit,cpe:2.3:a:lattice_semiconductor:pac-designer:6.2.1344:*:*:*:*:*:*:* CVE-2012-2926,9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,0.56379,"Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.",2012-05-22,Metasploit,cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*;cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*;cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*;cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*;cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*;cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*;cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:* CVE-2012-2953,0.0,,0.80903,The management console in Symantec Web Gateway 5.0.x before 5.0.3.18 allows remote attackers to execute arbitrary commands via crafted input to application scripts.,2012-07-23,Metasploit,cpe:2.3:a:symantec:web_gateway:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec:web_gateway:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec:web_gateway:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:symantec:web_gateway:5.0:*:*:*:*:*:*:* CVE-2012-2962,0.0,,0.90336,SQL injection vulnerability in d4d/statusFilter.php in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) before 9.5.2 allows remote authenticated users to execute arbitrary SQL commands via the q parameter.,2012-07-30,Metasploit,cpe:2.3:a:sonicwall:scrutinizer:*:*:*:*:*:*:*:* CVE-2012-2982,0.0,,0.83112,"file/show.cgi in Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary commands via an invalid character in a pathname, as demonstrated by a | (pipe) character.",2012-09-11,Metasploit,cpe:2.3:a:gentoo:webmin:*:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.140:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.150:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.160:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.170:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.180:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.200:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.210:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.220:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.230:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.240:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.260:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.270:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.280:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.290:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.300:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.310:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.320:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.330:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.340:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.370:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.380:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.390:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.400:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.410:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.420:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.430:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.440:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.450:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.470:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.480:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.500:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.510:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.520:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.530:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.550:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.560:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.570:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.580:*:*:*:*:*:*:* CVE-2012-2983,0.0,,0.54538,"file/edit_html.cgi in Webmin 1.590 and earlier does not perform an authorization check before showing a file's unedited contents, which allows remote attackers to read arbitrary files via the file field.",2012-09-11,Metasploit,cpe:2.3:a:gentoo:webmin:*:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.140:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.150:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.160:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.170:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.180:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.200:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.210:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.220:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.230:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.240:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.260:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.270:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.280:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.290:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.300:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.310:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.320:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.330:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.340:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.370:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.380:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.390:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.400:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.410:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.420:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.430:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.440:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.450:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.470:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.480:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.500:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.510:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.520:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.530:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.550:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.560:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.570:*:*:*:*:*:*:*;cpe:2.3:a:gentoo:webmin:1.580:*:*:*:*:*:*:* CVE-2012-3001,0.0,,0.51333,"Mutiny Standard before 4.5-1.12 allows remote attackers to execute arbitrary commands via the network-interface menu, related to a ""command injection vulnerability.""",2012-10-22,Metasploit,cpe:2.3:a:mutiny:standard:*:*:*:*:*:*:*:*;cpe:2.3:a:mutiny:standard:4.4-1.12:*:*:*:*:*:*:*;cpe:2.3:a:mutiny:standard:4.5-1.03:*:*:*:*:*:*:*;cpe:2.3:a:mutiny:standard:4.5-1.05:*:*:*:*:*:*:*;cpe:2.3:a:mutiny:standard:4.5-1.07:*:*:*:*:*:*:* CVE-2012-3152,9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,0.92609,"Unspecified vulnerability in the Oracle Reports Developer component in Oracle Fusion Middleware 11.1.1.4, 11.1.1.6, and 11.1.2.0 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Report Server Component. NOTE: the previous information is from the October 2012 CPU. Oracle has not commented on claims from the original researcher that the URLPARAMETER functionality allows remote attackers to read and upload arbitrary files to reports/rwservlet, and that this issue occurs in earlier versions. NOTE: this can be leveraged with CVE-2012-3153 to execute arbitrary code by uploading a .jsp file.",2012-10-16,Metasploit/CISA,cpe:2.3:a:oracle:fusion_middleware:11.1.1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware:11.1.1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware:11.1.2.0:*:*:*:*:*:*:* CVE-2012-3153,0.0,,0.91205,"Unspecified vulnerability in the Oracle Reports Developer component in Oracle Fusion Middleware 11.1.1.4, 11.1.1.6, and 11.1.2.0 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Servlet. NOTE: the previous information is from the October 2012 CPU. Oracle has not commented on claims from the original researcher that the PARSEQUERY function allows remote attackers to obtain database credentials via reports/rwservlet/parsequery, and that this issue occurs in earlier versions. NOTE: this can be leveraged with CVE-2012-3152 to execute arbitrary code by uploading a .jsp file.",2012-10-16,Metasploit/Nuclei,cpe:2.3:a:oracle:fusion_middleware:11.1.1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware:11.1.1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware:11.1.2.0:*:*:*:*:*:*:* CVE-2012-3260,0.0,,0.68581,"Unspecified vulnerability in a SOAP feature in HP SiteScope 11.10 through 11.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1462.",2012-09-25,Metasploit,cpe:2.3:a:hp:sitescope:11.10:*:*:*:*:*:*:*;cpe:2.3:a:hp:sitescope:11.11:*:*:*:*:*:*:*;cpe:2.3:a:hp:sitescope:11.12:*:*:*:*:*:*:* CVE-2012-3261,0.0,,0.68581,"Unspecified vulnerability in a SOAP feature in HP SiteScope 11.10 through 11.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1463.",2012-09-25,Metasploit,cpe:2.3:a:hp:sitescope:11.10:*:*:*:*:*:*:*;cpe:2.3:a:hp:sitescope:11.11:*:*:*:*:*:*:*;cpe:2.3:a:hp:sitescope:11.12:*:*:*:*:*:*:* CVE-2012-3274,0.0,,0.73427,Stack-based buffer overflow in uam.exe in the User Access Manager (UAM) component in HP Intelligent Management Center (IMC) before 5.1 E0101P01 allows remote attackers to execute arbitrary code via vectors related to log data.,2012-12-06,Metasploit,cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h03:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h04:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l01:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l02:*:*:*:*:*:* CVE-2012-3399,0.0,,0.85193,Config/diff.php in Basilic 1.5.14 allows remote attackers to execute arbitrary commands via shell metacharacters in the file parameter.,2012-07-12,Metasploit,cpe:2.3:a:artis.imag:basilic:1.5.14:*:*:*:*:*:*:* CVE-2012-3485,0.0,,0.2587,"Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.",2012-08-26,Metasploit,cpe:2.3:a:google:tunnelblick:*:*:*:*:*:*:*:* CVE-2012-3569,0.0,,0.80635,"Format string vulnerability in VMware OVF Tool 2.1 on Windows, as used in VMware Workstation 8.x before 8.0.5, VMware Player 4.x before 4.0.5, and other products, allows user-assisted remote attackers to execute arbitrary code via a crafted OVF file.",2012-11-14,Metasploit,cpe:2.3:a:vmware:ovf_tool:2.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:4.0.0.18997:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:4.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0.0.18997:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0.1.27038:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0.2:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0.3:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0.4:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2012-3579,0.0,,0.36373,"Symantec Messaging Gateway (SMG) before 10.0 has a default password for an unspecified account, which makes it easier for remote attackers to obtain privileged access via an SSH session.",2012-08-29,Metasploit,cpe:2.3:a:symantec:messaging_gateway:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:messaging_gateway:9.5.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec:messaging_gateway:9.5.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec:messaging_gateway:9.5.3:*:*:*:*:*:*:*;cpe:2.3:a:symantec:messaging_gateway:9.5:*:*:*:*:*:*:* CVE-2012-3752,0.0,,0.79074,Multiple buffer overflows in Apple QuickTime before 7.7.3 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted style element in a QuickTime TeXML file.,2012-11-09,Metasploit,cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.7:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.8:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.9:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.7.1:*:*:*:*:*:*:* CVE-2012-3753,0.0,,0.78056,Buffer overflow in the plugin in Apple QuickTime before 7.7.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted MIME type.,2012-11-09,Metasploit,cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.7:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.8:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.9:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.7.1:*:*:*:*:*:*:* CVE-2012-3811,0.0,,0.77369,Unrestricted file upload vulnerability in ImageUpload.ashx in the Wallboard application in Avaya IP Office Customer Call Reporter 7.0 before 7.0.5.8 Q1 2012 Maintenance Release and 8.0 before 8.0.9.13 Q1 2012 Maintenance Release allows remote attackers to execute arbitrary code by uploading an executable file and then accessing it via a direct request.,2012-07-03,Metasploit,cpe:2.3:a:avaya:ip_office_customer_call_reporter:7.0:*:*:*:*:*:*:*;cpe:2.3:a:avaya:ip_office_customer_call_reporter:8.0:*:*:*:*:*:*:* CVE-2012-3815,0.0,,0.80822,Buffer overflow in RunTime.exe in Sielco Sistemi Winlog Pro SCADA before 2.07.18 and Winlog Lite SCADA before 2.07.18 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 46824. NOTE: some of these details are obtained from third party information.,2012-06-27,Metasploit,cpe:2.3:a:sielcosistemi:winlog_lite:*:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.00:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.03:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.04:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.06:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.09:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.10:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.12:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.13:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.14:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.18:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.21:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.24:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.25:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.28:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.40:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.46:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.50:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.60:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.73:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.86:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.07.00:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.07.01:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.07.08:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.07.09:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.07.11:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:*:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.00:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.03:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.04:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.06:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.09:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.10:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.12:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.13:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.14:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.18:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.21:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.24:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.25:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.28:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.40:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.46:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.50:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.60:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.73:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.86:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.07.00:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.07.01:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.07.08:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.07.09:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.07.11:*:*:*:*:*:*:* CVE-2012-3951,0.0,,0.79501,"The MySQL component in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) 9.0.1.19899 and earlier has a default password of admin for the (1) scrutinizer and (2) scrutremote accounts, which allows remote attackers to execute arbitrary SQL commands via a TCP session.",2012-07-31,Metasploit,cpe:2.3:a:sonicwall:scrutinizer:*:*:*:*:*:*:*:* CVE-2012-3993,0.0,,0.81829,"The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an ""XrayWrapper pollution"" issue.",2012-10-10,Metasploit,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:10.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:12.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:12.0:beta6:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:13.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:13.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:14.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:14.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:15.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.20:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.21:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.22:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.23:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.24:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.25:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:9.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:beta6:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.3.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.3:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.3:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.3:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.4.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.4:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.4:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.4:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.5:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.5:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.5:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.6:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.6:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.6:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.6:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.8:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.8:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.8:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.8:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.8:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.8:beta6:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.9.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.9:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.9:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.9:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.9:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:10.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:10.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:10.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:10.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:11.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:11.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:12.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:12.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:13.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:13.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:14.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:15.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.20:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:9.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:10.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:10.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:10.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:10.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:10.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:10.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:10.0:*:*:*:*:*:*:* CVE-2012-4031,0.0,,0.75586,Multiple directory traversal vulnerabilities in src/acloglogin.php in Wangkongbao CNS-1000 and 1100 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) lang or (2) langid cookie to port 85.,2012-07-17,Metasploit,cpe:2.3:h:wangkongbao:cns-1000:*:*:*:*:*:*:*:*;cpe:2.3:h:wangkongbao:cns-1100:*:*:*:*:*:*:*:* CVE-2012-4032,0.0,,0.13567,Open redirect vulnerability in the login page in WebsitePanel before 1.2.2.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in ReturnUrl to Default.aspx.,2012-07-17,Nuclei,cpe:2.3:a:websitepanel:websitepanel:*:*:*:*:*:*:*:*;cpe:2.3:a:websitepanel:websitepanel:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:websitepanel:websitepanel:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:websitepanel:websitepanel:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:websitepanel:websitepanel:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:websitepanel:websitepanel:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:websitepanel:websitepanel:1.2.0:*:*:*:*:*:*:* CVE-2012-4177,0.0,,0.78817,The web browser plugin for Ubisoft Uplay PC before 2.0.4 allows remote attackers to execute arbitrary programs via the -orbit_exe_path command line argument.,2012-08-07,Metasploit,cpe:2.3:a:ubi:uplay_pc:*:*:*:*:*:*:*:*;cpe:2.3:a:ubi:uplay_pc:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ubi:uplay_pc:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ubi:uplay_pc:2.0:*:*:*:*:*:*:* CVE-2012-4242,0.0,,0.04939,Cross-site scripting (XSS) vulnerability in the MF Gig Calendar plugin 0.9.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the query string to the calendar page.,2012-10-01,Nuclei,cpe:2.3:a:mf_gig_calendar_project:mf_gig_calendar:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2012-4253,0.0,,0.72586,"Multiple directory traversal vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) language parameter to learn/cubemail/install.php or (2) f parameter learn/cubemail/filemanagement.php, or execute arbitrary local files via a .. (dot dot) in the (3) config parameter to learn/cubemail/menu.php.",2012-08-13,Nuclei,cpe:2.3:a:mysqldumper:mysqldumper:1.24.4:*:*:*:*:*:*:* CVE-2012-4273,0.0,,0.01303,Cross-site scripting (XSS) vulnerability in libs/xing.php in the 2 Click Social Media Buttons plugin before 0.34 for WordPress allows remote attackers to inject arbitrary web script or HTML via the xing-url parameter.,2012-08-13,Nuclei,cpe:2.3:a:ppfeufer:2-click-social-media-buttons:*:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.10:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.11:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.11:r1:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.11:r2:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.12:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.13:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.14:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.15:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.16:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.17:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.18.1:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.18:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.19.1:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.19:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.1:-:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.20:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.21.1:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.21:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.22:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.23.1:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.23:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.24.1:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.24:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.25:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.26:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.27.1:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.27:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.28:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.29:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.2:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.30:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.31.1:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.31.2:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.31.3:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.32.1:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.32.2:*:*:*:*:*:*:*;cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2012-4284,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.49444,"A Privilege Escalation vulnerability exists in Viscosity 1.4.1 on Mac OS X due to a path name validation issue in the setuid-set ViscosityHelper binary, which could let a remote malicious user execute arbitrary code",2020-01-10,Metasploit,cpe:2.3:a:sparklabs:viscosity:1.4.1:*:*:*:*:macos:*:* CVE-2012-4333,0.0,,0.71095,Multiple stack-based buffer overflows in the BackupToAvi method in the (1) UMS_Ctrl 1.5.1.1 and (2) UMS_Ctrl_STW 2.0.1.0 ActiveX controls in Samsung NET-i viewer 1.37.120316 allow remote attackers to execute arbitrary code via a long string in the fname parameter. NOTE: some of these details are obtained from third party information.,2012-08-14,Metasploit,cpe:2.3:a:samsung:net-i_viewer:1.37.120316:*:*:*:*:*:*:* CVE-2012-4347,0.0,,0.69707,Multiple directory traversal vulnerabilities in the management console in Symantec Messaging Gateway (SMG) 9.5.x allow remote authenticated users to read arbitrary files via a .. (dot dot) in the (1) logFile parameter in a logs action to brightmail/export or (2) localBackupFileSelection parameter in an APPLIANCE restoreSource action to brightmail/admin/restore/download.do.,2012-12-05,Metasploit,cpe:2.3:a:symantec:messaging_gateway:9.5.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec:messaging_gateway:9.5.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec:messaging_gateway:9.5.3:*:*:*:*:*:*:*;cpe:2.3:a:symantec:messaging_gateway:9.5.4:*:*:*:*:*:*:*;cpe:2.3:a:symantec:messaging_gateway:9.5:*:*:*:*:*:*:* CVE-2012-4356,0.0,,0.66302,"Multiple directory traversal vulnerabilities in Sielco Sistemi Winlog Pro SCADA before 2.07.17 and Winlog Lite SCADA before 2.07.17 allow remote attackers to read arbitrary files via port-46824 TCP packets specifying a file-open operation with opcode 0x78 and a .. (dot dot) in a pathname, followed by a file-read operation with opcode (1) 0x96, (2) 0x97, or (3) 0x98.",2012-08-19,Metasploit,cpe:2.3:a:sielcosistemi:winlog_lite:*:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.00:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.03:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.04:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.06:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.09:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.10:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.12:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.13:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.14:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.18:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.21:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.24:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.25:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.28:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.40:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.46:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.50:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.60:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.73:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.06.86:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.07.00:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.07.01:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.07.08:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.07.09:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.07.11:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_lite:2.07.14:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:*:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.00:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.03:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.04:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.06:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.09:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.10:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.12:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.13:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.14:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.18:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.21:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.24:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.25:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.28:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.40:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.46:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.50:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.60:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.73:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.06.86:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.07.00:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.07.01:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.07.08:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.07.09:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.07.11:*:*:*:*:*:*:*;cpe:2.3:a:sielcosistemi:winlog_pro:2.07.14:*:*:*:*:*:*:* CVE-2012-4361,0.0,,0.4475,lhn/public/network/ping in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the second parameter.,2012-08-20,Metasploit,cpe:2.3:a:hp:san\/iq:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:san\/iq:8.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:san\/iq:8.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:san\/iq:8.5:*:*:*:*:*:*:*;cpe:2.3:h:hp:virtual_san_appliance:-:*:*:*:*:*:*:* CVE-2012-4547,0.0,,0.37906,Unspecified vulnerability in awredir.pl in AWStats before 7.1 has unknown impact and attack vectors.,2012-10-31,Nuclei,cpe:2.3:a:laurent_destailleur:awstats:*:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:1.0:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:2.1:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:2.23:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:2.24:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:3.0:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:3.1:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:3.2:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:4.0:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:4.1:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:5.0:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:5.1:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:5.2:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:5.3:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:5.4:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:5.5:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:5.6:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:5.7:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:5.8:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:5.9:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:6.0:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:6.1:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:6.2:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:6.3:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:6.4:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:6.5:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:6.6:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:6.7:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:6.8:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:6.95:*:*:*:*:*:*:*;cpe:2.3:a:laurent_destailleur:awstats:6.9:*:*:*:*:*:*:* CVE-2012-4554,0.0,,0.54623,The OpenID module in Drupal 7.x before 7.16 allows remote OpenID servers to read arbitrary files via a crafted DOCTYPE declaration in an XRDS file.,2012-11-11,Metasploit,cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:* CVE-2012-4598,0.0,,0.67903,"An unspecified ActiveX control in McAfee Virtual Technician (MVT) before 6.4, and ePO-MVT, allows remote attackers to execute arbitrary code or cause a denial of service (Internet Explorer crash) via a crafted web site.",2012-08-22,Metasploit,cpe:2.3:a:mcafee:epo_mcafee_virtual_technician:*:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:epo_mcafee_virtual_technician:1.0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:epo_mcafee_virtual_technician:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:mcafee_virtual_technician:*:*:*:*:*:*:*:* CVE-2012-4681,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9414,"Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using ""reflection with a trusted immediate caller"" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.",2012-08-28,Metasploit/CISA,cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update8:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update9:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update9:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2012-4705,0.0,,0.70393,Directory traversal vulnerability in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via vectors involving a crafted pathname.,2013-02-24,Metasploit,cpe:2.3:a:3s-software:codesys_gateway-server:*:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.6.0:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.7.0:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.8.0:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.8.1:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.8.2:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.9.18:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.9.19:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.9.1:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.9.2:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.9.3:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.9.4:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.9.5:*:*:*:*:*:*:*;cpe:2.3:a:3s-software:codesys_gateway-server:2.3.9:*:*:*:*:*:*:* CVE-2012-4711,0.0,,0.52097,"Buffer overflow in kingMess.exe 65.20.2003.10300 in WellinTech KingView 6.52, kingMess.exe 65.20.2003.10400 in KingView 6.53, and kingMess.exe 65.50.2011.18049 in KingView 6.55 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted packet.",2013-02-15,Metasploit,cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*;cpe:2.3:a:wellintech:kingview:6.53:*:*:*:*:*:*:*;cpe:2.3:a:wellintech:kingview:6.55:*:*:*:*:*:*:* CVE-2012-4768,0.0,,0.01936,Cross-site scripting (XSS) vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI.,2014-09-04,Nuclei,cpe:2.3:a:mikejolley:download_monitor:3.3.5.7:*:*:*:*:wordpress:*:* CVE-2012-4792,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.91484,"Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012.",2012-12-30,Metasploit/CISA,cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:* CVE-2012-4869,0.0,,0.84867,"The callme_startcall function in recordings/misc/callme_page.php in FreePBX 2.9, 2.10, and earlier allows remote attackers to execute arbitrary commands via the callmenum parameter in a c action.",2012-09-06,Metasploit,cpe:2.3:a:sangoma:freepbx:*:*:*:*:*:*:*:*;cpe:2.3:a:sangoma:freepbx:2.9:*:*:*:*:*:*:* CVE-2012-4876,0.0,,0.81162,Stack-based buffer overflow in the UltraMJCam ActiveX Control in TRENDnet SecurView TV-IP121WN Wireless Internet Camera allows remote attackers to execute arbitrary code via a long string to the OpenFileDlg method.,2012-09-06,Metasploit,cpe:2.3:a:trendnet:securview_wireless_internet_camera_activex_control:1.1.52.18:*:*:*:*:*:*:*;cpe:2.3:h:trendnet:securview_wireless_internet_camera:tv-ip121wn:*:*:*:*:*:*:* CVE-2012-4878,0.0,,0.23242,Absolute path traversal vulnerability in controlcenter.php in FlatnuX CMS 2011 08.09.2 allows remote administrators to read arbitrary files via a full pathname in the dir parameter in a contents/Files action.,2012-09-06,Nuclei,cpe:2.3:a:flatnux:flatnux:2011-08-09-2:*:*:*:*:*:*:* CVE-2012-4889,0.0,,0.03763,"Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine Firewall Analyzer 7.2 allow remote attackers to inject arbitrary web script or HTML via the (1) subTab or (2) tab parameter to createAnomaly.do; (3) url, (4) subTab, or (5) tab parameter to mindex.do; (6) tab parameter to index2.do; or (7) port parameter to syslogViewer.do.",2012-09-10,Nuclei,cpe:2.3:a:manageengine:firewall_analyzer:7.2:*:*:*:*:*:*:* CVE-2012-4914,0.0,,0.65917,Stack-based buffer overflow in the reader in CoolPDF 3.0.2.256 allows remote attackers to execute arbitrary code via a PDF document with a crafted stream.,2013-01-26,Metasploit,cpe:2.3:a:coolpdf:coolpdf:3.0.2.256:*:*:*:*:*:*:* CVE-2012-4915,0.0,,0.77356,Directory traversal vulnerability in the Google Doc Embedder plugin before 2.5.4 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter to libs/pdf.php.,2014-05-29,Metasploit,cpe:2.3:a:davistribe:google_doc_embedder:*:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.0:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.1:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.2:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.3:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.4.1:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.4.2:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.4.3:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.4.4:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.4.5:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.4.6:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.4:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.5.2:*:*:*:*:*:*:*;cpe:2.3:a:davistribe:google_doc_embedder:2.5:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2012-4924,0.0,,0.79899,Buffer overflow in the CxDbgPrint function in the ipswcom.dll ActiveX component 1.0.0.1 for ASUS Net4Switch 1.0.0020 allows remote attackers to execute arbitrary code via a long parameter to the Alert method.,2012-09-15,Metasploit,cpe:2.3:a:asus:ipswcom_activex_component:1.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:asus:net4switch:1.0.0020:*:*:*:*:*:*:* CVE-2012-4933,0.0,,0.78445,"The rtrlet web application in the Web Console in Novell ZENworks Asset Management (ZAM) 7.5 uses a hard-coded username of Ivanhoe and a hard-coded password of Scott for the (1) GetFile_Password and (2) GetConfigInfo_Password operations, which allows remote attackers to obtain sensitive information via a crafted rtrlet/rtr request for the HandleMaintenanceCalls function.",2012-10-20,Metasploit,cpe:2.3:a:novell:zenworks_asset_management:7.5:*:*:*:*:*:*:* CVE-2012-4940,0.0,,0.8485,"Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in (1) the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in (2) an edit action or (3) a delete action to the default URI.",2012-10-31,Metasploit/Nuclei,cpe:2.3:a:gecad:axigen_free_mail_server:-:*:*:*:*:*:*:* CVE-2012-4956,0.0,,0.68577,Heap-based buffer overflow in NFRAgent.exe in Novell File Reporter 1.0.2 allows remote attackers to execute arbitrary code via a large number of VOL elements in an SRS record.,2012-11-18,Metasploit,cpe:2.3:a:novell:file_reporter:1.0.2:*:*:*:*:*:*:* CVE-2012-4957,0.0,,0.75558,Absolute path traversal vulnerability in NFRAgent.exe in Novell File Reporter 1.0.2 allows remote attackers to read arbitrary files via a /FSF/CMD request with a full pathname in a PATH element of an SRS record.,2012-11-18,Metasploit,cpe:2.3:a:novell:file_reporter:1.0.2:*:*:*:*:*:*:* CVE-2012-4958,0.0,,0.73561,Directory traversal vulnerability in NFRAgent.exe in Novell File Reporter 1.0.2 allows remote attackers to read arbitrary files via a 126 /FSF/CMD request with a .. (dot dot) in a FILE element of an FSFUI record.,2012-11-18,Metasploit,cpe:2.3:a:novell:file_reporter:1.0.2:*:*:*:*:*:*:* CVE-2012-4959,0.0,,0.73924,Directory traversal vulnerability in NFRAgent.exe in Novell File Reporter 1.0.2 allows remote attackers to upload and execute files via a 130 /FSF/CMD request with a .. (dot dot) in a FILE element of an FSFUI record.,2012-11-18,Metasploit,cpe:2.3:a:novell:file_reporter:1.0.2:*:*:*:*:*:*:* CVE-2012-4969,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92693,"Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in September 2012.",2012-09-18,Metasploit/CISA,cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:-:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server:2003:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server:2003:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server:2003:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server:2008:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server:2008:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server:2008:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:sp2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:* CVE-2012-4982,0.0,,0.1931,Open redirect vulnerability in assets/login on the Forescout CounterACT NAC device before 7.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the a parameter.,2012-12-05,Nuclei,cpe:2.3:a:forescout:counteract:6.3.4.10:*:*:*:*:*:*:* CVE-2012-5002,0.0,,0.34146,"Stack-based buffer overflow in SR10 FTP server (SR10.exe) 1.1.0.6 in Ricoh DC Software DL-10 4.5.0.1, when the Log file name option is enabled, allows remote attackers to execute arbitrary code via a long USER FTP command.",2012-09-19,Metasploit,cpe:2.3:a:ricoh:dl-10:4.5.0.1:*:*:*:*:*:*:*;cpe:2.3:h:ricoh:sr10_ftp_server:1.1.0.6:*:*:*:*:*:*:* CVE-2012-5054,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.76609,Integer overflow in the copyRawDataTo method in the Matrix3D class in Adobe Flash Player before 11.4.402.265 allows remote attackers to execute arbitrary code via malformed arguments.,2012-09-24,CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* CVE-2012-5076,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92498,"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JAX-WS.",2012-10-16,Metasploit/CISA,cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* CVE-2012-5081,0.0,,0.8184,"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE.",2012-10-16,Metasploit,cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:*:update35:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:*:update36:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:*:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:update35:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:update36:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_25:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_26:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_27:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_28:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_29:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_30:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_31:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_32:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_33:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_34:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_35:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_36:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_37:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update28:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update29:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update31:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update33:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0.200:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0.210:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_29:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_30:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_31:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_32:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_33:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_34:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_35:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_36:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_37:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:* CVE-2012-5088,0.0,,0.79264,"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.",2012-10-16,Metasploit,cpe:2.3:a:oracle:jdk:*:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:* CVE-2012-5159,0.0,,0.8794,"phpMyAdmin 3.5.2.2, as distributed by the cdnetworks-kr-1 mirror during an unspecified time frame in 2012, contains an externally introduced modification (Trojan Horse) in server_sync.php, which allows remote attackers to execute arbitrary PHP code via an eval injection attack.",2012-09-25,Metasploit,cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:* CVE-2012-5192,0.0,,0.5826,"Directory traversal vulnerability in gmap/view_overlay.php in Bitweaver 2.8.1 and earlier allows remote attackers to read arbitrary files via ""''%2F"" (dot dot encoded slash) sequences in the overlay_type parameter.",2014-01-28,Metasploit,cpe:2.3:a:bitweaver:bitweaver:*:*:*:*:*:*:*:*;cpe:2.3:a:bitweaver:bitweaver:1.1.1_beta:*:*:*:*:*:*:*;cpe:2.3:a:bitweaver:bitweaver:1.1:*:*:*:*:*:*:*;cpe:2.3:a:bitweaver:bitweaver:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:bitweaver:bitweaver:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:bitweaver:bitweaver:1.3:*:*:*:*:*:*:*;cpe:2.3:a:bitweaver:bitweaver:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:bitweaver:bitweaver:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:bitweaver:bitweaver:2.5:*:*:*:*:*:*:*;cpe:2.3:a:bitweaver:bitweaver:2.6:*:*:*:*:*:*:*;cpe:2.3:a:bitweaver:bitweaver:2.7:*:*:*:*:*:*:* CVE-2012-5201,0.0,,0.74878,"Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Center for Automated Network Manager (ANM) before 5.2 E0401 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1611.",2013-03-09,Metasploit,cpe:2.3:a:hp:intelligent_management_center:*:e0202:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:*:e0202:enterprise:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h03:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h04:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l01:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l02:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.1:e0101p01:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center_for_automated_network_manager:*:e0202:*:*:*:*:*:* CVE-2012-5202,0.0,,0.67455,"Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Center for Automated Network Manager (ANM) before 5.2 E0401 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, aka ZDI-CAN-1612.",2013-03-09,Metasploit,cpe:2.3:a:hp:intelligent_management_center:*:e0202:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:*:e0202:enterprise:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h03:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h04:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l01:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l02:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.1:e0101p01:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center_for_automated_network_manager:*:e0202:*:*:*:*:*:* CVE-2012-5203,0.0,,0.67455,"Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Center for Automated Network Manager (ANM) before 5.2 E0401 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, aka ZDI-CAN-1613.",2013-03-09,Metasploit,cpe:2.3:a:hp:intelligent_management_center:*:e0202:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:*:e0202:enterprise:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h03:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h04:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l01:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l02:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.1:e0101p01:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center_for_automated_network_manager:*:e0202:*:*:*:*:*:* CVE-2012-5204,0.0,,0.6939,"Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Center for Automated Network Manager (ANM) before 5.2 E0401 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, aka ZDI-CAN-1614.",2013-03-09,Metasploit,cpe:2.3:a:hp:intelligent_management_center:*:e0202:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:*:e0202:enterprise:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h03:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h04:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l01:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l02:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.1:e0101p01:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center_for_automated_network_manager:*:e0202:*:*:*:*:*:* CVE-2012-5223,0.0,,0.79642,"The proc_deutf function in includes/functions_vbseocp_abstract.php in vBSEO 3.5.0, 3.5.1, 3.5.2, 3.6.0, and earlier allows remote attackers to insert and execute arbitrary PHP code via ""complex curly syntax"" in the char_repl parameter, which is inserted into a regular expression that is processed by the preg_replace function with the eval switch.",2012-10-01,Metasploit,cpe:2.3:a:crawlability:vbseo:*:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:2.4.0:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:2.4.5:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.0.0:rc2:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.0.0:rc3:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.0.0:rc4:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.0.0:rc5:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.0.0:rc6:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.2.0:rc4:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.2.0:rc5:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.2.0:rc7:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.2.0:rc8:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.3.0:rc1:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.3.0:rc2:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.5.0:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.5.0:beta1:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.5.0:beta2:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.5.0:rc1:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.5.0:rc2:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.5.0:rc3:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.6.0:beta1:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.6.0:rc1:*:*:*:*:*:*;cpe:2.3:a:crawlability:vbseo:3.6.0:rc2:*:*:*:*:*:* CVE-2012-5321,0.0,,0.23135,"tiki-featured_link.php in TikiWiki CMS/Groupware 8.3 allows remote attackers to load arbitrary web site pages into frames and conduct phishing attacks via the url parameter, aka ""frame injection.""",2012-10-08,Nuclei,cpe:2.3:a:tiki:tikiwiki_cms\/groupware:8.3:*:*:*:*:*:*:* CVE-2012-5357,0.0,,0.82595,"Ektron Content Management System (CMS) before 8.02 SP5 uses the XslCompiledTransform class with enablescript set to true, which allows remote attackers to execute arbitrary code with NETWORK SERVICE privileges via crafted XSL data.",2017-10-30,Metasploit,cpe:2.3:a:ektron:ektron_content_management_system:*:sp4:*:*:*:*:*:* CVE-2012-5519,0.0,,0.13819,"CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface.",2012-11-20,Metasploit,cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:* CVE-2012-5525,0.0,,0.06889,The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.,2012-12-13,Metasploit,cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:* CVE-2012-5613,0.0,,0.88831,"MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a and possibly other versions, when configured to assign the FILE privilege to users who should not have administrative privileges, allows remote authenticated users to gain privileges by leveraging the FILE privilege to create files as the MySQL administrator. NOTE: the vendor disputes this issue, stating that this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: it could be argued that this should not be included in CVE because it is a configuration issue.",2012-12-03,Metasploit,cpe:2.3:a:mariadb:mariadb:5.5.28a:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* CVE-2012-5687,0.0,,0.6748,Directory traversal vulnerability in the web-based management feature on the TP-LINK TL-WR841N router with firmware 3.13.9 build 120201 Rel.54965n and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to the help/ URI.,2012-11-01,Metasploit,cpe:2.3:h:tp-link:tl-wr841n:-:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:tl-wr841n_firmware:*:*:*:*:*:*:*:* CVE-2012-5691,0.0,,0.76917,Buffer overflow in RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a crafted RealMedia file.,2012-12-19,Metasploit,cpe:2.3:a:realnetworks:realplayer:*:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:12.0.0.1548:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:15.0.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:15.0.4.43:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:15.0.4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:15.0.5.109:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:15.0.6.14:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:15.02.71:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:6:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:7:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:8:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:* CVE-2012-5692,0.0,,0.82862,Unspecified vulnerability in admin/sources/base/core.php in Invision Power Board (aka IPB or IP.Board) 3.1.x through 3.3.x has unknown impact and remote attack vectors.,2012-10-31,Metasploit,cpe:2.3:a:invisioncommunity:invision_power_board:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:invisioncommunity:invision_power_board:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:invisionpower:invision_power_board:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:invisionpower:invision_power_board:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:invisionpower:invision_power_board:3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:invisionpower:invision_power_board:3.1.4:*:*:*:*:*:*:*;cpe:2.3:a:invisionpower:invision_power_board:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:invisionpower:invision_power_board:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:invisionpower:invision_power_board:3.2.2:*:*:*:*:*:*:* CVE-2012-5896,0.0,,0.82297,"The Annotation Objects Extension ActiveX control in AnnotateX.dll in Quest InTrust 10.4.0.853 and earlier does not properly implement the Add method, which allows remote attackers to execute arbitrary code via a memory address in the first argument, related to an ""uninitialized pointer.""",2012-11-17,Metasploit,cpe:2.3:a:quest:intrust:*:*:*:*:*:*:*:*;cpe:2.3:a:quest:intrust:10.1:*:*:*:*:*:*:*;cpe:2.3:a:quest:intrust:10.2.5:*:*:*:*:*:*:*;cpe:2.3:a:quest:intrust:10.3:*:*:*:*:*:*:*;cpe:2.3:a:quest:intrust:10.4:*:*:*:*:*:*:* CVE-2012-5913,0.0,,0.01296,Cross-site scripting (XSS) vulnerability in wp-integrator.php in the WordPress Integrator module 1.32 for WordPress allows remote attackers to inject arbitrary web script or HTML via the redirect_to parameter to wp-login.php.,2012-11-17,Nuclei,cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*;cpe:2.3:a:wordpress_integrator_project:wordpress_integrator:1.32:*:*:*:*:*:*:* CVE-2012-5932,0.0,,0.49753,Eval injection vulnerability in the ldapagnt_eval function in ldapagnt.dll in unifid.exe in NetIQ Privileged User Manager 2.3.x before 2.3.1 HF2 allows remote attackers to execute arbitrary Perl code via a crafted application/x-amf request.,2012-12-24,Metasploit,cpe:2.3:a:microfocus:privileged_user_manager:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:microfocus:privileged_user_manager:2.3.1:*:*:*:*:*:*:* CVE-2012-5946,0.0,,0.6617,Buffer overflow in the c1sizer ActiveX control in C1sizer.ocx in IBM SPSS SamplePower 3.0 before FP1 allows remote attackers to execute arbitrary code via a long TabCaption string.,2013-04-30,Metasploit,cpe:2.3:a:ibm:spss_samplepower:3.0.0.0:*:*:*:*:*:*:* CVE-2012-5958,0.0,,0.88128,"Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.",2013-01-31,Metasploit,cpe:2.3:a:libupnp_project:libupnp:*:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.4.4:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.4.5:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.4.6:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.4.7:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.10:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.11:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.12:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.13:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.14:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.15:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.16:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.1:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.2:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.3:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.4:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.5:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.6:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.7:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.8:*:*:*:*:*:*:*;cpe:2.3:a:libupnp_project:libupnp:1.6.9:*:*:*:*:*:*:* CVE-2012-5959,0.0,,0.8239,"Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a long UDN (aka uuid) field within a string that contains a :: (colon colon) in a UDP packet.",2013-01-31,Metasploit,cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:*:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.4:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.5:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.6:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.7:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.10:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.11:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.12:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.13:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.14:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.15:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.16:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.1:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.2:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.3:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.4:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.5:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.6:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.7:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.8:*:*:*:*:*:*:*;cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.9:*:*:*:*:*:*:* CVE-2012-5975,0.0,,0.25747,"The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.",2012-12-04,Metasploit,cpe:2.3:a:ssh:tectia_server:6.0.10:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.11:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.12:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.13:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.14:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.17:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.18:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.19:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.20.:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.9:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.1.12:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.1.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.1.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.1.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.1.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.1.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.1.9:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.2.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.3.2:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* CVE-2012-6066,0.0,,0.73274,"freeSSHd.exe in freeSSHd through 1.2.6 allows remote attackers to bypass authentication via a crafted session, as demonstrated by an OpenSSH client with modified versions of ssh.c and sshconnect2.c.",2012-12-04,Metasploit,cpe:2.3:a:freesshd:freesshd:*:*:*:*:*:*:*:*;cpe:2.3:a:freesshd:freesshd:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:freesshd:freesshd:1.2.2:*:*:*:*:*:*:* CVE-2012-6081,0.0,,0.74887,"Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012.",2013-01-03,Metasploit,cpe:2.3:a:moinmo:moinmoin:*:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:0.10:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:0.11:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:0.1:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:0.2:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:0.3:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:0.4:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:0.5:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:0.6:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:0.7:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:0.8:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:0.9:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.0:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.1:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.2:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.3.3:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.3.4:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.3.5:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.3.5:rc1:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.4:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.0:beta1:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.0:beta2:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.0:beta3:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.0:beta4:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.0:beta5:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.0:beta6:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.0:rc1:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.3:rc1:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.3:rc2:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.4:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.5:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.5:a:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.5:rc1:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.5a:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.6:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.7:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.5.8:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.6.0:beta1:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.6.0:beta2:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.6.0:rc1:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.6.0:rc2:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.6.1:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.6.2:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.6.3:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.6.4:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.7.0:beta1:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.7.0:beta2:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.7.0:rc1:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.7.0:rc2:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.7.0:rc3:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.7.3:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.8.2:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.8.3:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.8.4:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.8.6:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.8.7:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.8.8:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.9.1:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.9.2:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.9.3:*:*:*:*:*:*:*;cpe:2.3:a:moinmo:moinmoin:1.9.4:*:*:*:*:*:*:* CVE-2012-6096,0.0,,0.799,"Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable.",2013-01-22,Metasploit,cpe:2.3:a:icinga:icinga:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:icinga:icinga:1.6.1:*:*:*:*:*:*:*;cpe:2.3:a:icinga:icinga:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:icinga:icinga:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:icinga:icinga:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:icinga:icinga:1.7.3:*:*:*:*:*:*:*;cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*;cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:alpha5:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.4.0:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.4.2:*:*:*:*:*:*:* CVE-2012-6274,0.0,,0.75339,"BigAntSoft BigAnt IM Message Server does not require authentication for file uploading, which allows remote attackers to create arbitrary files under AntServer\DocData\Public via unspecified vectors.",2013-02-24,Metasploit,cpe:2.3:a:bigantsoft:bigant_im_message_server:-:*:*:*:*:*:*:* CVE-2012-6275,0.0,,0.76513,Multiple stack-based buffer overflows in AntDS.exe in BigAntSoft BigAnt IM Message Server allow remote attackers to have an unspecified impact via (1) the filename header in an SCH request or (2) the userid component in a DUPF request.,2013-02-24,Metasploit,cpe:2.3:a:bigantsoft:bigant_im_message_server:-:*:*:*:*:*:*:* CVE-2012-6301,0.0,,0.43028,The Browser application in Android 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted market: URI in the SRC attribute of an IFRAME element.,2012-12-10,Metasploit,cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:* CVE-2012-6329,0.0,,0.81227,"The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.",2013-01-04,Metasploit,cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.14.2:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.14.3:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.16.0:*:*:*:*:*:*:*;cpe:2.3:a:perl:perl:5.16.1:*:*:*:*:*:*:* CVE-2012-6499,0.0,,0.43632,Open redirect vulnerability in age-verification.php in the Age Verification plugin 0.4 and earlier for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect_to parameter.,2013-01-12,Nuclei,cpe:2.3:a:age_verification_project:age_verification:*:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2012-6530,0.0,,0.63819,"Stack-based buffer overflow in Sysax Multi Server before 5.52, when HTTP is enabled, allows remote authenticated users with the create folder permission to execute arbitrary code via a crafted request.",2013-01-31,Metasploit,cpe:2.3:a:sysax:multi_server:*:*:*:*:*:*:*:*;cpe:2.3:a:sysax:multi_server:4.3:*:*:*:*:*:*:*;cpe:2.3:a:sysax:multi_server:4.5:*:*:*:*:*:*:* CVE-2012-6554,0.0,,0.65518,"functions/html_to_text.php in the Chat module before 1.5.2 for activeCollab allows remote authenticated users to execute arbitrary PHP code via the message[message_text] parameter to chat/add_messag, which is not properly handled when executing the preg_replace function with the eval switch.",2013-05-23,Metasploit,cpe:2.3:a:a51dev:activecollab_chat_module:1.0:*:*:*:*:*:*:*;cpe:2.3:a:a51dev:activecollab_chat_module:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:a51dev:activecollab_chat_module:1.1:*:*:*:*:*:*:*;cpe:2.3:a:a51dev:activecollab_chat_module:1.2:*:*:*:*:*:*:*;cpe:2.3:a:a51dev:activecollab_chat_module:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:a51dev:activecollab_chat_module:1.3:*:*:*:*:*:*:*;cpe:2.3:a:a51dev:activecollab_chat_module:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:a51dev:activecollab_chat_module:1.4:*:*:*:*:*:*:*;cpe:2.3:a:a51dev:activecollab_chat_module:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:a51dev:activecollab_chat_module:1.5:*:*:*:*:*:*:* CVE-2012-6636,0.0,,0.6055,"The Android API before 17 does not properly restrict the WebView.addJavascriptInterface method, which allows remote attackers to execute arbitrary methods of Java objects by using the Java Reflection API within crafted JavaScript code that is loaded into the WebView component in an application targeted to API level 16 or earlier, a related issue to CVE-2013-4710.",2014-03-03,Metasploit,cpe:2.3:a:google:android_api:*:*:*:*:*:*:*:*;cpe:2.3:a:google:android_api:1.0:*:*:*:*:*:*:*;cpe:2.3:a:google:android_api:10.0:*:*:*:*:*:*:*;cpe:2.3:a:google:android_api:11.0:*:*:*:*:*:*:*;cpe:2.3:a:google:android_api:12.0:*:*:*:*:*:*:*;cpe:2.3:a:google:android_api:13.0:*:*:*:*:*:*:*;cpe:2.3:a:google:android_api:14.0:*:*:*:*:*:*:*;cpe:2.3:a:google:android_api:15.0:*:*:*:*:*:*:*;cpe:2.3:a:google:android_api:2.0:*:*:*:*:*:*:*;cpe:2.3:a:google:android_api:3.0:*:*:*:*:*:*:*;cpe:2.3:a:google:android_api:4.0:*:*:*:*:*:*:*;cpe:2.3:a:google:android_api:5.0:*:*:*:*:*:*:*;cpe:2.3:a:google:android_api:6.0:*:*:*:*:*:*:*;cpe:2.3:a:google:android_api:7.0:*:*:*:*:*:*:*;cpe:2.3:a:google:android_api:8.0:*:*:*:*:*:*:*;cpe:2.3:a:google:android_api:9.0:*:*:*:*:*:*:* CVE-2012-6663,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.2314,General Electric D20ME devices are not properly configured and reveal plaintext passwords.,2020-01-23,Metasploit,cpe:2.3:h:ge:d200:-:*:*:*:*:*:*:*;cpe:2.3:h:ge:d20me:-:*:*:*:*:*:*:*;cpe:2.3:o:ge:d200_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:ge:d20me_firmware:-:*:*:*:*:*:*:* CVE-2012-6664,9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,0.68733,Multiple directory traversal vulnerabilities in the TFTP Server in Distinct Intranet Servers 3.10 and earlier allow remote attackers to read or write arbitrary files via a .. (dot dot) in the (1) get or (2) put commands.,2024-06-21,Metasploit, CVE-2013-0008,0.0,,0.17562,"win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle window broadcast messages, which allows local users to gain privileges via a crafted application, aka ""Win32k Improper Message Handling Vulnerability.""",2013-01-09,Metasploit,cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* CVE-2013-0025,0.0,,0.86052,"Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka ""Internet Explorer SLayoutRun Use After Free Vulnerability.""",2013-02-13,Metasploit,cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:* CVE-2013-0074,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.93054,"Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka ""Silverlight Double Dereference Vulnerability.""",2013-03-13,Metasploit/CISA,cpe:2.3:a:microsoft:silverlight:*:*:*:*:*:*:*:* CVE-2013-0108,0.0,,0.61426,"An ActiveX control in HscRemoteDeploy.dll in Honeywell Enterprise Buildings Integrator (EBI) R310, R400.2, R410.1, and R410.2; SymmetrE R310, R410.1, and R410.2; ComfortPoint Open Manager (aka CPO-M) Station R100; and HMIWeb Browser client packages allows remote attackers to execute arbitrary code via a crafted HTML document.",2013-02-24,Metasploit,cpe:2.3:a:honeywell:comfortpoint_open_manager_station:r100:*:*:*:*:*:*:*;cpe:2.3:a:honeywell:enterprise_buildings_integrator:r310:*:*:*:*:*:*:*;cpe:2.3:a:honeywell:enterprise_buildings_integrator:r400.2:*:*:*:*:*:*:*;cpe:2.3:a:honeywell:enterprise_buildings_integrator:r410.1:*:*:*:*:*:*:*;cpe:2.3:a:honeywell:enterprise_buildings_integrator:r410.2:*:*:*:*:*:*:*;cpe:2.3:a:honeywell:symmetre:r310:*:*:*:*:*:*:*;cpe:2.3:a:honeywell:symmetre:r400.2:*:*:*:*:*:*:*;cpe:2.3:a:honeywell:symmetre:r410.1:*:*:*:*:*:*:* CVE-2013-0109,0.0,,0.05151,"The NVIDIA driver before 307.78, and Release 310 before 311.00, in the NVIDIA Display Driver service on Windows does not properly handle exceptions, which allows local users to gain privileges or cause a denial of service (memory overwrite) via a crafted application.",2013-04-08,Metasploit,cpe:2.3:a:nvidia:display_driver:*:-:*:*:*:windows:*:*;cpe:2.3:a:nvidia:display_driver:310.00:-:*:*:*:windows:*:* CVE-2013-0136,0.0,,0.49421,"Multiple directory traversal vulnerabilities in the EditDocument servlet in the Frontend in Mutiny before 5.0-1.11 allow remote authenticated users to upload and execute arbitrary programs, read arbitrary files, or cause a denial of service (file deletion or renaming) via (1) the uploadPath parameter in an UPLOAD operation; the paths[] parameter in a (2) DELETE, (3) CUT, or (4) COPY operation; or the newPath parameter in a (5) CUT or (6) COPY operation.",2013-06-01,Metasploit,cpe:2.3:a:mutiny:mutiny:*:*:*:*:*:*:*:*;cpe:2.3:a:mutiny:mutiny:5.0-1.00:*:*:*:*:*:*:*;cpe:2.3:a:mutiny:mutiny_virtual_appliance:-:*:*:*:*:*:*:*;cpe:2.3:h:mutiny:mutiny_appliance:-:*:*:*:*:*:*:* CVE-2013-0156,0.0,,0.92041,"active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.",2013-01-13,Metasploit,cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* CVE-2013-0209,0.0,,0.80627,"lib/MT/Upgrade.pm in mt-upgrade.cgi in Movable Type 4.2x and 4.3x through 4.38 does not require authentication for requests to database-migration functions, which allows remote attackers to conduct eval injection and SQL injection attacks via crafted parameters, as demonstrated by an eval injection attack against the core_drop_meta_for_table function, leading to execution of arbitrary Perl code.",2013-01-23,Metasploit,cpe:2.3:a:sixapart:movable_type:4.21:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.22:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.23:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.24:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.25:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.261:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.26:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.27:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.28:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.28:*:enterprise:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.28:*:open_source:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.291:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.291:*:enterprise:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.291:*:open_source:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.292:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.292:*:enterprise:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.292:*:open_source:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.29:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.29:*:enterprise:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.29:*:open_source:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.31:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.32:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.33:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.34:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.35:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.361:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.361:*:open_source:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.36:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.36:*:open_source:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.37:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.37:*:open_source:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.38:*:*:*:*:*:*:*;cpe:2.3:a:sixapart:movable_type:4.38:*:open_source:*:*:*:*:* CVE-2013-0229,0.0,,0.77988,The ProcessSSDPRequest function in minissdp.c in the SSDP handler in MiniUPnP MiniUPnPd before 1.4 allows remote attackers to cause a denial of service (service crash) via a crafted request that triggers a buffer over-read.,2013-01-31,Metasploit,cpe:2.3:a:miniupnp_project:miniupnpd:*:*:*:*:*:*:*:*;cpe:2.3:a:miniupnp_project:miniupnpd:1.0:*:*:*:*:*:*:*;cpe:2.3:a:miniupnp_project:miniupnpd:1.1:*:*:*:*:*:*:*;cpe:2.3:a:miniupnp_project:miniupnpd:1.2:*:*:*:*:*:*:* CVE-2013-0230,0.0,,0.80141,Stack-based buffer overflow in the ExecuteSoapAction function in the SOAPAction handler in the HTTP service in MiniUPnP MiniUPnPd 1.0 allows remote attackers to execute arbitrary code via a long quoted method.,2013-01-31,Metasploit,cpe:2.3:a:miniupnp_project:miniupnpd:1.0:*:*:*:*:*:*:* CVE-2013-0232,0.0,,0.7823,"includes/functions.php in ZoneMinder Video Server 1.24.0, 1.25.0, and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) runState parameter in the packageControl function; or (2) key or (3) command parameter in the setDeviceStatusX10 function.",2013-03-20,Metasploit,cpe:2.3:a:zoneminder:zoneminder:1.24.0:*:*:*:*:*:*:*;cpe:2.3:a:zoneminder:zoneminder:1.24.1:*:*:*:*:*:*:*;cpe:2.3:a:zoneminder:zoneminder:1.24.2:*:*:*:*:*:*:*;cpe:2.3:a:zoneminder:zoneminder:1.24.3:*:*:*:*:*:*:*;cpe:2.3:a:zoneminder:zoneminder:1.24.4:*:*:*:*:*:*:*;cpe:2.3:a:zoneminder:zoneminder:1.25.0:*:*:*:*:*:*:* CVE-2013-0233,0.0,,0.68821,"Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via unknown vectors, as demonstrated by resetting passwords of arbitrary accounts.",2013-04-25,Metasploit,cpe:2.3:a:plataformatec:devise:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:plataformatec:devise:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:plataformatec:devise:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:plataformatec:devise:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:plataformatec:devise:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:plataformatec:devise:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:plataformatec:devise:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:plataformatec:devise:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:plataformatec:devise:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:plataformatec:devise:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:plataformatec:devise:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:plataformatec:devise:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:plataformatec:devise:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:plataformatec:devise:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:plataformatec:devise:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* CVE-2013-0235,0.0,,0.65276,"The XMLRPC API in WordPress before 3.5.1 allows remote attackers to send HTTP requests to intranet servers, and conduct port-scanning attacks, by specifying a crafted source URL for a pingback, related to a Server-Side Request Forgery (SSRF) issue.",2013-07-08,Metasploit,cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:* CVE-2013-0333,0.0,,0.9119,"lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.",2013-01-30,Metasploit,cpe:2.3:a:rubyonrails:rails:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:2.3.13:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:2.3.14:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:2.3.15:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:* CVE-2013-0422,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93768,"Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.",2013-01-10,Metasploit/CISA,cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* CVE-2013-0431,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.91587,"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka ""Issue 52,"" a different vulnerability than CVE-2013-1490.",2013-01-31,Metasploit/CISA,cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*;cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:* CVE-2013-0625,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.8656,"Adobe ColdFusion 9.0, 9.0.1, and 9.0.2, when a password is not configured, allows remote attackers to bypass authentication and possibly execute arbitrary code via unspecified vectors, as exploited in the wild in January 2013.",2013-01-09,CISA,cpe:2.3:a:adobe:coldfusion:9.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:9.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:9.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:* CVE-2013-0629,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.80964,"Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10, when a password is not configured, allows attackers to access restricted directories via unspecified vectors, as exploited in the wild in January 2013.",2013-01-09,CISA,cpe:2.3:a:adobe:coldfusion:10.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:9.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:9.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:9.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:* CVE-2013-0631,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.75181,"Adobe ColdFusion 9.0, 9.0.1, and 9.0.2 allows attackers to obtain sensitive information via unspecified vectors, as exploited in the wild in January 2013.",2013-01-09,CISA,cpe:2.3:a:adobe:coldfusion:9.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:9.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:9.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:* CVE-2013-0632,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92524,"administrator.cfc in Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote attackers to bypass authentication and possibly execute arbitrary code by logging in to the RDS component using the default empty password and leveraging this session to access the administrative web interface, as exploited in the wild in January 2013.",2013-01-17,Metasploit/CISA,cpe:2.3:a:adobe:coldfusion:10.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:9.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:9.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:9.0:*:*:*:*:*:*:* CVE-2013-0634,0.0,,0.90415,"Adobe Flash Player before 10.3.183.51 and 11.x before 11.5.502.149 on Windows and Mac OS X, before 10.3.183.51 and 11.x before 11.2.202.262 on Linux, before 11.1.111.32 on Android 2.x and 3.x, and before 11.1.115.37 on Android 4.x allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, as exploited in the wild in February 2013.",2013-02-08,Metasploit,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2013-0640,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.92516,"Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, as exploited in the wild in February 2013.",2013-02-14,CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* CVE-2013-0641,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.89391,"Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allows remote attackers to execute arbitrary code via a crafted PDF document, as exploited in the wild in February 2013.",2013-02-14,CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* CVE-2013-0643,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.36303,"The Firefox sandbox in Adobe Flash Player before 10.3.183.67 and 11.x before 11.6.602.171 on Windows and Mac OS X, and before 10.3.183.67 and 11.x before 11.2.202.273 on Linux, does not properly restrict privileges, which makes it easier for remote attackers to execute arbitrary code via crafted SWF content, as exploited in the wild in February 2013.",2013-02-27,CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* CVE-2013-0648,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.36931,"Unspecified vulnerability in the ExternalInterface ActionScript functionality in Adobe Flash Player before 10.3.183.67 and 11.x before 11.6.602.171 on Windows and Mac OS X, and before 10.3.183.67 and 11.x before 11.2.202.273 on Linux, allows remote attackers to execute arbitrary code via crafted SWF content, as exploited in the wild in February 2013.",2013-02-27,CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* CVE-2013-0653,0.0,,0.11956,"Directory traversal vulnerability in substitute.bcl in the WebView CimWeb subsystem in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY 4.01 through 8.0, and Proficy Process Systems with CIMPLICITY, allows remote attackers to read arbitrary files via a crafted packet.",2013-01-27,Metasploit,cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\/scada_cimplicity:4.01:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\/scada_cimplicity:7.5:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\/scada_cimplicity:8.0:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_process_systems_with_cimplicity:-:*:*:*:*:*:*:*;cpe:2.3:h:ge:intelligent_platforms_proficy_process_systems:-:*:*:*:*:*:*:* CVE-2013-0680,0.0,,0.51667,"Stack-based buffer overflow in the web server in Cogent Real-Time Systems Cogent DataHub before 7.3.0, OPC DataHub before 6.4.22, Cascade DataHub before 6.4.22 on Windows, and DataHub QuickTrend before 7.3.0 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long HTTP header.",2013-04-05,Metasploit,cpe:2.3:a:cogentdatahub:cascade_datahub:*:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cascade_datahub:6.4.20:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:*:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.0:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1.63:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:datahub_quicktrend:*:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:opc_datahub:*:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:opc_datahub:6.4.20:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2013-0726,0.0,,0.65422,Stack-based buffer overflow in the ERM_convert_to_correct_webpath function in ermapper_u.dll in ERDAS ER Viewer before 13.00.0001 allows remote attackers to execute arbitrary code via a crafted pathname in an ERS file.,2013-05-05,Metasploit,cpe:2.3:a:hexagon:erdas_er_viewer:*:*:*:*:*:*:*:* CVE-2013-0753,0.0,,0.8806,"Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer component in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via crafted web content.",2013-01-13,Metasploit,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:* CVE-2013-0757,0.0,,0.74572,"The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not prevent modifications to the prototype of an object, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by referencing Object.prototype.__proto__ in a crafted HTML document.",2013-01-13,Metasploit,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:* CVE-2013-0758,0.0,,0.87365,"Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging improper interaction between plugin objects and SVG elements.",2013-01-13,Metasploit,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:* CVE-2013-0803,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.83939,"A PHP File Upload Vulnerability exists in PolarBear CMS 2.5 via upload.php, which could let a malicious user execute arbitrary code.",2020-02-11,Metasploit,cpe:2.3:a:polarbear_cms_project:polarbear_cms:2.5:*:*:*:*:*:*:* CVE-2013-0810,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.82217,"Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, and Windows Server 2008 SP2 allow remote attackers to execute arbitrary code via a crafted screensaver in a theme file, aka ""Windows Theme File Remote Code Execution Vulnerability.""",2013-09-11,Metasploit,cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2013-0928,0.0,,0.78669,"The NetWorker command processor in rrobotd.exe in the Device Manager in EMC AlphaStor 4.0 before build 800 allows remote attackers to execute arbitrary commands via a DCP ""run command"" operation.",2013-01-21,Metasploit,cpe:2.3:a:emc:alphastor:4.0:*:*:*:*:*:*:* CVE-2013-1017,0.0,,0.81301,Buffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted dref atoms in a movie file.,2013-05-24,Metasploit,cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.7:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.8:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.9:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.7.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.7.2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:* CVE-2013-1080,0.0,,0.72916,"The web server in Novell ZENworks Configuration Management (ZCM) 10.3 and 11.2 before 11.2.4 does not properly perform authentication for zenworks/jsp/index.jsp, which allows remote attackers to conduct directory traversal attacks, and consequently upload and execute arbitrary programs, via a request to TCP port 443.",2013-03-29,Metasploit,cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:* CVE-2013-1081,0.0,,0.80561,Directory traversal vulnerability in MDM.php in Novell ZENworks Mobile Management (ZMM) 2.6.1 and 2.7.0 allows remote attackers to include and execute arbitrary local files via the language parameter.,2013-03-11,Metasploit,cpe:2.3:a:novell:zenworks_mobile_management:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_mobile_management:2.7.0:*:*:*:*:*:*:* CVE-2013-1300,0.0,,0.28135,"win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka ""Win32k Memory Allocation Vulnerability.""",2013-07-10,Metasploit,cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* CVE-2013-1331,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.85151,"Buffer overflow in Microsoft Office 2003 SP3 and Office 2011 for Mac allows remote attackers to execute arbitrary code via crafted PNG data in an Office document, leading to improper memory allocation, aka ""Office Buffer Overflow Vulnerability.""",2013-06-12,CISA,cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2011:*:*:*:*:macos:*:* CVE-2013-1347,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.87986,"Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.",2013-05-05,Metasploit/CISA,cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2013-1349,0.0,,0.70857,Eval injection vulnerability in ajax.php in openSIS 4.5 through 5.2 allows remote attackers to execute arbitrary PHP code via the modname parameter.,2013-12-09,Metasploit,cpe:2.3:a:os4ed:opensis:4.5:*:*:*:*:*:*:*;cpe:2.3:a:os4ed:opensis:4.6:*:*:*:*:*:*:*;cpe:2.3:a:os4ed:opensis:4.7:*:*:*:*:*:*:*;cpe:2.3:a:os4ed:opensis:4.8.1:*:*:*:*:*:*:*;cpe:2.3:a:os4ed:opensis:4.8:*:*:*:*:*:*:*;cpe:2.3:a:os4ed:opensis:4.9:*:*:*:*:*:*:*;cpe:2.3:a:os4ed:opensis:5.0:*:*:*:*:*:*:*;cpe:2.3:a:os4ed:opensis:5.1:*:*:*:*:*:*:*;cpe:2.3:a:os4ed:opensis:5.2:*:*:*:*:*:*:* CVE-2013-1359,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.89127,"An Authentication Bypass Vulnerability exists in DELL SonicWALL Analyzer 7.0, Global Management System (GMS) 4.1, 5.0, 5.1, 6.0, and 7.0; Universal Management Appliance (UMA) 5.1, 6.0, and 7.0 and ViewPoint 4.1, 5.0, 5.1, and 6.0 via the skipSessionCheck parameter to the UMA interface (/appliance/), which could let a remote malicious user obtain access to the root account.",2020-02-11,Metasploit,cpe:2.3:a:sonicwall:analyzer:7.0:*:*:*:*:*:*:*;cpe:2.3:a:sonicwall:global_management_system:4.1:*:*:*:*:*:*:*;cpe:2.3:a:sonicwall:global_management_system:5.0:*:*:*:*:*:*:*;cpe:2.3:a:sonicwall:global_management_system:5.1:*:*:*:*:*:*:*;cpe:2.3:a:sonicwall:global_management_system:6.0:*:*:*:*:*:*:*;cpe:2.3:a:sonicwall:global_management_system:7.0:*:*:*:*:*:*:*;cpe:2.3:a:sonicwall:universal_management_appliance:5.1:*:*:*:*:*:*:*;cpe:2.3:a:sonicwall:universal_management_appliance:6.0:*:*:*:*:*:*:*;cpe:2.3:a:sonicwall:universal_management_appliance:7.0:*:*:*:*:*:*:*;cpe:2.3:a:sonicwall:viewpoint:4.1:*:*:*:*:*:*:*;cpe:2.3:a:sonicwall:viewpoint:5.0:*:*:*:*:*:*:*;cpe:2.3:a:sonicwall:viewpoint:6.0:*:*:*:*:*:*:* CVE-2013-1362,0.0,,0.76437,"Incomplete blacklist vulnerability in nrpc.c in Nagios Remote Plug-In Executor (NRPE) before 2.14 might allow remote attackers to execute arbitrary shell commands via ""$()"" shell metacharacters, which are processed by bash.",2013-07-09,Metasploit,cpe:2.3:a:nagios:remote_plug_in_executor:*:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:1.3:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:1.4:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:1.5:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:1.6:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:1.7:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:1.8:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:1.9:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.0:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.0b1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.0b2:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.0b3:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.0b4:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.0b5:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.10:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.11:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.12:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.3:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.4:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.5.2:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.5:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.6:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.7.1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.7:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.8.1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.8:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.8b1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:remote_plug_in_executor:2.9:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* CVE-2013-1391,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.87146,"Authentication bypass vulnerability in the the web interface in Hunt CCTV, Capture CCTV, Hachi CCTV, NoVus CCTV, and Well-Vision Inc DVR systems allows a remote attacker to retrieve the device configuration.",2019-10-30,Metasploit,cpe:2.3:h:capturecctv:cdr_0410ve:-:*:*:*:*:*:*:*;cpe:2.3:h:capturecctv:cdr_0820vde:-:*:*:*:*:*:*:*;cpe:2.3:h:hachi:hv-04rd_pro:-:*:*:*:*:*:*:*;cpe:2.3:h:hachi:hv-08rd_pro:-:*:*:*:*:*:*:*;cpe:2.3:h:huntcctv:dr6-704a4h:-:*:*:*:*:*:*:*;cpe:2.3:h:huntcctv:dr6-708a4h:-:*:*:*:*:*:*:*;cpe:2.3:h:huntcctv:dr6-7316a4h:-:*:*:*:*:*:*:*;cpe:2.3:h:huntcctv:dr6-7316a4hl:-:*:*:*:*:*:*:*;cpe:2.3:h:huntcctv:dvr-04ch:-:*:*:*:*:*:*:*;cpe:2.3:h:huntcctv:dvr-04nc:-:*:*:*:*:*:*:*;cpe:2.3:h:huntcctv:dvr-08ch:-:*:*:*:*:*:*:*;cpe:2.3:h:huntcctv:dvr-08nc:-:*:*:*:*:*:*:*;cpe:2.3:h:huntcctv:dvr-16ch:-:*:*:*:*:*:*:*;cpe:2.3:h:huntcctv:hdr-04kd:-:*:*:*:*:*:*:*;cpe:2.3:h:huntcctv:hdr-08kd:-:*:*:*:*:*:*:*;cpe:2.3:h:novuscctv:nv-dvr1204:-:*:*:*:*:*:*:*;cpe:2.3:h:novuscctv:nv-dvr1208:-:*:*:*:*:*:*:*;cpe:2.3:h:novuscctv:nv-dvr1216:-:*:*:*:*:*:*:*;cpe:2.3:h:vsp:tw-dvr604:-:*:*:*:*:*:*:*;cpe:2.3:h:vsp:tw-dvr616:-:*:*:*:*:*:*:*;cpe:2.3:o:capturecctv:cdr_0410ve_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:capturecctv:cdr_0820vde_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:hachi:hv-04rd_pro_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:hachi:hv-08rd_pro_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:huntcctv:dr6-704a4h_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:huntcctv:dr6-708a4h_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:huntcctv:dr6-7316a4h_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:huntcctv:dr6-7316a4hl_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:huntcctv:dvr-04ch_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:huntcctv:dvr-04nc_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:huntcctv:dvr-08ch_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:huntcctv:dvr-08nc_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:huntcctv:dvr-16ch_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:huntcctv:hdr-04kd_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:huntcctv:hdr-08kd_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:novuscctv:nv-dvr1204_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:novuscctv:nv-dvr1208_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:novuscctv:nv-dvr1216_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:vsp:tw-dvr604_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:vsp:tw-dvr616_firmware:-:*:*:*:*:*:*:* CVE-2013-1412,0.0,,0.8524,"DataLife Engine (DLE) 9.7 allows remote attackers to execute arbitrary PHP code via the catlist[] parameter to engine/preview.php, which is used in a preg_replace function call with an e modifier.",2014-06-02,Metasploit,cpe:2.3:a:dleviet:datalife_engine:9.7:*:*:*:*:*:*:* CVE-2013-1428,0.0,,0.65516,Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.,2013-04-26,Metasploit,cpe:2.3:a:tinc-vpn:tinc:*:*:*:*:*:*:*:*;cpe:2.3:a:tinc-vpn:tinc:*:pre6:*:*:*:*:*:*;cpe:2.3:a:tinc-vpn:tinc:1.0.17:*:*:*:*:*:*:*;cpe:2.3:a:tinc-vpn:tinc:1.0.18:*:*:*:*:*:*:*;cpe:2.3:a:tinc-vpn:tinc:1.0.19:*:*:*:*:*:*:*;cpe:2.3:a:tinc-vpn:tinc:1.1:pre3:*:*:*:*:*:*;cpe:2.3:a:tinc-vpn:tinc:1.1:pre4:*:*:*:*:*:*;cpe:2.3:a:tinc-vpn:tinc:1.1:pre5:*:*:*:*:*:* CVE-2013-1488,0.0,,0.86772,"The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to execute arbitrary code via unspecified vectors involving reflection, Libraries, ""improper toString calls,"" and the JDBC driver manager, as demonstrated by James Forshaw during a Pwn2Own competition at CanSecWest 2013.",2013-03-08,Metasploit,cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:* CVE-2013-1493,0.0,,0.93006,"The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.",2013-03-05,Metasploit,cpe:2.3:a:oracle:jdk:*:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:*:update40:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:*:update41:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update36:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.5.0:update38:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:update40:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:update41:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update28:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update29:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update31:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update33:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:* CVE-2013-1559,0.0,,0.69453,Unspecified vulnerability in the Oracle WebCenter Content component in Oracle Fusion Middleware 10.1.3.5.1 and 11.1.1.6.0 allows remote authenticated users to affect availability via unknown vectors related to Content Server.,2013-04-17,Metasploit,cpe:2.3:a:oracle:fusion_middleware:10.1.3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware:11.1.1.6.0:*:*:*:*:*:*:* CVE-2013-1662,0.0,,0.05605,"vmware-mount in VMware Workstation 8.x and 9.x and VMware Player 4.x and 5.x, on systems based on Debian GNU/Linux, allows host OS users to gain host OS privileges via a crafted lsb_release binary in a directory in the PATH, related to use of the popen library function.",2013-08-24,Metasploit,cpe:2.3:a:vmware:player:4.0.0.18997:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:4.0.6:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:4.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:vmware:player:5.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0.0.18997:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0.1.27038:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0.2:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0.3:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0.4:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0.5:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0.6:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:9.0.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:9.0.2:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation:9.0:*:*:*:*:*:*:* CVE-2013-1675,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,0.02572,"Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 do not properly initialize data structures for the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.",2013-05-16,CISA,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.1:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:5.9_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.4_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:5.9_ppc:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.4_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus_from_rhui:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus_from_rhui:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2013-1690,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.49616,"Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.",2013-06-26,Metasploit/CISA,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:* CVE-2013-1710,0.0,,0.79223,"The crypto.generateCRMFRequest function in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allows remote attackers to execute arbitrary JavaScript code or conduct cross-site scripting (XSS) attacks via vectors related to Certificate Request Message Format (CRMF) request generation.",2013-08-07,Metasploit,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:21.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.3.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.3:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.3:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.3:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.4.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.4:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.4:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.4:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.5:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.5:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.5:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.6:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.6:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.6:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.6:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.7:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.8:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.8:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.8:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.8:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.8:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.8:beta6:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.9.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.9:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.9:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.9:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.9:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:17.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:17.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:17.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:17.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:17.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:17.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:17.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:17.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:17.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:17.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:17.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:17.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:17.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:17.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:17.0:*:*:*:*:*:*:* CVE-2013-1775,0.0,,0.0205,sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.,2013-03-05,Metasploit,cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.10p6:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.5p1:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.5p2:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.5p3:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*;cpe:2.3:a:todd_miller:sudo:1.8.6p6:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* CVE-2013-1814,0.0,,0.87048,"The users/get program in the User RPC API in Apache Rave 0.11 through 0.20 allows remote authenticated users to obtain sensitive information about all user accounts via the offset parameter, as demonstrated by discovering password hashes in the password field of a response.",2013-03-14,Metasploit,cpe:2.3:a:apache:rave:0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:rave:0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:rave:0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:rave:0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:rave:0.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:rave:0.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:rave:0.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:rave:0.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:rave:0.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:rave:0.20:*:*:*:*:*:*:* CVE-2013-1892,0.0,,0.52332,"MongoDB before 2.0.9 and 2.2.x before 2.2.4 does not properly validate requests to the nativeHelper function in SpiderMonkey, which allows remote authenticated users to cause a denial of service (invalid memory access and server crash) or execute arbitrary code via a crafted memory address in the first argument.",2013-10-01,Metasploit,cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:mongodb:mongodb:2.2.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:* CVE-2013-1899,0.0,,0.87534,"Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a ""-"" (hyphen).",2013-04-04,Metasploit,cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*;cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:* CVE-2013-1965,0.0,,0.91333,"Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.",2013-07-10,Nuclei,cpe:2.3:a:apache:struts2-showcase:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* CVE-2013-1966,0.0,,0.90954,Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag.,2013-07-10,Metasploit,cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* CVE-2013-2010,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.83164,WordPress W3 Total Cache Plugin 0.9.2.8 has a Remote PHP Code Execution Vulnerability,2020-02-12,Metasploit,cpe:2.3:a:automattic:wp_super_cache:*:*:*:*:*:wordpress:*:*;cpe:2.3:a:boldgrid:w3_total_cache:*:*:*:*:*:wordpress:*:* CVE-2013-2028,0.0,,0.92536,"The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.",2013-07-20,Metasploit,cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:* CVE-2013-2050,0.0,,0.53746,SQL injection vulnerability in the miq_policy controller in Red Hat CloudForms 2.0 Management Engine (CFME) 5.1 and ManageIQ Enterprise Virtualization Manager 5.0 and earlier allows remote authenticated users to execute arbitrary SQL commands via the profile[] parameter in an explorer action.,2014-01-11,Metasploit,cpe:2.3:a:redhat:cloudforms_management_engine:5.1:*:*:*:*:*:*:*;cpe:2.3:a:redhat:manageiq_enterprise_virtualization_manager:*:*:*:*:*:*:*:* CVE-2013-2068,0.0,,0.75269,"Multiple directory traversal vulnerabilities in the AgentController in Red Hat CloudForms Management Engine 2.0 allow remote attackers to create and overwrite arbitrary files via a .. (dot dot) in the filename parameter to the (1) log, (2) upload, or (3) linuxpkgs method.",2013-09-28,Metasploit,cpe:2.3:a:redhat:cloudforms_management_engine:5.1:*:*:*:*:*:*:* CVE-2013-2094,8.4,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.64419,"The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call.",2013-05-14,CISA,cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* CVE-2013-2113,0.0,,0.22078,The create method in app/controllers/users_controller.rb in Foreman before 1.2.0-RC2 allows remote authenticated users with permissions to create or edit other users to gain privileges by (1) changing the admin flag or (2) assigning an arbitrary role.,2013-07-31,Metasploit,cpe:2.3:a:redhat:openstack:3.0:*:*:*:*:*:*:*;cpe:2.3:a:theforeman:foreman:*:rc1:*:*:*:*:*:*;cpe:2.3:a:theforeman:foreman:1.1:*:*:*:*:*:*:* CVE-2013-2115,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.91303,Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. NOTE: this issue is due to an incomplete fix for CVE-2013-1966.,2013-07-10,Metasploit,cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* CVE-2013-2121,0.0,,0.44295,Eval injection vulnerability in the create method in the Bookmarks controller in Foreman before 1.2.0-RC2 allows remote authenticated users with permissions to create bookmarks to execute arbitrary code via a controller name attribute.,2013-07-31,Metasploit,cpe:2.3:a:redhat:openstack:3.0:*:*:*:*:*:*:*;cpe:2.3:a:theforeman:foreman:*:rc1:*:*:*:*:*:*;cpe:2.3:a:theforeman:foreman:1.1:*:*:*:*:*:*:* CVE-2013-2143,0.0,,0.6343,"The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.",2014-04-17,Metasploit,cpe:2.3:a:redhat:network_satellite:-:*:*:*:*:*:*:*;cpe:2.3:a:theforeman:katello:*:*:*:*:*:*:*:* CVE-2013-2171,0.0,,0.22586,"The vm_map_lookup function in sys/vm/vm_map.c in the mmap implementation in the kernel in FreeBSD 9.0 through 9.1-RELEASE-p4 does not properly determine whether a task should have write access to a memory location, which allows local users to bypass filesystem write permissions and consequently gain privileges via a crafted application that leverages read permissions, and makes mmap and ptrace system calls.",2013-07-02,Metasploit,cpe:2.3:o:freebsd:freebsd:9.0:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:9.1:p4:*:*:*:*:*:* CVE-2013-2248,0.0,,0.93524,Multiple open redirect vulnerabilities in Apache Struts 2.0.0 through 2.3.15 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in a parameter using the (1) redirect: or (2) redirectAction: prefix.,2013-07-20,Nuclei,cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:* CVE-2013-2251,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94226,"Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.",2013-07-20,Metasploit/Nuclei/CISA,cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:archiva:1.2:-:*:*:*:*:*:*;cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*;cpe:2.3:a:fujitsu:interstage_business_process_manager_analytics:12.0:*:*:*:*:*:*:*;cpe:2.3:a:fujitsu:interstage_business_process_manager_analytics:12.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:siebel_apps_-_e-billing:6.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:siebel_apps_-_e-billing:6.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:siebel_apps_-_e-billing:6.2:*:*:*:*:*:*:*;cpe:2.3:h:fujitsu:gp-s:-:*:*:*:*:*:*:*;cpe:2.3:h:fujitsu:gp5000:-:*:*:*:*:*:*:*;cpe:2.3:h:fujitsu:gp7000f:-:*:*:*:*:*:*:*;cpe:2.3:h:fujitsu:primepower:-:*:*:*:*:*:*:*;cpe:2.3:h:fujitsu:primergy:-:*:*:*:*:*:*:*;cpe:2.3:h:fujitsu:sparc:-:*:*:*:*:*:*:*;cpe:2.3:o:fujitsu:gp-s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:fujitsu:gp5000_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:fujitsu:gp7000f_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:fujitsu:primepower_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:fujitsu:primergy_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:fujitsu:sparc_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:* CVE-2013-2287,0.0,,0.1323,Multiple cross-site scripting (XSS) vulnerabilities in views/notify.php in the Uploader plugin 1.0.4 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) notify or (2) blog parameter.,2014-04-04,Nuclei,cpe:2.3:a:roberta_bramski:uploader:1.0.4:*:*:*:*:*:*:* CVE-2013-2333,0.0,,0.81827,"Unspecified vulnerability in HP Storage Data Protector 6.20, 6.21, 7.00, and 7.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1680.",2013-06-06,Metasploit,cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:hp-ux:*:*;cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:redhat_enterprise_linux:*:*;cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:sunos:*:*;cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:suse_linux:*:*;cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:windows_server_2003:*:*;cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:windows_server_2008:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:hp-ux:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:redhat_enterprise_linux:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:sunos:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:suse_linux:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:windows_server_2003:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:windows_server_2008:*:*;cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:hp-ux:*:*;cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:redhat_enterprise_linux:*:*;cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:suse_linux:*:*;cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:windows_server_2003:*:*;cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:windows_server_2008:*:*;cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:hp-ux:*:*;cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:redhat_enterprise_linux:*:*;cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:suse_linux:*:*;cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:windows_server_2003:*:*;cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:windows_server_2008:*:* CVE-2013-2343,0.0,,0.756,"Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1510.",2013-07-02,Metasploit,cpe:2.3:a:hp:lefthand_p4000_virtual_san_appliance:-:*:*:*:*:*:*:*;cpe:2.3:a:hp:lefthand_virtual_san_appliance_hydra:-:*:*:*:*:*:*:*;cpe:2.3:a:hp:lefthand_virtual_san_appliance_hydra_software:*:*:*:*:*:*:*:* CVE-2013-2347,0.0,,0.7679,"The Backup Client Service (OmniInet.exe) in HP Storage Data Protector 6.2X allows remote attackers to execute arbitrary commands or cause a denial of service via a crafted EXEC_BAR packet to TCP port 5555, aka ZDI-CAN-1885.",2014-01-04,Metasploit,cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:hp-ux:*:*;cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:redhat_enterprise_linux:*:*;cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:solaris:*:*;cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:windows_server_2003:*:*;cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:windows_server_2008:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:hp-ux:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:redhat_enterprise_linux:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:solaris:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:windows_server_2003:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:windows_server_2008:*:* CVE-2013-2367,0.0,,0.83849,"Multiple unspecified vulnerabilities in HP SiteScope 11.20 and 11.21, when SOAP is used, allow remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1678.",2013-07-31,Metasploit,cpe:2.3:a:hp:sitescope:11.20:*:*:*:*:*:*:*;cpe:2.3:a:hp:sitescope:11.21:*:*:*:*:*:*:* CVE-2013-2370,0.0,,0.8168,"Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1671.",2013-07-29,Metasploit,cpe:2.3:a:hp:loadrunner:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:11.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:11.50:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.0.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.50.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.52:*:*:*:*:*:*:* CVE-2013-2423,3.7,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N,0.91522,"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown vectors related to HotSpot. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from the original researcher that this vulnerability allows remote attackers to bypass permission checks by the MethodHandles method and modify arbitrary public final fields using reflection and type confusion, as demonstrated using integer and double fields to disable the security manager.",2013-04-17,Metasploit/CISA,cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* CVE-2013-2460,0.0,,0.92076,"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to ""insufficient access checks"" in the tracing component.",2013-06-18,Metasploit,cpe:2.3:a:oracle:jdk:*:update21:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:*:update21:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:* CVE-2013-2465,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9356,"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to ""Incorrect image channel verification"" in 2D.",2013-06-18,Metasploit/CISA,cpe:2.3:a:oracle:jre:1.5.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update39:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update40:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update41:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update45:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update41:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update43:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update45:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:* CVE-2013-2492,0.0,,0.85258,"Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information.",2013-03-15,Metasploit,cpe:2.3:a:firebirdsql:firebird:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:firebirdsql:firebird:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:firebirdsql:firebird:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:firebirdsql:firebird:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:firebirdsql:firebird:2.5.2:*:*:*:*:*:*:*;cpe:2.3:a:firebirdsql:firebird:2.5.3:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2013-2551,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.92382,"Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka ""Internet Explorer Use After Free Vulnerability,"" a different vulnerability than CVE-2013-1308 and CVE-2013-1309.",2013-03-11,Metasploit/CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2013-2566,0.0,,0.90324,"The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.",2013-03-15,Metasploit,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:http_server:11.1.1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:http_server:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:http_server:12.2.1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:*;cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*;cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*;cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*;cpe:2.3:h:fujitsu:sparc_enterprise_m3000:-:*:*:*:*:*:*:*;cpe:2.3:h:fujitsu:sparc_enterprise_m4000:-:*:*:*:*:*:*:*;cpe:2.3:h:fujitsu:sparc_enterprise_m5000:-:*:*:*:*:*:*:*;cpe:2.3:h:fujitsu:sparc_enterprise_m8000:-:*:*:*:*:*:*:*;cpe:2.3:h:fujitsu:sparc_enterprise_m9000:-:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*;cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:fujitsu:sparc_enterprise_m3000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:fujitsu:sparc_enterprise_m4000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:fujitsu:sparc_enterprise_m5000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:fujitsu:sparc_enterprise_m8000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:fujitsu:sparc_enterprise_m9000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:* CVE-2013-2578,0.0,,0.7228,"cgi-bin/admin/servetest in TP-Link IP Cameras TL-SC3130, TL-SC3130G, TL-SC3171, TL-SC3171G, and possibly other models before beta firmware LM.1.6.18P12_sign6 allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the ServerName parameter and (2) other unspecified parameters.",2013-10-11,Metasploit,cpe:2.3:h:tp-link:tl-sc3130:-:*:*:*:*:*:*:*;cpe:2.3:h:tp-link:tl-sc3130g:-:*:*:*:*:*:*:*;cpe:2.3:h:tp-link:tl-sc3171:-:*:*:*:*:*:*:*;cpe:2.3:h:tp-link:tl-sc3171g:-:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:lm_firmware:*:*:*:*:*:*:*:* CVE-2013-2596,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.01741,"Integer overflow in the fb_mmap function in drivers/video/fbmem.c in the Linux kernel before 3.8.9, as used in a certain Motorola build of Android 4.1.2 and other products, allows local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted /dev/graphics/fb0 mmap2 system calls, as demonstrated by the Motochopper pwn program.",2013-04-13,CISA,cpe:2.3:h:motorola:atrix_hd:-:*:*:*:*:*:*:*;cpe:2.3:h:motorola:razr_hd:-:*:*:*:*:*:*:*;cpe:2.3:h:motorola:razr_m:-:*:*:*:*:*:*:*;cpe:2.3:h:qualcomm:msm8960:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:motorola:android:4.1.2:*:*:*:*:*:*:* CVE-2013-2597,8.4,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.05289,"Stack-based buffer overflow in the acdb_ioctl function in audio_acdb.c in the acdb audio driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via an application that leverages /dev/msm_acdb access and provides a large size value in an ioctl argument.",2014-08-31,CISA,cpe:2.3:o:codeaurora:android-msm:2.6.29:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.22:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.23:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.24:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.25:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.26:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.27:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.28:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.29:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.30:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.31:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.32:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.33:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.35:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.36:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.37:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.38:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.39:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.40:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.41:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.42:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.43:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.44:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.45:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.46:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.47:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.48:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.49:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.50:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.51:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.52:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10.53:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.10:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.10:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.11:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.12:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.13:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.14:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.15:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.16:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.17:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.18:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.19:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.20:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.21:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.22:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.23:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.24:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.25:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.26:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.3:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.4:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.5:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.6:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.7:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.8:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.12.9:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13.10:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13.11:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13.1:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13.2:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13.3:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13.4:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13.5:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13.6:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13.7:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13.8:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13.9:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13:rc1:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13:rc2:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13:rc3:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13:rc4:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13:rc5:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13:rc6:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13:rc7:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.13:rc8:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.10:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.11:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.12:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.13:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.14:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.15:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.16:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.1:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.2:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.3:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.4:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.5:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.6:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.7:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.8:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14.9:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14:rc1:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14:rc2:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14:rc3:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14:rc4:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14:rc5:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14:rc6:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14:rc7:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.14:rc8:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15.10:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15.1:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15.2:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15.3:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15.4:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15.5:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15.6:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15.7:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15.8:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15.9:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15:rc1:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15:rc2:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15:rc3:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15:rc4:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15:rc5:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15:rc6:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15:rc7:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.15:rc8:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.16.1:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.16:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.16:rc1:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.16:rc2:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.16:rc3:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.16:rc4:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.16:rc5:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.16:rc6:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.16:rc7:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.17:rc1:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.2.54:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.2.55:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.2.56:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.2.57:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.2.58:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.2.59:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.2.60:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.2.61:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.2.62:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.100:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.101:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.102:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.103:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.72:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.73:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.74:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.75:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.76:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.77:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.78:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.79:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.80:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.81:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.82:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.83:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.84:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.85:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.86:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.87:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.88:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.89:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.90:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.91:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.92:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.93:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.94:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.95:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.96:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.97:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.98:*:*:*:*:*:*:*;cpe:2.3:o:codeaurora:android-msm:3.4.99:*:*:*:*:*:*:* CVE-2013-2621,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.1019,Open Redirection Vulnerability in the redir.php script in Telaen before 1.3.1 allows remote attackers to redirect victims to arbitrary websites via a crafted URL.,2020-02-03,Nuclei,cpe:2.3:a:telaen_project:telaen:*:*:*:*:*:*:*:* CVE-2013-2641,0.0,,0.81816,Directory traversal vulnerability in patience.cgi in Sophos Web Appliance before 3.7.8.2 allows remote attackers to read arbitrary files via the id parameter.,2014-03-18,Metasploit,cpe:2.3:h:sophos:web_appliance:-:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:*:*:*:*:*:*:*:* CVE-2013-2729,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9025,"Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2727.",2013-05-16,CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* CVE-2013-2730,0.0,,0.79575,"Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2733.",2013-05-16,Metasploit,cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.1:-:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.3:-:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.2:-:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.3.1:-:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.3.2:-:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.3.4:-:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.4.1:-:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.4.2:-:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.4.3:-:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.4.4:-:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.4.5:-:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.4.6:-:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.5.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.5.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.5.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.5.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.5.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:* CVE-2013-2751,0.0,,0.83489,"Eval injection vulnerability in frontview/lib/np_handler.pl in the FrontView web interface in NETGEAR ReadyNAS RAIDiator before 4.1.12 and 4.2.x before 4.2.24 allows remote attackers to execute arbitrary Perl code via a crafted request, related to the ""forgot password workflow.""",2013-12-12,Metasploit,cpe:2.3:o:netgear:raidiator:*:*:*:*:*:readynas:*:* CVE-2013-2827,0.0,,0.60519,"An unspecified ActiveX control in WellinTech KingSCADA before 3.1.2, KingAlarm&Event before 3.1, and KingGraphic before 3.1.2 allows remote attackers to download arbitrary DLL code onto a client machine and execute this code via the ProjectURL property value.",2014-01-15,Metasploit,cpe:2.3:a:wellintech:kingalarm\&event:*:*:*:*:*:*:*:*;cpe:2.3:a:wellintech:kinggraphic:*:*:*:*:*:*:*:*;cpe:2.3:a:wellintech:kingscada:*:*:*:*:*:*:*:* CVE-2013-3163,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.88601,"Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka ""Internet Explorer Memory Corruption Vulnerability,"" a different vulnerability than CVE-2013-3144 and CVE-2013-3151.",2013-07-10,Metasploit/CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2013-3184,0.0,,0.78922,"Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka ""Internet Explorer Memory Corruption Vulnerability.""",2013-08-14,Metasploit,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:* CVE-2013-3205,0.0,,0.81239,"Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka ""Internet Explorer Memory Corruption Vulnerability.""",2013-09-11,Metasploit,cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:* CVE-2013-3214,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.88538,vtiger CRM 5.4.0 and earlier contain a PHP Code Injection Vulnerability in 'vtigerolservice.php'.,2020-01-28,Metasploit,cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:* CVE-2013-3215,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.73669,vtiger CRM 5.4.0 and earlier contain an Authentication Bypass Vulnerability due to improper authentication validation in the validateSession function.,2020-01-29,Metasploit,cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:* CVE-2013-3238,0.0,,0.64584,"phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3 allows remote authenticated users to execute arbitrary code via a /e\x00 sequence, which is not properly handled before making a preg_replace function call within the ""Replace table prefix"" feature.",2013-04-26,Metasploit,cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:* CVE-2013-3248,0.0,,0.58194,"Untrusted search path vulnerability in Corel PDF Fusion 1.11 allows local users to gain privileges via a Trojan horse wintab32.dll file in the current working directory, as demonstrated by a directory that contains a .pdf or .xps file.",2013-10-03,Metasploit,cpe:2.3:a:corel:pdf_fusion:1.11:*:*:*:*:*:*:* CVE-2013-3319,0.0,,0.11698,The GetComputerSystem method in the HostControl service in SAP Netweaver 7.03 allows remote attackers to obtain sensitive information via a crafted SOAP request to TCP port 1128.,2013-08-16,Metasploit,cpe:2.3:a:sap:netweaver:7.03:*:*:*:*:*:*:* CVE-2013-3336,0.0,,0.85888,"Unspecified vulnerability in Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote attackers to read arbitrary files via unknown vectors.",2013-05-09,Metasploit,cpe:2.3:a:adobe:coldfusion:10.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:9.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:9.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:9.0:*:*:*:*:*:*:* CVE-2013-3346,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.89373,"Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.",2013-08-30,Metasploit/CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* CVE-2013-3482,0.0,,0.6574,Stack-based buffer overflow in the rf_report_error function in ermapper_u.dll in Intergraph ERDAS ER Viewer before 13.0.1.1301 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long string in an ERS file.,2014-01-19,Metasploit,cpe:2.3:a:hexagon:erdas_er_viewer:*:*:*:*:*:*:*:*;cpe:2.3:a:hexagon:erdas_er_viewer:11.04:*:*:*:*:*:*:*;cpe:2.3:a:hexagon:erdas_er_viewer:13.00.0001:*:*:*:*:*:*:* CVE-2013-3502,0.0,,0.4221,"monarch_scan.cgi in the MONARCH component in GroundWork Monitor Enterprise 6.7.0 allows remote authenticated users to execute arbitrary commands, and consequently obtain sensitive information, by leveraging a JOSSO SSO cookie.",2013-05-08,Metasploit,cpe:2.3:a:gwos:groundwork_monitor:6.7.0:-:enterprise:*:*:*:*:* CVE-2013-3520,0.0,,0.81911,"VMware vCenter Chargeback Manager (aka CBM) before 2.5.1 does not proper handle uploads, which allows remote attackers to execute arbitrary code via unspecified vectors.",2013-06-17,Metasploit,cpe:2.3:a:vmware:vcenter_chargeback_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_chargeback_manager:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_chargeback_manager:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_chargeback_manager:1.6.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_chargeback_manager:1.6.2:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_chargeback_manager:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_chargeback_manager:2.0.1:*:*:*:*:*:*:* CVE-2013-3522,0.0,,0.54117,"SQL injection vulnerability in index.php/ajax/api/reputation/vote in vBulletin 5.0.0 Beta 11, 5.0.0 Beta 28, and earlier allows remote authenticated users to execute arbitrary SQL commands via the nodeid parameter.",2013-05-10,Metasploit,cpe:2.3:a:vbulletin:vbulletin:5.0.0:beta_11:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.0.0:beta_28:*:*:*:*:*:* CVE-2013-3526,0.0,,0.08185,"Cross-site scripting (XSS) vulnerability in js/ta_loaded.js.php in the Traffic Analyzer plugin, possibly 3.3.2 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the aoid parameter.",2013-05-10,Nuclei,cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.6.1:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.4.1:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.5.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.5.2:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.6.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.7.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.7.1:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.8.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.8.1:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.8.2:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.9.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:2.9.1:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:3.3.2:*:*:*:*:*:*:* CVE-2013-3563,0.0,,0.66689,Stack-based buffer overflow in db_netserver in Lianja SQL Server before 1.0.0RC5.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted string to TCP port 8001.,2013-07-04,Metasploit,cpe:2.3:a:lianja:lianja_sql_server:*:rc5.1:*:*:*:*:*:* CVE-2013-3568,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.41064,Cross-site request forgery (CSRF) vulnerability in Cisco Linksys WRT110 allows remote attackers to hijack the authentication of users for requests that have unspecified impact via unknown vectors.,2020-02-06,Metasploit,cpe:2.3:h:cisco:linksys_wrt110:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:linksys_wrt110_firmware:-:*:*:*:*:*:*:* CVE-2013-3576,0.0,,0.46318,ginkgosnmp.inc in HP System Management Homepage (SMH) allows remote authenticated users to execute arbitrary commands via shell metacharacters in the PATH_INFO to smhutil/snmpchp.php.en.,2013-06-14,Metasploit,cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:* CVE-2013-3591,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.799,vTiger CRM 5.3 and 5.4: 'files' Upload Folder Arbitrary PHP Code Execution Vulnerability,2020-02-07,Metasploit,cpe:2.3:a:vtiger:vtiger_crm:5.3.0:-:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:5.4.0:-:*:*:*:*:*:* CVE-2013-3617,0.0,,0.57997,"The XML API in Openbravo ERP 2.5, 3.0, and earlier allows remote authenticated users to read arbitrary files via an XML document with an external entity declaration in conjunction with an entity reference to /ws/dal/ADUser or other /ws/dal/XXX interfaces, related to an XML External Entity (XXE) issue.",2013-11-02,Metasploit,cpe:2.3:a:openbravo:openbravo_erp:*:*:*:*:*:*:*:*;cpe:2.3:a:openbravo:openbravo_erp:2.40:*:*:*:*:*:*:*;cpe:2.3:a:openbravo:openbravo_erp:2.50:*:*:*:*:*:*:* CVE-2013-3619,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.0946,Intelligent Platform Management Interface (IPMI) with firmware for Supermicro X9 generation motherboards before SMT_X9_317 and firmware for Supermicro X8 generation motherboards before SMT X8 312 contain harcoded private encryption keys for the (1) Lighttpd web server SSL interface and the (2) Dropbear SSH daemon.,2020-01-02,Metasploit,cpe:2.3:h:citrix:netscaler:-:*:*:*:*:*:*:*;cpe:2.3:h:citrix:netscaler_sd-wan:-:*:*:*:*:*:*:*;cpe:2.3:h:citrix:netscaler_sdx:-:*:*:*:*:*:*:*;cpe:2.3:h:supermicro:sh7757:-:*:*:*:*:*:*:*;cpe:2.3:h:supermicro:sh7758:-:*:*:*:*:*:*:*;cpe:2.3:o:citrix:netscaler_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:citrix:netscaler_sd-wan_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:citrix:netscaler_sdx_firmware:10:*:*:*:*:*:*:*;cpe:2.3:o:supermicro:smt_x8_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:supermicro:smt_x9_firmware:*:*:*:*:*:*:*:* CVE-2013-3623,0.0,,0.83232,Multiple stack-based buffer overflows in cgi/close_window.cgi in the web interface in the Intelligent Platform Management Interface (IPMI) with firmware before 3.15 (SMT_X9_315) on Supermicro X9 generation motherboards allow remote attackers to execute arbitrary code via the (1) sess_sid or (2) ACT parameter.,2013-12-10,Metasploit,cpe:2.3:o:supermicro:intelligent_platform_management_firmware:*:-:-:*:-:-:x9_generation_motherboards:*;cpe:2.3:o:supermicro:intelligent_platform_management_firmware:2.24:-:-:*:-:-:x9_generation_motherboards:* CVE-2013-3628,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.8978,Zabbix 2.0.9 has an Arbitrary Command Execution Vulnerability,2020-02-07,Metasploit,cpe:2.3:a:zabbix:zabbix:2.0.9:-:*:*:*:*:*:* CVE-2013-3629,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.77052,ISPConfig 3.0.5.2 has Arbitrary PHP Code Execution,2020-02-07,Metasploit,cpe:2.3:a:ispconfig:ispconfig:3.0.5.2:*:*:*:*:*:*:* CVE-2013-3630,0.0,,0.64521,Moodle through 2.5.2 allows remote authenticated administrators to execute arbitrary programs by configuring the aspell pathname and then triggering a spell-check operation within the TinyMCE editor.,2013-11-01,Metasploit,cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.3.3:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.3.4:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.4.4:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.4.5:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.5.0:beta:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.5:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.6.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.6.2:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.6.3:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.6.4:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.6.5:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.6.6:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.6.7:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.6.8:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.7.3:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.7.4:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.7.5:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.7.6:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.8.10:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.8.11:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.8.12:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.8.13:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.8.14:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.8.3:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.8.4:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.8.5:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.8.6:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.8.7:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.8.8:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.8.9:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.10:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.11:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.12:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.13:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.14:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.15:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.16:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.17:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.18:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.8:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:1.9.9:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.1.10:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.1.9:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.2.10:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.2.11:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.2.6:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.2.7:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.2.8:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.2.9:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.4:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.5:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.6:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.7:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.8:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.4.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.4.2:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.4.3:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.4.4:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.4.5:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:* CVE-2013-3631,0.0,,0.52537,"NAS4Free 9.1.0.1.804 and earlier allows remote authenticated users to execute arbitrary PHP code via a request to exec.php, aka the ""Advanced | Execute Command"" feature. NOTE: this issue might not be a vulnerability, since it appears to be part of legitimate, intentionally-exposed functionality by the developer and is allowed within the intended security policy.",2013-11-02,Metasploit,cpe:2.3:a:nas4free:nas4free:*:*:*:*:*:*:*:*;cpe:2.3:a:nas4free:nas4free:9.1.0.1.798:*:*:*:*:*:*:* CVE-2013-3632,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.7891,The Cron service in rpc.php in OpenMediaVault allows remote authenticated users to execute cron jobs as arbitrary users and execute arbitrary commands via the username parameter.,2014-09-29,Metasploit,cpe:2.3:a:openmediavault:openmediavault:-:*:*:*:*:*:*:* CVE-2013-3660,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.69191,"The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka ""Win32k Read AV Vulnerability.""",2013-05-24,Metasploit/CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2013-3763,0.0,,0.7218,"Unspecified vulnerability in the Oracle Endeca Server component in Oracle Fusion Middleware 7.4.0 and 7.5.1.1 allows remote authenticated users to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2013-3764.",2013-07-17,Metasploit,cpe:2.3:a:oracle:fusion_middleware:7.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware:7.5.1.1:*:*:*:*:*:*:* CVE-2013-3827,0.0,,0.91918,"Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2; the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.3.0, 11.1.2.4.0, and 12.1.2.0.0; and the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.1 allows remote attackers to affect confidentiality via unknown vectors related to Java Server Faces or Web Container.",2013-10-16,Nuclei,cpe:2.3:a:oracle:fusion_middleware:10.3.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware:11.1.2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware:11.1.2.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware:12.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware:12.1.2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware:3.1.2:*:*:*:*:*:*:* CVE-2013-3843,0.0,,0.4015,Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.,2014-06-13,Metasploit,cpe:2.3:a:monkey-project:monkey:*:*:*:*:*:*:*:* CVE-2013-3881,0.0,,0.16159,"win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a crafted application, aka ""Win32k NULL Page Vulnerability.""",2013-10-09,Metasploit,cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:* CVE-2013-3893,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.85921,"Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.",2013-09-18,Metasploit/CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:developer-preview:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:release-preview:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:* CVE-2013-3896,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,0.81736,"Microsoft Silverlight 5 before 5.1.20913.0 does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application, aka ""Silverlight Vulnerability.""",2013-10-09,Metasploit/CISA,cpe:2.3:a:microsoft:silverlight:*:*:*:*:*:*:*:* CVE-2013-3897,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.90548,"Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploited in the wild in September and October 2013, aka ""Internet Explorer Memory Corruption Vulnerability.""",2013-10-09,Metasploit/CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2013-3900,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,0.7447,"Why is Microsoft republishing a CVE from 2013? We are republishing CVE-2013-3900 in the Security Update Guide to update the Security Updates table and to inform customers that the EnableCertPaddingCheck is available in all currently supported versions of Windows 10 and Windows 11. While the format is different from the original CVE published in 2013, except for clarifications about how to configure the EnableCertPaddingCheck registry value, the information herein remains unchanged from the original text published on December 10, 2013, Microsoft does not plan to enforce the stricter verification behavior as a default functionality on supported releases of Microsoft Windows. This behavior remains available as an opt-in feature via reg key setting, and is available on supported editions of Windows released since December 10, 2013. This includes all currently supported versions of Windows 10 and Windows 11. The supporting code for this reg key was incorporated at the time of release for Windows 10 and Windows 11, so no security update is required; however, the reg key must be set. See the Security Updates table for the list of affected software. Vulnerability Description A remote code execution vulnerability exists in the way that the WinVerifyTrust function handles Windows Authenticode signature verification for portable executable (PE) files. An anonymous attacker could exploit the vulnerability by modifying an existing signed executable file to leverage unverified portions of the file in such a way as to add malicious code to the file without invalidating the signature. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of this vulnerability requires that a user or application run or install a specially crafted, signed PE file. An attacker could modify an... See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900",2013-12-11,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_11_24h2:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_11_24h2:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2025:-:*:*:*:*:*:*:* CVE-2013-3906,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.92746,"GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013.",2013-11-06,Metasploit/CISA,cpe:2.3:a:microsoft:excel_viewer:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:lync:2010:*:*:*:attendee:*:*:*;cpe:2.3:a:microsoft:lync:2013:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2010:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:powerpoint_viewer:2010:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:powerpoint_viewer:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:word_viewer:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2013-3918,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.87059,"The InformationCardSigninHelper Class ActiveX control in icardie.dll in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted web page that is accessed by Internet Explorer, as exploited in the wild in November 2013, aka ""InformationCardSigninHelper Vulnerability.""",2013-11-12,Metasploit/CISA,cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2013-3928,0.0,,0.76868,Stack-based buffer overflow in the ReadFile function in flt_BMP.dll in Chasys Draw IES before 4.11.02 allows remote attackers to execute arbitrary code via crafted biPlanes and biBitCount fields in a BMP file.,2014-03-11,Metasploit,cpe:2.3:a:jpchacha:chasys_draw_ies:*:*:*:*:*:*:*:*;cpe:2.3:a:jpchacha:chasys_draw_ies:4.00.01:*:*:*:*:*:*:*;cpe:2.3:a:jpchacha:chasys_draw_ies:4.01.01:*:*:*:*:*:*:*;cpe:2.3:a:jpchacha:chasys_draw_ies:4.02.01:*:*:*:*:*:*:*;cpe:2.3:a:jpchacha:chasys_draw_ies:4.03.02:*:*:*:*:*:*:*;cpe:2.3:a:jpchacha:chasys_draw_ies:4.04.01:*:*:*:*:*:*:*;cpe:2.3:a:jpchacha:chasys_draw_ies:4.06.02:*:*:*:*:*:*:* CVE-2013-3956,0.0,,0.02153,"The NICM.SYS kernel driver 3.1.11.0 in Novell Client 4.91 SP5 on Windows XP and Windows Server 2003; Novell Client 2 SP2 on Windows Vista and Windows Server 2008; and Novell Client 2 SP3 on Windows Server 2008 R2, Windows 7, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted 0x143B6B IOCTL call.",2013-07-31,Metasploit,cpe:2.3:a:novell:client:2.0:sp2:*:*:*:*:*:*;cpe:2.3:a:novell:client:2.0:sp3:*:*:*:*:*:*;cpe:2.3:a:novell:client:4.91:sp5:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:* CVE-2013-3975,0.0,,0.4835,"Unspecified vulnerability in the Meeting Server in IBM Sametime 8.x through 8.5.2.1 and 9.x through 9.0.0.1 allows remote attackers to discover user names, full names, and e-mail addresses via a search.",2014-05-26,Metasploit,cpe:2.3:a:ibm:sametime:8.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.0.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.0.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.0.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:9.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:9.0.0.1:*:*:*:*:*:*:* CVE-2013-3977,0.0,,0.29135,The Meeting Server in IBM Sametime 8.x through 8.5.2.1 and 9.x through 9.0.0.1 allows remote attackers to determine which meeting rooms are owned by a user by leveraging knowledge of valid user names.,2014-05-26,Metasploit,cpe:2.3:a:ibm:sametime:8.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.0.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.0.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.0.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:9.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:9.0.0.1:*:*:*:*:*:*:* CVE-2013-3982,0.0,,0.37245,The Meeting Server in IBM Sametime 8.x through 8.5.2.1 and 9.x through 9.0.0.1 allows remote attackers to obtain unspecified installation information and technical data via a request to a public page.,2014-05-26,Metasploit,cpe:2.3:a:ibm:sametime:8.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.0.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.0.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.0.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:9.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sametime:9.0.0.1:*:*:*:*:*:*:* CVE-2013-3986,0.0,,0.40565,IBM Lotus Sametime 8.5.2 and 8.5.2.1 allows remote attackers to cause a denial of service (WebPlayer Firefox extension crash) via a crafted Audio Visual (AV) session.,2013-11-08,Metasploit,cpe:2.3:a:ibm:lotus_sametime:8.5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_sametime:8.5.2:*:*:*:*:*:*:* CVE-2013-3993,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,0.16966,"IBM InfoSphere BigInsights before 2.1.0.3 allows remote authenticated users to bypass intended file and directory restrictions, or access untrusted data or code, via crafted parameters in unspecified API calls.",2014-07-07,CISA,cpe:2.3:a:ibm:infosphere_biginsights:*:*:*:*:*:*:*:* CVE-2013-4011,0.0,,0.08468,"Multiple unspecified vulnerabilities in the InfiniBand subsystem in IBM AIX 6.1 and 7.1, and VIOS 2.2.2.2-FP-26 SP-02, allow local users to gain privileges via vectors involving (1) arp.ib or (2) ibstat.",2013-07-18,Metasploit,cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:vios:2.2.2.2:fp-26_sp-02:*:*:*:*:*:* CVE-2013-4074,0.0,,0.33476,"The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",2013-06-09,Metasploit,cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.15:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* CVE-2013-4117,0.0,,0.11755,Cross-site scripting (XSS) vulnerability in includes/CatGridPost.php in the Category Grid View Gallery plugin 2.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the ID parameter.,2013-07-16,Nuclei,cpe:2.3:a:anshul_sharma:category-grid-view-gallery:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2013-4124,0.0,,0.86808,"Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.",2013-08-06,Metasploit,cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:* CVE-2013-4164,0.0,,0.16449,"Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.",2013-11-23,Metasploit,cpe:2.3:a:ruby-lang:ruby:1.8:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:2.1:preview1:*:*:*:*:*:* CVE-2013-4211,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.88604,"A Code Execution Vulnerability exists in OpenX Ad Server 2.8.10 due to a backdoor in flowplayer-3.1.1.min.js library, which could let a remote malicious user execute arbitrary PHP code",2020-02-14,Metasploit,cpe:2.3:a:openx:openx:2.8.10:*:*:*:*:*:*:* CVE-2013-4212,0.0,,0.89306,"Certain getText methods in the ActionSupport controller in Apache Roller before 5.0.2 allow remote attackers to execute arbitrary OGNL expressions via the first or second parameter, as demonstrated by the pageTitle parameter in the !getPageTitle sub-URL to roller-ui/login.rol, which uses a subclass of UIAction, aka ""OGNL Injection.""",2013-12-07,Metasploit,cpe:2.3:a:apache:roller:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:roller:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:roller:4.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:roller:5.0:*:*:*:*:*:*:* CVE-2013-4341,0.0,,0.13058,"Multiple cross-site scripting (XSS) vulnerabilities in Moodle through 2.2.11, 2.3.x before 2.3.9, 2.4.x before 2.4.6, and 2.5.x before 2.5.2 allow remote attackers to inject arbitrary web script or HTML via a crafted blog link within an RSS feed.",2013-09-16,Metasploit,cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.4:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.5:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.6:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.7:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.3.8:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.4.1:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.4.2:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.4.3:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.4.4:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.4.5:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*;cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:* CVE-2013-4450,0.0,,0.68714,The HTTP server in Node.js 0.10.x before 0.10.21 and 0.8.x before 0.8.26 allows remote attackers to cause a denial of service (memory and CPU consumption) by sending a large number of pipelined requests without reading the response.,2013-10-21,Metasploit,cpe:2.3:a:nodejs:nodejs:0.10.0:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.10:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.11:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.12:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.13:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.14:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.15:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.16:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.17:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.18:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.19:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.1:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.20:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.2:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.3:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.4:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.5:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.6:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.7:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.8:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.10.9:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.0:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.10:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.11:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.12:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.13:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.14:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.15:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.16:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.17:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.18:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.19:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.1:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.20:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.21:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.22:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.23:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.24:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.25:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.2:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.3:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.4:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.5:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.6:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.7:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.8:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:nodejs:0.8.9:*:*:*:*:*:*:* CVE-2013-4467,0.0,,0.7371,"Multiple SQL injection vulnerabilities in the agent interface (agc/) in VICIDIAL dialer (aka Asterisk GUI client) 2.8-403a, 2.7, 2.7RC1, and earlier allow (1) remote attackers to execute arbitrary SQL commands via the campaign variable in SCRIPT_multirecording_AJAX.php, (2) remote authenticated users to execute arbitrary SQL commands via the server_ip parameter to manager_send.php, or (3) other unspecified vectors. NOTE: some of these details are obtained from third party information.",2014-03-11,Metasploit,cpe:2.3:a:vicidial:vicidial:*:-:*:*:*:*:*:*;cpe:2.3:a:vicidial:vicidial:2.7:rc1:*:*:*:*:*:*;cpe:2.3:a:vicidial:vicidial:2.8:403a:*:*:*:*:*:* CVE-2013-4468,0.0,,0.81815,"VICIDIAL dialer (aka Asterisk GUI client) 2.8-403a, 2.7, 2.7RC1, and earlier allows remote authenticated users to execute arbitrary commands via shell metacharacters in the extension parameter in an OriginateVDRelogin action to manager_send.php.",2014-05-14,Metasploit,cpe:2.3:a:vicidial:vicidial:*:403a:*:*:*:*:*:*;cpe:2.3:a:vicidial:vicidial:2.7:-:*:*:*:*:*:*;cpe:2.3:a:vicidial:vicidial:2.7:rc1:*:*:*:*:*:* CVE-2013-4490,0.0,,0.48021,"The SSH key upload feature (lib/gitlab_keys.rb) in gitlab-shell before 1.7.3, as used in GitLab 5.0 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands via shell metacharacters in the public key.",2014-05-13,Metasploit,cpe:2.3:a:gitlab:gitlab-shell:*:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab-shell:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab-shell:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab-shell:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab-shell:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab-shell:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab-shell:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab-shell:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab-shell:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab-shell:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab:5.4.0:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab:6.1.0:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab:6.2.0:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab:6.2.1:*:*:*:*:*:*:*;cpe:2.3:a:gitlab:gitlab:6.2.2:*:*:*:*:*:*:* CVE-2013-4614,0.0,,0.08011,"English/pages_MacUS/wls_set_content.html on the Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers shows the Wi-Fi PSK passphrase in cleartext, which allows physically proximate attackers to obtain sensitive information by reading the screen of an unattended workstation.",2013-06-21,Metasploit,cpe:2.3:h:canon:mg3100_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mg5300_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mg6100_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mp340_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mp495_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mx870_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mx890_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mx920_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mx922_printer:-:*:*:*:*:*:*:* CVE-2013-4615,0.0,,0.63316,"The Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers allow remote attackers to cause a denial of service (device hang) via a crafted LAN_TXT24 parameter to English/pages_MacUS/cgi_lan.cgi followed by a direct request to English/pages_MacUS/lan_set_content.html. NOTE: the vendor has apparently responded by stating ""Canon believes that its printers will not have to deal with unauthorized access to the network from an external location as long as the printers are used in a secured environment.""",2013-06-21,Metasploit,cpe:2.3:h:canon:mg3100_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mg5300_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mg6100_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mp340_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mp495_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mx870_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mx890_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mx920_printer:-:*:*:*:*:*:*:*;cpe:2.3:h:canon:mx922_printer:-:*:*:*:*:*:*:* CVE-2013-4625,0.0,,0.08892,Cross-site scripting (XSS) vulnerability in files/installer.cleanup.php in the Duplicator plugin before 0.4.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the package parameter.,2013-08-09,Nuclei,cpe:2.3:a:cory_lamle:duplicator:*:*:*:*:*:*:*:*;cpe:2.3:a:cory_lamle:duplicator:0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:cory_lamle:duplicator:0.4.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2013-4660,0.0,,0.64507,"The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.",2013-06-28,Metasploit,cpe:2.3:a:js-yaml_project:js-yaml:*:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:0.2.0:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:0.2.1:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:0.2.2:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:0.3.0:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:0.3.2:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:0.3.3:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:0.3.4:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:0.3.5:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:0.3.6:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:0.3.7:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:js-yaml_project:js-yaml:2.0.3:*:*:*:*:*:*:* CVE-2013-4710,0.0,,0.75993,"Android 3.0 through 4.1.x on Disney Mobile, eAccess, KDDI, NTT DOCOMO, SoftBank, and other devices does not properly implement the WebView class, which allows remote attackers to execute arbitrary methods of Java objects or cause a denial of service (reboot) via a crafted web page, as demonstrated by use of the WebView.addJavascriptInterface method, a related issue to CVE-2012-6636.",2014-03-03,Metasploit,cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*;cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*;cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*;cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*;cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*;cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*;cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:* CVE-2013-4730,0.0,,0.75873,Buffer overflow in PCMan's FTP Server 2.0.7 allows remote attackers to execute arbitrary code via a long string in a USER command.,2014-05-15,Metasploit,cpe:2.3:a:pcman\'s_ftp_server_project:pcman\'s_ftp_server:2.0.7:*:*:*:*:*:*:* CVE-2013-4782,0.0,,0.58322,The Supermicro BMC implementation allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password.,2013-07-08,Metasploit,cpe:2.3:h:supermicro:bmc:*:*:*:*:*:*:*:* CVE-2013-4786,0.0,,0.66567,"The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.",2013-07-08,Metasploit,cpe:2.3:a:intel:intelligent_platform_management_interface:2.0:*:*:*:*:*:*:*;cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:* CVE-2013-4798,0.0,,0.82917,"Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1705.",2013-07-29,Metasploit,cpe:2.3:a:hp:loadrunner:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:11.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:11.50:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.0.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.50.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.52:*:*:*:*:*:*:* CVE-2013-4800,0.0,,0.71373,"Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1735.",2013-07-29,Metasploit,cpe:2.3:a:hp:loadrunner:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:11.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:11.50:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.0.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.50.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.52:*:*:*:*:*:*:* CVE-2013-4810,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.8588,"HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, Identity Driven Manager (IDM) 4.0, and Application Lifecycle Management allow remote attackers to execute arbitrary code via a marshalled object to (1) EJBInvokerServlet or (2) JMXInvokerServlet, aka ZDI-CAN-1760. NOTE: this is probably a duplicate of CVE-2007-1036, CVE-2010-0738, and/or CVE-2012-0874.",2013-09-16,CISA,cpe:2.3:a:hp:application_lifecycle_management:-:*:*:*:*:*:*:*;cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:-:*:*:*;cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:plus:*:*:*;cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:-:*:*:*;cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:plus:*:*:* CVE-2013-4811,0.0,,0.83544,"UpdateDomainControllerServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the adCert argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.",2013-09-16,Metasploit,cpe:2.3:a:hp:identity_driven_manager:4.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:*:*:*;cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:*:*:* CVE-2013-4812,0.0,,0.73996,"UpdateCertificatesServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the fileName argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.",2013-09-16,Metasploit,cpe:2.3:a:hp:identity_driven_manager:4.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:*:*:*;cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:*:*:* CVE-2013-4822,0.0,,0.74063,"Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Branch Intelligent Management System Software Module (aka BIMS) allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1606.",2013-10-13,Metasploit,cpe:2.3:a:hp:imc_branch_intelligent_management_system_software_module:5.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:imc_branch_intelligent_management_system_software_module:5.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:imc_branch_intelligent_management_system_software_module:5.2:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h03:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h04:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l01:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l02:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.1:e0101p01:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.2:*:*:*:*:*:*:* CVE-2013-4823,0.0,,0.77228,"Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Branch Intelligent Management System Software Module (aka BIMS) allows remote attackers to obtain sensitive information via unknown vectors, aka ZDI-CAN-1607.",2013-10-13,Metasploit,cpe:2.3:a:hp:imc_branch_intelligent_management_system_software_module:5.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:imc_branch_intelligent_management_system_software_module:5.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:imc_branch_intelligent_management_system_software_module:5.2:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h03:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h04:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l01:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l02:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.1:e0101p01:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:5.2:*:*:*:*:*:*:* CVE-2013-4824,0.0,,0.777,"Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Service Operation Management Software Module allows remote attackers to bypass authentication via unknown vectors, aka ZDI-CAN-1644.",2013-10-13,Metasploit,cpe:2.3:a:hp:imc_service_operation_management_software_module:-:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:* CVE-2013-4826,0.0,,0.77228,"Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Service Operation Management Software Module allows remote attackers to obtain sensitive information via unknown vectors, aka ZDI-CAN-1647.",2013-10-13,Metasploit,cpe:2.3:a:hp:imc_service_operation_management_software_module:-:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:* CVE-2013-4835,0.0,,0.79304,"The APISiteScopeImpl SOAP service in HP SiteScope 10.1x and 11.x before 11.22 allows remote attackers to bypass authentication and execute arbitrary code via a direct request to the issueSiebelCmd method, aka ZDI-CAN-1765.",2013-11-04,Metasploit,cpe:2.3:a:hp:sitescope:10.11:*:*:*:*:*:*:*;cpe:2.3:a:hp:sitescope:10.13:*:*:*:*:*:*:*;cpe:2.3:a:hp:sitescope:11.01:*:*:*:*:*:*:*;cpe:2.3:a:hp:sitescope:11.10:*:*:*:*:*:*:*;cpe:2.3:a:hp:sitescope:11.11:*:*:*:*:*:*:*;cpe:2.3:a:hp:sitescope:11.12:*:*:*:*:*:*:*;cpe:2.3:a:hp:sitescope:11.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:sitescope:11.20:*:*:*:*:*:*:*;cpe:2.3:a:hp:sitescope:11.21:*:*:*:*:*:*:* CVE-2013-4837,0.0,,0.756,"Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1832.",2013-11-04,Metasploit,cpe:2.3:a:hp:loadrunner:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:11.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:11.50:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.0.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.50.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:9.52:*:*:*:*:*:*:* CVE-2013-4983,0.0,,0.92719,The get_referers function in /opt/ws/bin/sblistpack in Sophos Web Appliance before 3.7.9.1 and 3.8 before 3.8.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the domain parameter to end-user/index.php.,2013-09-10,Metasploit,cpe:2.3:a:sophos:web_appliance_firmware:3.7.8:*:*:*:*:*:*:*;cpe:2.3:h:sophos:web_appliance:-:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.1.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.0.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.2.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.6:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.7:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.3.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.6.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.6:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.3.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.6:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.7:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.8:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.1.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.1.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.6:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.1.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.2.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.2.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.2.4.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.2.4.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.4.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.4.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.6:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.7:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.8.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.8.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.8.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.8.1:*:*:*:*:*:*:* CVE-2013-4984,0.0,,0.07766,The close_connections function in /opt/cma/bin/clear_keys.pl in Sophos Web Appliance before 3.7.9.1 and 3.8 before 3.8.1.1 allows local users to gain privileges via shell metacharacters in the second argument.,2013-09-10,Metasploit,cpe:2.3:a:sophos:web_appliance:*:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.0.5.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.1.4:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.2.5:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.2.6:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.2.7:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.3.4:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.3.5:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.3.6.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.3.6:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.4.0:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.4.2:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.4.3:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.4.4:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.4.5:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.4.6:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.4.7:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.4.8:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.5.0:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.6.1.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.6.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.6.2.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.6.2.3:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.6.2.4.0:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.6.2.4.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.6.4.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.6.4.2:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.7.0:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.7.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.7.2:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.7.3:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.7.4:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.7.5:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.7.6:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.7.7:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.7.8.1:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.7.8.2:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.7.8:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.8.0:*:*:*:*:*:*:*;cpe:2.3:a:sophos:web_appliance:3.8.1:*:*:*:*:*:*:* CVE-2013-4988,0.0,,0.81145,Stack-based buffer overflow in IcoFX 2.5 and earlier allows remote attackers to execute arbitrary code via a long idCount value in an ICONDIR structure in an ICO file. NOTE: some of these details are obtained from third party information.,2013-12-13,Metasploit,cpe:2.3:a:icofx:icofx:*:*:*:*:*:*:*:*;cpe:2.3:a:icofx:icofx:1.6.1:*:*:*:*:*:*:*;cpe:2.3:a:icofx:icofx:1.6.2:*:*:*:*:*:*:*;cpe:2.3:a:icofx:icofx:1.6.3:*:*:*:*:*:*:*;cpe:2.3:a:icofx:icofx:1.6.4:*:*:*:*:*:*:*;cpe:2.3:a:icofx:icofx:1.6:*:*:*:*:*:*:*;cpe:2.3:a:icofx:icofx:2.0:*:*:*:*:*:*:*;cpe:2.3:a:icofx:icofx:2.1:*:*:*:*:*:*:*;cpe:2.3:a:icofx:icofx:2.2:*:*:*:*:*:*:*;cpe:2.3:a:icofx:icofx:2.3:*:*:*:*:*:*:*;cpe:2.3:a:icofx:icofx:2.4:*:*:*:*:*:*:* CVE-2013-5014,0.0,,0.86196,"The management console in Symantec Endpoint Protection Manager (SEPM) 11.0 before 11.0.7405.1424 and 12.1 before 12.1.4023.4080, and Symantec Protection Center Small Business Edition 12.x before 12.1.4023.4080, allows remote attackers to read arbitrary files via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.",2014-02-14,Metasploit,cpe:2.3:a:symantec:endpoint_protection_manager:11.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:endpoint_protection_manager:12.1.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:endpoint_protection_manager:12.1.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec:endpoint_protection_manager:12.1.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec:endpoint_protection_manager:12.1.3:*:*:*:*:*:*:*;cpe:2.3:a:symantec:protection_center:12.0:*:*:*:small_business:*:*:* CVE-2013-5015,0.0,,0.74049,"SQL injection vulnerability in the management console in Symantec Endpoint Protection Manager (SEPM) 11.0 before 11.0.7405.1424 and 12.1 before 12.1.4023.4080, and Symantec Protection Center Small Business Edition 12.x before 12.1.4023.4080, allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.",2014-02-14,Metasploit,cpe:2.3:a:symantec:endpoint_protection_manager:11.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:endpoint_protection_manager:12.1.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:endpoint_protection_manager:12.1.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec:endpoint_protection_manager:12.1.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec:endpoint_protection_manager:12.1.3:*:*:*:*:*:*:*;cpe:2.3:a:symantec:protection_center:12.0:*:*:*:small_business:*:*:* CVE-2013-5019,0.0,,0.82694,Stack-based buffer overflow in Ultra Mini HTTPD 1.21 allows remote attackers to execute arbitrary code via a long resource name in an HTTP request.,2013-07-31,Metasploit,cpe:2.3:a:vector:ultra_mini_httpd:1.21:*:*:*:*:*:*:* CVE-2013-5036,0.0,,0.80499,The Square Squash allows remote attackers to execute arbitrary code via a YAML document in the (1) namespace parameter to the deobfuscation function or (2) sourcemap parameter to the sourcemap function in app/controllers/api/v1_controller.rb.,2014-05-27,Metasploit,cpe:2.3:a:squash:square_squash:-:*:*:*:*:*:*:* CVE-2013-5045,0.0,,0.16614,"Microsoft Internet Explorer 10 and 11 allows local users to bypass the Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code, aka ""Internet Explorer Elevation of Privilege Vulnerability.""",2013-12-11,Metasploit,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:* CVE-2013-5065,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.62098,"NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in November 2013.",2013-11-28,Metasploit/CISA,cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2013-5093,0.0,,0.8408,"The renderLocalView function in render/views.py in graphite-web in Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object.",2013-09-27,Metasploit,cpe:2.3:a:graphite_project:graphite:0.9.10:*:*:*:*:*:*:*;cpe:2.3:a:graphite_project:graphite:0.9.5:*:*:*:*:*:*:*;cpe:2.3:a:graphite_project:graphite:0.9.6:*:*:*:*:*:*:*;cpe:2.3:a:graphite_project:graphite:0.9.7:*:*:*:*:*:*:*;cpe:2.3:a:graphite_project:graphite:0.9.8:*:*:*:*:*:*:*;cpe:2.3:a:graphite_project:graphite:0.9.9:*:*:*:*:*:*:* CVE-2013-5211,0.0,,0.9173,"The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.",2014-01-02,Metasploit,cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:-:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p0:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p10:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p11:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p12:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p13:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p14:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p15:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p16:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p17:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p18:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p19:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p20:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p21:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p22:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p23:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p24:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p25:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p2:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p3:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p4:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p5:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p6:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p7:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p8:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.7:p9:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:* CVE-2013-5223,5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,0.35461,"Multiple cross-site scripting (XSS) vulnerabilities in D-Link DSL-2760U Gateway (Rev. E1) allow remote authenticated users to inject arbitrary web script or HTML via the (1) ntpServer1 parameter to sntpcfg.cgi, username parameter to (2) ddnsmngr.cmd or (3) todmngr.tod, (4) TodUrlAdd parameter to urlfilter.cmd, (5) appName parameter to scprttrg.cmd, (6) fltName in an add action or (7) rmLst parameter in a remove action to scoutflt.cmd, (8) groupName parameter to portmapcfg.cmd, (9) snmpRoCommunity parameter to snmpconfig.cgi, (10) fltName parameter to scinflt.cmd, (11) PolicyName in an add action or (12) rmLst parameter in a remove action to prmngr.cmd, (13) ippName parameter to ippcfg.cmd, (14) smbNetBiosName or (15) smbDirName parameter to samba.cgi, or (16) wlSsid parameter to wlcfg.wl.",2013-11-19,CISA,cpe:2.3:h:dlink:dsl-2760u:e1:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dsl-2760u_firmware:*:*:*:*:*:*:*:* CVE-2013-5331,0.0,,0.87693,"Adobe Flash Player before 11.7.700.257 and 11.8.x and 11.9.x before 11.9.900.170 on Windows and Mac OS X and before 11.2.202.332 on Linux, Adobe AIR before 3.9.0.1380, Adobe AIR SDK before 3.9.0.1380, and Adobe AIR SDK & Compiler before 3.9.0.1380 allow remote attackers to execute arbitrary code via crafted .swf content that leverages an unspecified ""type confusion,"" as exploited in the wild in December 2013.",2013-12-11,Metasploit,cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2013-5447,0.0,,0.69326,Stack-based buffer overflow in IBM Forms Viewer 4.x before 4.0.0.3 and 8.x before 8.0.1.1 allows remote attackers to execute arbitrary code via an XFDL form with a long fontname value.,2013-12-10,Metasploit,cpe:2.3:a:ibm:forms_viewer:4.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:forms_viewer:4.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:forms_viewer:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:forms_viewer:8.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:forms_viewer:8.0.1:*:*:*:*:*:*:* CVE-2013-5486,0.0,,0.88677,"Directory traversal vulnerability in processImageSave.jsp in DCNM-SAN Server in Cisco Prime Data Center Network Manager (DCNM) before 6.2(1) allows remote attackers to write arbitrary files via the chartid parameter, aka Bug IDs CSCue77035 and CSCue77036. NOTE: this can be leveraged to execute arbitrary commands by using the JBoss autodeploy functionality.",2013-09-23,Metasploit,cpe:2.3:a:cisco:prime_data_center_network_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:4.1\(2\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:4.1\(3\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:4.1\(4\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:4.1\(5\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:4.2\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:4.2\(3\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:5.0\(2\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:5.0\(3\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:5.1\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:5.1\(2\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:5.1\(3u\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:5.2\(2\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:5.2\(2a\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:5.2\(2b\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:5.2\(2c\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:5.2\(2e\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:6.1\(1a\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:6.1\(1b\):*:*:*:*:*:*:* CVE-2013-5528,0.0,,0.61502,"Directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815.",2013-10-11,Nuclei,cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:* CVE-2013-5576,0.0,,0.53436,"administrator/components/com_media/helpers/media.php in the media manager in Joomla! 2.5.x before 2.5.14 and 3.x before 3.1.5 allows remote authenticated users or remote attackers to bypass intended access restrictions and upload files with dangerous extensions via a filename with a trailing . (dot), as exploited in the wild in August 2013.",2013-10-09,Metasploit,cpe:2.3:a:joomla:joomla\!:2.5.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.10:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.11:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.12:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.13:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.6:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.7:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.8:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.9:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.4:*:*:*:*:*:*:* CVE-2013-5696,0.0,,0.6873,"inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action.",2013-09-23,Metasploit,cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.20:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.21:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.30:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.31:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.40:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.41:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.42:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.51:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.51a:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.5:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.5:rc1:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.5:rc2:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.65:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.65:rc1:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.65:rc2:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.68.1:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.68.2:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.68.3:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.68:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.68:rc1:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.68:rc2:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.68:rc3:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.6:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.6:rc1:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.6:rc2:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.6:rc3:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.70.1:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.70.2:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.70:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.70:rc1:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.70:rc2:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.70:rc3:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.71.1:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.71.1:rc1:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.71.1:rc2:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.71.1:rc3:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.71.2:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.71.3:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.71.4:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.71.5:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.71.6:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.71:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.72.1:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.72.2:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.72.3:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.72.4:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.72:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.72:rc1:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.72:rc2:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.72:rc3:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.78.1:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.78.2:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.78.3:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.78.4:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.78.5:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.78:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.80.1:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.80.2:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.80.3:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.80.4:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.80.5:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.80.61:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.80.6:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.80.7:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.80:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.83.1:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.83.2:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.83.31:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.83.3:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.83.4:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.83.5:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.83.6:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.83.7:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.83.8:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.83.91:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.83.9:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.83:*:*:*:*:*:*:*;cpe:2.3:a:glpi-project:glpi:0.84:*:*:*:*:*:*:* CVE-2013-5743,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.82373,"Multiple SQL injection vulnerabilities in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.9rc1, and 2.1.x before 2.1.7.",2019-12-11,Metasploit,cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* CVE-2013-5795,0.0,,0.74836,"Unspecified vulnerability in the Oracle Demantra Demand Management component in Oracle Supply Chain Products Suite 7.2.0.3 SQL-Server, 7.3.0, 7.3.1, 12.2.1, 12.2.2, and 12.2.3 allows remote attackers to affect confidentiality via unknown vectors related to DM Others.",2014-01-15,Metasploit,cpe:2.3:a:oracle:supply_chain_products_suite:7.2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:12.2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:12.2.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:12.2.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:7.3.1:*:*:*:*:*:*:* CVE-2013-5877,0.0,,0.7805,"Unspecified vulnerability in the Oracle Demantra Demand Management component in Oracle Supply Chain Products Suite 7.2.0.3 SQL-Server, 7.3.0, 7.3.1, 12.2.0, and 12.2.1 allows remote attackers to affect confidentiality via unknown vectors related to DM Others.",2014-01-15,Metasploit,cpe:2.3:a:oracle:supply_chain_products_suite:7.2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:12.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:12.2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:7.3.1:*:*:*:*:*:*:* CVE-2013-5880,0.0,,0.78613,"Unspecified vulnerability in the Oracle Demantra Demand Management component in Oracle Supply Chain Products Suite 12.2.0, 12.2.1, and 12.2.2 allows remote attackers to affect confidentiality via unknown vectors related to DM Others.",2014-01-15,Metasploit,cpe:2.3:a:oracle:supply_chain_products_suite:12.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:supply_chain_products_suite:12.2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:supply_chain_products_suite:12.2.2:*:*:*:*:*:*:* CVE-2013-5979,0.0,,0.48856,Directory traversal vulnerability in Spring Signage Xibo 1.2.x before 1.2.3 and 1.4.x before 1.4.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the p parameter to index.php.,2013-10-02,Nuclei,cpe:2.3:a:springsignage:xibo:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:springsignage:xibo:1.2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:springsignage:xibo:1.2.0:rc2:*:*:*:*:*:*;cpe:2.3:a:springsignage:xibo:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:springsignage:xibo:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:springsignage:xibo:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:springsignage:xibo:1.4.0:rc1:*:*:*:*:*:*;cpe:2.3:a:springsignage:xibo:1.4.1:*:*:*:*:*:*:* CVE-2013-6031,0.0,,0.03938,"The Huawei E355 adapter with firmware 21.157.37.01.910 does not require authentication for API pages, which allows remote attackers to change passwords and settings, or obtain sensitive information, via a direct request to (1) api/wlan/security-settings, (2) api/device/information, (3) api/wlan/basic-settings, (4) api/wlan/mac-filter, (5) api/monitoring/status, or (6) api/dhcp/settings.",2014-03-11,Metasploit,cpe:2.3:h:huawei:e355:-:*:*:*:*:*:*:*;cpe:2.3:o:huawei:e355_firmware:21.157.37.01.910:*:*:*:*:*:*:* CVE-2013-6117,0.0,,0.89731,"Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.",2014-07-11,Metasploit,cpe:2.3:o:dahuasecurity:dvr_firmware:2.608.0000.0:*:*:*:*:*:*:*;cpe:2.3:o:dahuasecurity:dvr_firmware:2.608.gv00.0:*:*:*:*:*:*:* CVE-2013-6129,0.0,,0.74425,"The install/upgrade.php scripts in vBulletin 4.1 and 5 allow remote attackers to create administrative accounts via the customerid, htmldata[password], htmldata[confirmpassword], and htmldata[email] parameters, as exploited in the wild in October 2013.",2013-10-19,Metasploit,cpe:2.3:a:vbulletin:vbulletin:4.1:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.0.0:*:*:*:*:*:*:* CVE-2013-6194,0.0,,0.77324,"Unspecified vulnerability in HP Storage Data Protector 6.2X allows remote attackers to execute arbitrary code or cause a denial of service via unknown vectors, aka ZDI-CAN-1905.",2014-01-04,Metasploit,cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:hp-ux:*:*;cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:redhat_enterprise_linux:*:*;cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:solaris:*:*;cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:windows_server_2003:*:*;cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:windows_server_2008:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:hp-ux:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:redhat_enterprise_linux:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:solaris:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:windows_server_2003:*:*;cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:windows_server_2008:*:* CVE-2013-6221,0.0,,0.84144,"Directory traversal vulnerability in CommunicationServlet in HP Service Virtualization 3.x before 3.50.1, when the AutoPass license server is enabled, allows remote attackers to create arbitrary files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-2031.",2014-06-18,Metasploit,cpe:2.3:a:hp:service_virtualization:3.0:*:*:*:*:*:*:* CVE-2013-6271,0.0,,0.20646,Android 4.0 through 4.3 allows attackers to bypass intended access restrictions and remove device locks via a crafted application that invokes the updateUnlockMethodAndFinish method in the com.android.settings.ChooseLockGeneric class with the PASSWORD_QUALITY_UNSPECIFIED option.,2013-12-14,Metasploit,cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*;cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:* CVE-2013-6281,0.0,,0.08709,"Cross-site scripting (XSS) vulnerability in codebase/spreadsheet.php in the Spreadsheet (dhtmlxSpreadsheet) plugin 2.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the ""page"" parameter.",2013-10-25,Nuclei,cpe:2.3:a:dhtmlx:dhtmlxspreadsheet:2.0:-:*:*:*:wordpress:*:* CVE-2013-6282,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.51236,"The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.",2013-11-20,Metasploit/CISA,cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* CVE-2013-6414,0.0,,0.70843,actionpack/lib/action_view/lookup_context.rb in Action View in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to cause a denial of service (memory consumption) via a header containing an invalid MIME type that leads to excessive caching.,2013-12-07,Metasploit,cpe:2.3:a:rubyonrails:rails:*:-:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.13:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.13:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.13:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:ruby_on_rails:3.1.11:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc2:*:*:*:*:*:* CVE-2013-6829,0.0,,0.71912,admin/confnetworking.html in PineApp Mail-SeCure allows remote attackers to execute arbitrary commands via shell metacharacters in the pinghost parameter during a ping operation.,2013-11-20,Metasploit,cpe:2.3:a:pineapp:mail-secure:-:*:*:*:*:*:*:* CVE-2013-6935,0.0,,0.66125,Buffer overflow in VideoCharge Software Watermark Master 2.2.23 allows remote attackers to execute arbitrary code via a long string in the SourcePath value in a .wcf file.,2013-12-04,Metasploit,cpe:2.3:a:videocharge:watermark_master:2.2.23:*:*:*:*:*:*:* CVE-2013-6955,0.0,,0.83314,"webman/imageSelector.cgi in Synology DiskStation Manager (DSM) 4.0 before 4.0-2259, 4.2 before 4.2-3243, and 4.3 before 4.3-3810 Update 1 allows remote attackers to append data to arbitrary files, and consequently execute arbitrary code, via a pathname in the SLICEUPLOAD X-TMP-FILE HTTP header.",2014-01-09,Metasploit,cpe:2.3:o:synology:diskstation_manager:4.0:*:*:*:*:*:*:*;cpe:2.3:o:synology:diskstation_manager:4.2:*:*:*:*:*:*:*;cpe:2.3:o:synology:diskstation_manager:4.3-3810:*:*:*:*:*:*:*;cpe:2.3:o:synology:diskstation_manager:4.3:*:*:*:*:*:*:* CVE-2013-7091,0.0,,0.93748,"Directory traversal vulnerability in /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz in Zimbra 7.2.2 and 8.0.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the skin parameter. NOTE: this can be leveraged to execute arbitrary code by obtaining LDAP credentials and accessing the service/admin/soap API.",2013-12-13,Metasploit/Nuclei,cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.10:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.12:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.13:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.14:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.15:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.16:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.6:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.7:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.8:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.9:*:*:*:*:*:*:* CVE-2013-7102,0.0,,0.61369,"Multiple unrestricted file upload vulnerabilities in (1) media-upload.php, (2) media-upload-lncthumb.php, and (3) media-upload-sq_button.php in lib/admin/ in the OptimizePress theme before 1.61 for WordPress allow remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images_comingsoon, images_lncthumbs, or images_optbuttons in wp-content/uploads/optpress/, as exploited in the wild in November 2013.",2013-12-23,Metasploit,cpe:2.3:a:optimizepress:optimizepress:*:-:-:*:-:wordpress:*:* CVE-2013-7240,0.0,,0.73626,Directory traversal vulnerability in download-file.php in the Advanced Dewplayer plugin 1.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the dew_file parameter.,2014-01-03,Nuclei,cpe:2.3:a:westerndeal:advanced_dewplayer:1.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* CVE-2013-7260,0.0,,0.78256,"Multiple stack-based buffer overflows in RealNetworks RealPlayer before 17.0.4.61 on Windows, and Mac RealPlayer before 12.0.1.1738, allow remote attackers to execute arbitrary code via a long (1) version number or (2) encoding declaration in the XML declaration of an RMP file, a different issue than CVE-2013-6877.",2014-01-03,Metasploit,cpe:2.3:a:realnetworks:realplayer:*:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.305:mac:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.331:mac:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.352:mac:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0.396:mac:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0.412:mac:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0._481:mac:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:12.0.0.1548:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:12.0.0.1701:*:mac:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:12.0.1.1737:-:-:*:-:macos:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:15.0.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:15.0.4.43:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:15.0.4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:15.0.5.109:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:15.0.6.14:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:15.02.71:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:16.0.0.282:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:16.0.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:16.0.1.18:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:16.0.2.32:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:16.0.3.51:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:2.1.3:*:enterprise:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:2.1.4:*:enterprise:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:6:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:7:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:8:*:*:*:*:*:*:* CVE-2013-7285,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.15054,"Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.",2019-05-15,Nuclei,cpe:2.3:a:apache:activemq:5.15.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:xstream:xstream:*:*:*:*:*:*:*:*;cpe:2.3:a:xstream:xstream:1.4.10:*:*:*:*:*:*:* CVE-2013-7331,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L,0.85294,"The Microsoft.XMLDOM ActiveX control in Microsoft Windows 8.1 and earlier allows remote attackers to determine the existence of local pathnames, UNC share pathnames, intranet hostnames, and intranet IP addresses by examining error codes, as demonstrated by a res:// URL, and exploited in the wild in February 2014.",2014-02-26,Metasploit/CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2013-7390,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.6678,"Unrestricted file upload vulnerability in AgentLogUploadServlet in ManageEngine DesktopCentral 7.x and 8.0.0 before build 80293 allows remote attackers to execute arbitrary code by uploading a file with a jsp extension, then accessing it via a direct request to the file in the webroot.",2020-01-27,Metasploit,cpe:2.3:a:zohocorp:manageengine_desktop_central:*:*:*:*:*:*:*:* CVE-2013-7409,0.0,,0.82136,Buffer overflow in ALLPlayer 5.6.2 through 5.8.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a .m3u (playlist) file.,2014-10-30,Metasploit,cpe:2.3:a:allplayer:allplayer:*:*:*:*:*:*:*:*;cpe:2.3:a:allplayer:allplayer:5.6.2:*:*:*:*:*:*:*;cpe:2.3:a:allplayer:allplayer:5.7.0:*:*:*:*:*:*:* CVE-2014-0038,0.0,,0.57676,"The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.",2014-02-06,Metasploit,cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* CVE-2014-0050,0.0,,0.92877,"MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.",2014-04-01,Metasploit,cpe:2.3:a:apache:commons_fileupload:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:commons_fileupload:1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:commons_fileupload:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:commons_fileupload:1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:commons_fileupload:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:commons_fileupload:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:commons_fileupload:1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.48:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.49:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_applications:12.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_applications:12.0in:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_applications:13.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_applications:13.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_applications:13.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_applications:13.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_applications:13.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_applications:14.0:*:*:*:*:*:*:* CVE-2014-0094,0.0,,0.93075,"The ParametersInterceptor in Apache Struts before 2.3.16.2 allows remote attackers to ""manipulate"" the ClassLoader via the class parameter, which is passed to the getClass method.",2014-03-11,Metasploit,cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* CVE-2014-0112,0.0,,0.9166,"ParametersInterceptor in Apache Struts before 2.3.20 does not properly restrict access to the getClass method, which allows remote attackers to ""manipulate"" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.",2014-04-29,Metasploit,cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* CVE-2014-0114,0.0,,0.92315,"Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to ""manipulate"" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.",2014-04-30,Metasploit,cpe:2.3:a:apache:commons_beanutils:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.1:b1:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.1:b2:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.1:b3:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.1:rc1:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.1:rc2:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.2.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.2.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.2.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.3.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.3.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:1.3.8:*:*:*:*:*:*:* CVE-2014-0130,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.43668,"Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.",2014-05-07,CISA,cpe:2.3:a:redhat:subscription_asset_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* CVE-2014-0160,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.94475,"The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.",2014-04-07,Metasploit/CISA,cpe:2.3:a:broadcom:symantec_messaging_gateway:10.6.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:symantec_messaging_gateway:10.6.1:*:*:*:*:*:*:*;cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*;cpe:2.3:a:mitel:micollab:6.0:*:*:*:*:*:*:*;cpe:2.3:a:mitel:micollab:7.0:*:*:*:*:*:*:*;cpe:2.3:a:mitel:micollab:7.1:*:*:*:*:*:*:*;cpe:2.3:a:mitel:micollab:7.2:*:*:*:*:*:*:*;cpe:2.3:a:mitel:micollab:7.3.0.104:*:*:*:*:*:*:*;cpe:2.3:a:mitel:micollab:7.3:*:*:*:*:*:*:*;cpe:2.3:a:mitel:mivoice:1.1.2.5:*:*:*:*:lync:*:*;cpe:2.3:a:mitel:mivoice:1.1.3.3:*:*:*:*:skype_for_business:*:*;cpe:2.3:a:mitel:mivoice:1.2.0.11:*:*:*:*:skype_for_business:*:*;cpe:2.3:a:mitel:mivoice:1.3.2.2:*:*:*:*:skype_for_business:*:*;cpe:2.3:a:mitel:mivoice:1.4.0.102:*:*:*:*:skype_for_business:*:*;cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:gluster_storage:2.1:*:*:*:*:*:*:*;cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*;cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*;cpe:2.3:a:siemens:elan-8.2:*:*:*:*:*:*:*:*;cpe:2.3:a:siemens:wincc_open_architecture:3.12:*:*:*:*:*:*:*;cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*;cpe:2.3:h:intellian:v100:-:*:*:*:*:*:*:*;cpe:2.3:h:intellian:v60:-:*:*:*:*:*:*:*;cpe:2.3:h:ricon:s9922l:1.0:*:*:*:*:*:*:*;cpe:2.3:h:siemens:application_processing_engine:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:cp_1543-1:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_s7-1500t:-:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*;cpe:2.3:o:intellian:v100_firmware:1.20:*:*:*:*:*:*:*;cpe:2.3:o:intellian:v100_firmware:1.21:*:*:*:*:*:*:*;cpe:2.3:o:intellian:v100_firmware:1.24:*:*:*:*:*:*:*;cpe:2.3:o:intellian:v60_firmware:1.15:*:*:*:*:*:*:*;cpe:2.3:o:intellian:v60_firmware:1.25:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:ricon:s9922l_firmware:16.10.3\(3794\):*:*:*:*:*:*:*;cpe:2.3:o:siemens:application_processing_engine_firmware:2.0:*:*:*:*:*:*:*;cpe:2.3:o:siemens:cp_1543-1_firmware:1.1:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_s7-1500_firmware:1.5:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_s7-1500t_firmware:1.5:*:*:*:*:*:*:* CVE-2014-0195,0.0,,0.90912,"The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.",2014-06-05,Metasploit,cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* CVE-2014-0196,5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,0.69016,"The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the ""LECHO & !OPOST"" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.",2014-05-07,CISA,cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_application_delivery_controller:4.5.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_centralized_management:4.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_cloud_and_orchestration:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:enterprise_manager:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:2.6.31:-:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:2.6.31:rc9:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*;cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:-:*:*;cpe:2.3:o:suse:suse_linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*;cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:* CVE-2014-0224,7.4,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N,0.92686,"OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the ""CCS Injection"" vulnerability.",2014-06-05,Metasploit,cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*;cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*;cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*;cpe:2.3:a:python:python:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.3:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*;cpe:2.3:h:siemens:application_processing_engine:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:cp1543-1:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:rox:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:s7-1500:-:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:siemens:application_processing_engine_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:cp1543-1_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:rox_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:s7-1500_firmware:*:*:*:*:*:*:*:* CVE-2014-0257,0.0,,0.67923,"Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine whether it is safe to execute a method, which allows remote attackers to execute arbitrary code via (1) a crafted web site or (2) a crafted .NET Framework application that exposes a COM server endpoint, aka ""Type Traversal Vulnerability.""",2014-02-12,Metasploit,cpe:2.3:a:microsoft:.net_framework:1.0:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:4.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:4.5.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:4.5:*:*:*:*:*:*:* CVE-2014-0307,0.0,,0.86385,"Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a certain sequence of manipulations of a TextRange element, aka ""Internet Explorer Memory Corruption Vulnerability.""",2014-03-12,Metasploit,cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:* CVE-2014-0322,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.93183,"Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribute of a script element, as exploited in the wild in January and February 2014.",2014-02-14,Metasploit/CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:* CVE-2014-0476,0.0,,0.09333,"The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.",2014-10-25,Metasploit,cpe:2.3:a:chkrootkit:chkrootkit:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* CVE-2014-0496,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.67399,Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.9 and 11.x before 11.0.06 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors.,2014-01-15,CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2014-0497,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93016,"Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors.",2014-02-05,Metasploit/CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* CVE-2014-0502,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.85668,"Double free vulnerability in Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK & Compiler before 4.0.0.1628 allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2014.",2014-02-21,CISA,cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* CVE-2014-0514,0.0,,0.9029,"The Adobe Reader Mobile application before 11.2 for Android does not properly restrict use of JavaScript, which allows remote attackers to execute arbitrary code via a crafted PDF document, a related issue to CVE-2012-6636.",2014-04-15,Metasploit,cpe:2.3:a:adobe:adobe_reader:*:*:*:*:*:android:*:*;cpe:2.3:a:adobe:adobe_reader:11.1.0:*:*:*:*:android:*:* CVE-2014-0515,0.0,,0.92641,"Buffer overflow in Adobe Flash Player before 11.7.700.279 and 11.8.x through 13.0.x before 13.0.0.206 on Windows and OS X, and before 11.2.202.356 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in April 2014.",2014-04-29,Metasploit,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2014-0546,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.27564,"Adobe Reader and Acrobat 10.x before 10.1.11 and 11.x before 11.0.08 on Windows allow attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context, via unspecified vectors.",2014-08-12,CISA,cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2014-0556,0.0,,0.84993,"Heap-based buffer overflow in Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK & Compiler before 15.0.0.249 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0559.",2014-09-10,Metasploit,cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:13.0.0.111:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:13.0.0.83:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:14.0.0.110:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:14.0.0.137:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.111:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.83:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air_sdk:14.0.0.110:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air_sdk:14.0.0.137:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.275:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.280:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.285:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.291:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.297:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.310:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.332:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.335:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.336:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.341:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.346:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.350:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.356:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.359:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.378:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.394:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:13.0.0.182:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:13.0.0.201:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:13.0.0.206:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:13.0.0.214:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:13.0.0.223:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:13.0.0.231:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2014-0569,0.0,,0.8933,"Integer overflow in Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and OS X and before 11.2.202.411 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK & Compiler before 15.0.0.302 allows attackers to execute arbitrary code via unspecified vectors.",2014-10-15,Metasploit,cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_10:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:extended_support:*:*:*;cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*;cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* CVE-2014-0644,0.0,,0.74022,"EMC Cloud Tiering Appliance (CTA) 10 through SP1 allows remote attackers to read arbitrary files via an api/login request containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, as demonstrated by reading the /etc/shadow file.",2014-04-17,Metasploit,cpe:2.3:a:emc:cloud_tiering_appliance_software:10.0:-:*:*:*:*:*:*;cpe:2.3:a:emc:cloud_tiering_appliance_software:10.0:sp1:*:*:*:*:*:*;cpe:2.3:h:emc:cloud_tiering_appliance:-:*:*:*:*:*:*:* CVE-2014-0659,0.0,,0.64478,"The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1, and RVS4000 router with firmware through 2.0.3.2 allow remote attackers to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685.",2014-01-12,Metasploit,cpe:2.3:h:cisco:rvs4000:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:wap4410n:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:wrvs4400n:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rvs4000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rvs4000_firmware:1.3.2.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rvs4000_firmware:1.3.3.5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rvs4000_firmware:2.0.0.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rvs4000_firmware:2.0.2.7:*:*:*:*:*:*:*;cpe:2.3:o:cisco:wap4410n_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:wap4410n_firmware:2.0.2.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:wap4410n_firmware:2.0.3.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:wap4410n_firmware:2.0.4.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:wrvs4400n_firmware:1.1.03:*:*:*:*:*:*:*;cpe:2.3:o:cisco:wrvs4400n_firmware:1.1.13:*:*:*:*:*:*:*;cpe:2.3:o:cisco:wrvs4400n_firmware:2.0.1.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:wrvs4400n_firmware:2.0.2.1:*:*:*:*:*:*:* CVE-2014-0750,0.0,,0.37562,"Directory traversal vulnerability in gefebt.exe in the WebView CimWeb components in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY through 8.2 SIM 24, and Proficy Process Systems with CIMPLICITY, allows remote attackers to execute arbitrary code via a crafted HTTP request, aka ZDI-CAN-1622.",2014-01-25,Metasploit,cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\%2fscada_cimplicity:*:sim24:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\/scada_cimplicity:4.01:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\/scada_cimplicity:7.5:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\/scada_cimplicity:8.0:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\/scada_cimplicity:8.1:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\/scada_cimplicity:8.2:*:*:*:*:*:*:*;cpe:2.3:a:ge:intelligent_platforms_proficy_process_systems_with_cimplicity:-:*:*:*:*:*:*:* CVE-2014-0763,0.0,,0.42768,"An attacker using SQL injection may use arguments to construct queries without proper sanitization. The DBVisitor.dll is exposed through SOAP interfaces, and the exposed functions are vulnerable to SOAP injection. This may allow unexpected SQL action and access to records in the table of the software database or execution of arbitrary code.",2014-04-12,Metasploit,cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:*;cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:*;cpe:2.3:a:advantech:advantech_webaccess:6.0:*:*:*:*:*:*:*;cpe:2.3:a:advantech:advantech_webaccess:7.0:*:*:*:*:*:*:* CVE-2014-0780,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.90726,"Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 7.1 before SP2 Patch 4 allows remote attackers to read administrative passwords in APP files, and consequently execute arbitrary code, via unspecified web requests.",2014-04-25,CISA,cpe:2.3:a:indusoft:web_studio:7.1:-:*:*:*:*:*:*;cpe:2.3:a:indusoft:web_studio:7.1:sp1:*:*:*:*:*:*;cpe:2.3:a:indusoft:web_studio:7.1:sp2:*:*:*:*:*:* CVE-2014-0781,0.0,,0.07956,Heap-based buffer overflow in BKCLogSvr.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via crafted UDP packets.,2014-03-14,Metasploit,cpe:2.3:a:yokogawa:centum_cs_3000:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.01:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.02:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.03:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.04:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.05:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.06:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.07:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.50:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.70:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.08:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.09:*:*:*:*:*:*:* CVE-2014-0782,0.0,,0.39777,"Stack-based buffer overflow in BKESimmgr.exe in the Expanded Test Functions package in Yokogawa CENTUM CS 1000, CENTUM CS 3000 Entry Class R3.09.50 and earlier, CENTUM VP R5.03.00 and earlier, CENTUM VP Entry Class R5.03.00 and earlier, Exaopc R3.71.02 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier allows remote attackers to execute arbitrary code via a crafted packet.",2014-05-16,Metasploit,cpe:2.3:a:yokogawa:b\/m9000_vp_software:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:b\/m9000cs_software:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_1000_software:-:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000_entry_class_software:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000_software:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_vp_entry_class_software:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_vp_software:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:b\/m9000_vp:-:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:b\/m9000cs:-:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:centum_cs_1000:-:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:centum_cs_3000_entry_class:-:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:centum_vp_entry_class:-:*:*:*:*:*:*:* CVE-2014-0783,0.0,,0.07807,Stack-based buffer overflow in BKHOdeq.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet.,2014-03-14,Metasploit,cpe:2.3:a:yokogawa:centum_cs_3000:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.01:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.02:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.03:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.04:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.05:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.06:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.07:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.50:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.70:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.08:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.09:*:*:*:*:*:*:* CVE-2014-0784,0.0,,0.03519,Stack-based buffer overflow in BKBCopyD.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet.,2014-03-14,Metasploit,cpe:2.3:a:yokogawa:centum_cs_3000:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.01:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.02:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.03:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.04:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.05:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.06:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.07:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.50:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.70:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.08:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.09:*:*:*:*:*:*:* CVE-2014-0980,0.0,,0.8216,Buffer overflow in Poster Software PUBLISH-iT 3.6d allows remote attackers to execute arbitrary code via a crafted PUI file.,2014-02-11,Metasploit,cpe:2.3:a:poster_software:publish_it:3.6d:*:*:*:*:*:*:* CVE-2014-0983,0.0,,0.12015,"Multiple array index errors in programs that are automatically generated by VBox/HostServices/SharedOpenGL/crserverlib/server_dispatch.py in Oracle VirtualBox 4.2.x through 4.2.20 and 4.3.x before 4.3.8, when using 3D Acceleration, allow local guest OS users to execute arbitrary code on the Chromium server via certain CR_MESSAGE_OPCODES messages with a crafted index, which are not properly handled by the (1) CR_VERTEXATTRIB4NUBARB_OPCODE to the crServerDispatchVertexAttrib4NubARB function, (2) CR_VERTEXATTRIB1DARB_OPCODE to the crServerDispatchVertexAttrib1dARB function, (3) CR_VERTEXATTRIB1FARB_OPCODE to the crServerDispatchVertexAttrib1fARB function, (4) CR_VERTEXATTRIB1SARB_OPCODE to the crServerDispatchVertexAttrib1sARB function, (5) CR_VERTEXATTRIB2DARB_OPCODE to the crServerDispatchVertexAttrib2dARB function, (6) CR_VERTEXATTRIB2FARB_OPCODE to the crServerDispatchVertexAttrib2fARB function, (7) CR_VERTEXATTRIB2SARB_OPCODE to the crServerDispatchVertexAttrib2sARB function, (8) CR_VERTEXATTRIB3DARB_OPCODE to the crServerDispatchVertexAttrib3dARB function, (9) CR_VERTEXATTRIB3FARB_OPCODE to the crServerDispatchVertexAttrib3fARB function, (10) CR_VERTEXATTRIB3SARB_OPCODE to the crServerDispatchVertexAttrib3sARB function, (11) CR_VERTEXATTRIB4DARB_OPCODE to the crServerDispatchVertexAttrib4dARB function, (12) CR_VERTEXATTRIB4FARB_OPCODE to the crServerDispatchVertexAttrib4fARB function, and (13) CR_VERTEXATTRIB4SARB_OPCODE to the crServerDispatchVertexAttrib4sARB function.",2014-03-31,Metasploit,cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:* CVE-2014-100002,0.0,,0.77036,Directory traversal vulnerability in ManageEngine SupportCenter Plus 7.9 before 7917 allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the attach parameter to WorkOrder.do in the file attachment for a new ticket.,2015-01-13,Metasploit,cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:*:7916:*:*:*:*:*:* CVE-2014-100005,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.35431,"Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev. Bx) with firmware before 2.17b02 allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator account or (2) enable remote management via a crafted configuration module to hedwig.cgi, (3) activate new configuration settings via a SETCFG,SAVE,ACTIVATE action to pigwidgeon.cgi, or (4) send a ping via a ping action to diagnostic.php.",2015-01-13,Metasploit/CISA,cpe:2.3:h:dlink:dir-600:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-600_firmware:*:*:*:*:*:*:*:* CVE-2014-100015,0.0,,0.77303,Directory traversal vulnerability in pdmwService.exe in SolidWorks Workgroup PDM 2014 allows remote attackers to write to arbitrary files via a .. (dot dot) in the filename in a file upload.,2015-01-13,Metasploit,cpe:2.3:a:solidworks:product_data_management:2014:*:*:*:*:*:*:* CVE-2014-10037,0.0,,0.72691,Directory traversal vulnerability in DomPHP 0.83 and earlier allows remote attackers to have unspecified impact via a .. (dot dot) in the url parameter to photoalbum/index.php.,2015-01-13,Nuclei,cpe:2.3:a:domphp:domphp:*:*:*:*:*:*:*:* CVE-2014-1203,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.78935,The get_login_ip_config_file function in Eyou Mail System before 3.6 allows remote attackers to execute arbitrary commands via shell metacharacters in the domain parameter to admin/domain/ip_login_set/d_ip_login_get.php.,2017-10-24,Nuclei,cpe:2.3:a:eyou:eyou:*:*:*:*:*:*:*:* CVE-2014-1510,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.77563,"The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.",2014-03-19,Metasploit,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:* CVE-2014-1511,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.75961,"Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to bypass the popup blocker via unspecified vectors.",2014-03-19,Metasploit,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:* CVE-2014-1610,0.0,,0.49387,"MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; (2) the w parameter (aka width field) to thumb.php, which is not properly handled by includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php.",2014-01-30,Metasploit,cpe:2.3:a:mediawiki:mediawiki:1.19.0:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.19.10:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.19.1:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.19.2:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.19.3:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.19.4:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.19.5:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.19.6:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.19.7:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.19.8:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.19.9:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.21.1:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.21.2:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.21.3:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.21.4:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.22.0:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.22.1:*:*:*:*:*:*:* CVE-2014-1635,0.0,,0.8173,Buffer overflow in login.cgi in MiniHttpd in Belkin N750 Router with firmware before F9K1103_WW_1.10.17m allows remote attackers to execute arbitrary code via a long string in the jump parameter.,2014-11-12,Metasploit,cpe:2.3:h:belkin:n750_wireless_router:f9k1103:*:*:*:*:*:*:*;cpe:2.3:o:belkin:n750_wireless_router_firmware:*:*:*:*:*:*:*:* CVE-2014-1649,0.0,,0.40163,The server in Symantec Workspace Streaming (SWS) before 7.5.0.749 allows remote attackers to access files and functionality by sending a crafted XMLRPC request over HTTPS.,2014-05-16,Metasploit,cpe:2.3:a:symantec:workspace_streaming:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:workspace_streaming:6.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec:workspace_streaming:6.1:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:workspace_streaming:6.1:sp2:*:*:*:*:*:*;cpe:2.3:a:symantec:workspace_streaming:6.1:sp3:*:*:*:*:*:*;cpe:2.3:a:symantec:workspace_streaming:6.1:sp4:*:*:*:*:*:* CVE-2014-1683,0.0,,0.7853,"The bashMail function in cms/data/skins/techjunkie/fragments/contacts/functions.php in SkyBlueCanvas CMS before 1.1 r248-04, when the pid parameter is 4, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) name, (2) email, (3) subject, or (4) message parameter to index.php.",2014-01-29,Metasploit,cpe:2.3:a:skybluecanvas:skybluecanvas:*:*:*:*:*:*:*:* CVE-2014-1691,0.0,,0.8135,The framework/Util/lib/Horde/Variables.php script in the Util library in Horde before 5.1.1 allows remote attackers to conduct object injection attacks and execute arbitrary PHP code via a crafted serialized object in the _formvars form.,2014-04-01,Metasploit,cpe:2.3:a:horde:horde_application_framework:*:*:*:*:*:*:*:*;cpe:2.3:a:horde:horde_application_framework:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:horde:horde_application_framework:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:horde:horde_application_framework:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:horde:horde_application_framework:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:horde:horde_application_framework:5.0.4:*:*:*:*:*:*:* CVE-2014-1761,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.92827,"Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014.",2014-03-25,Metasploit/CISA,cpe:2.3:a:microsoft:office:2011:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_apps:2010:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_apps_server:2013:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2010:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2013:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2010:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2013:*:*:*:-:*:*:*;cpe:2.3:a:microsoft:word:2013:*:*:*:rt:*:*:*;cpe:2.3:a:microsoft:word:2013:sp1:*:*:-:*:*:*;cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*;cpe:2.3:a:microsoft:word_viewer:-:*:*:*:*:*:*:* CVE-2014-1776,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.80062,"Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that ""VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks.""",2014-04-27,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2014-1812,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.79816,"The Group Policy implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly handle distribution of passwords, which allows remote authenticated users to obtain sensitive credential information and consequently gain privileges by leveraging access to the SYSVOL share, as exploited in the wild in May 2014, aka ""Group Policy Preferences Password Elevation of Privilege Vulnerability.""",2014-05-14,Metasploit/CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2014-1841,0.0,,0.10234,Directory traversal vulnerability in the web interface in Titan FTP Server before 10.40 build 1829 allows remote attackers to copy an arbitrary user's home folder via a Move action with a .. (dot dot) in the src parameter.,2014-04-29,Nuclei,cpe:2.3:a:southrivertech:titan_ftp_server:*:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:10.0.1733:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:10.01.1740:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:10.30:*:*:*:*:*:*:* CVE-2014-1842,0.0,,0.16138,Directory traversal vulnerability in the web interface in Titan FTP Server before 10.40 build 1829 allows remote attackers to list all usernames via a Go action with a .. (dot dot) in the search-bar value.,2014-04-29,Nuclei,cpe:2.3:a:southrivertech:titan_ftp_server:*:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:10.0.1733:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:10.01.1740:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:10.30:*:*:*:*:*:*:* CVE-2014-1843,0.0,,0.10715,Directory traversal vulnerability in the web interface in Titan FTP Server before 10.40 build 1829 allows remote attackers to obtain the property information of an arbitrary home folder via a Properties action with a .. (dot dot) in the src parameter.,2014-04-29,Nuclei,cpe:2.3:a:southrivertech:titan_ftp_server:*:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:10.0.1733:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:10.01.1740:*:*:*:*:*:*:*;cpe:2.3:a:southrivertech:titan_ftp_server:10.30:*:*:*:*:*:*:* CVE-2014-1903,0.0,,0.83709,"admin/libraries/view.functions.php in FreePBX 2.9 before 2.9.0.14, 2.10 before 2.10.1.15, 2.11 before 2.11.0.23, and 12 before 12.0.1alpha22 does not restrict the set of functions accessible to the API handler, which allows remote attackers to execute arbitrary PHP code via the function and args parameters to admin/config.php.",2014-02-18,Metasploit,cpe:2.3:a:freepbx:freepbx:2.10:*:*:*:*:*:*:*;cpe:2.3:a:freepbx:freepbx:2.11:*:*:*:*:*:*:*;cpe:2.3:a:freepbx:freepbx:2.12:*:*:*:*:*:*:*;cpe:2.3:a:sangoma:freepbx:2.9:*:*:*:*:*:*:* CVE-2014-2120,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.80116,"Cross-site scripting (XSS) vulnerability in the WebVPN login page in Cisco Adaptive Security Appliance (ASA) Software allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCun19025.",2014-03-19,CISA,cpe:2.3:o:cisco:adaptive_security_appliance_software:-:*:*:*:*:*:*:* CVE-2014-2127,0.0,,0.30946,"Cisco Adaptive Security Appliance (ASA) Software 8.x before 8.2(5.48), 8.3 before 8.3(2.40), 8.4 before 8.4(7.9), 8.6 before 8.6(1.13), 9.0 before 9.0(4.1), and 9.1 before 9.1(4.3) does not properly process management-session information during privilege validation for SSL VPN portal connections, which allows remote authenticated users to gain privileges by establishing a Clientless SSL VPN session and entering crafted URLs, aka Bug ID CSCul70099.",2014-04-10,Metasploit,cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\(1\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:* CVE-2014-2206,0.0,,0.76643,"Stack-based buffer overflow in GetGo Download Manager 4.9.0.1982, 4.8.2.1346, 4.4.5.502, and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a long HTTP Response Header.",2014-03-05,Metasploit,cpe:2.3:a:getgosoft:getgo_download_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:getgosoft:getgo_download_manager:4.8.2.1346:*:*:*:*:*:*:*;cpe:2.3:a:getgosoft:getgo_download_manager:4.9.0.1982:*:*:*:*:*:*:* CVE-2014-2238,0.0,,0.45353,SQL injection vulnerability in the manage configuration page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.16 allows remote authenticated administrators to execute arbitrary SQL commands via the filter_config_id parameter.,2014-03-05,Metasploit,cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*;cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*;cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*;cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:* CVE-2014-2268,0.0,,0.77294,"views/Index.php in the Install module in vTiger 6.0 before Security Patch 2 does not properly restrict access, which allows remote attackers to re-install the application via a request that sets the X-Requested-With HTTP header, as demonstrated by executing arbitrary PHP code via the db_name parameter.",2014-11-16,Metasploit,cpe:2.3:a:vtiger:vtiger_crm:1.0:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:2.0:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:2.1:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:3.0:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:3.0:beta:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:3.2:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:4.0:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:4.2.4:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:4.2:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:4:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:4:beta:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:4:rc1:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:5.0.4:rc:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:5.1.0:rc:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:5.4.0:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:6.0.0:beta:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:6.0.0:rc:*:*:*:*:*:*;cpe:2.3:a:vtiger:vtiger_crm:6.0.0:sp1:*:*:*:*:*:* CVE-2014-2299,0.0,,0.70169,Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.,2014-03-11,Metasploit,cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.10:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.11:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.12:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.8:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.8.9:*:*:*:*:*:*:* CVE-2014-2314,0.0,,0.66824,Directory traversal vulnerability in the Issue Collector plugin in Atlassian JIRA before 6.0.4 allows remote attackers to create arbitrary files via unspecified vectors.,2014-03-09,Metasploit,cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*;cpe:2.3:a:atlassian:jira:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:atlassian:jira:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:atlassian:jira:6.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2014-2321,0.0,,0.90027,"web_shell_cmd.gch on ZTE F460 and F660 cable modems allows remote attackers to obtain administrative access via sendcmd requests, as demonstrated by using ""set TelnetCfg"" commands to enable a TELNET service with specified credentials.",2014-03-11,Nuclei,cpe:2.3:h:zte:f460:-:*:*:*:*:*:*:*;cpe:2.3:h:zte:f660:-:*:*:*:*:*:*:* CVE-2014-2323,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92388,"SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name, related to request_check_hostname.",2014-03-14,Nuclei,cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:* CVE-2014-2364,0.0,,0.40188,"Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary code via a long string in the (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud, or (11) IPAddress parameter to an ActiveX control in (a) webvact.ocx, (b) dvs.ocx, or (c) webdact.ocx.",2014-07-19,Metasploit,cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:*;cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:*;cpe:2.3:a:advantech:advantech_webaccess:6.0:*:*:*:*:*:*:*;cpe:2.3:a:advantech:advantech_webaccess:7.0:*:*:*:*:*:*:* CVE-2014-2383,0.0,,0.46364,"dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.",2014-04-28,Nuclei,cpe:2.3:a:dompdf:dompdf:*:beta3:*:*:*:*:*:* CVE-2014-2424,0.0,,0.80022,Unspecified vulnerability in the Oracle Event Processing component in Oracle Fusion Middleware 11.1.1.7.0 allows remote authenticated users to affect integrity via vectors related to CEP system.,2014-04-16,Metasploit,cpe:2.3:a:oracle:fusion_middleware:11.1.1.7.0:*:*:*:*:*:*:* CVE-2014-2477,0.0,,0.06517,"Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 3.2.24, 4.0.26, 4.1.34, 4.2.26, and 4.3.12 allows local users to affect integrity and availability via unknown vectors related to Core, a different vulnerability than CVE-2014-2486.",2014-07-17,Metasploit,cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:* CVE-2014-2533,0.0,,0.26247,/sbin/ifwatchd in BlackBerry QNX Neutrino RTOS 6.4.x and 6.5.x allows local users to gain privileges by providing an arbitrary program name as a command-line argument.,2014-03-18,Metasploit,cpe:2.3:o:blackberry:qnx_neutrino_rtos:6.4.1:*:*:*:*:*:*:*;cpe:2.3:o:blackberry:qnx_neutrino_rtos:6.5.0:*:*:*:*:*:*:*;cpe:2.3:o:blackberry:qnx_neutrino_rtos:6.5.0:sp1:*:*:*:*:*:* CVE-2014-2623,0.0,,0.89835,Unspecified vulnerability in HP Storage Data Protector 8.x allows remote attackers to execute arbitrary code via unknown vectors.,2014-07-18,Metasploit,cpe:2.3:a:hp:storage_data_protector:8.0:-:*:*:*:windows_7:*:*;cpe:2.3:a:hp:storage_data_protector:8.0:-:*:*:*:windows_8:*:*;cpe:2.3:a:hp:storage_data_protector:8.0:-:*:*:*:windows_server_2003:*:*;cpe:2.3:a:hp:storage_data_protector:8.0:-:*:*:*:windows_server_2008:*:*;cpe:2.3:a:hp:storage_data_protector:8.10:-:*:*:*:windows_7:*:*;cpe:2.3:a:hp:storage_data_protector:8.10:-:*:*:*:windows_8:*:*;cpe:2.3:a:hp:storage_data_protector:8.10:-:*:*:*:windows_server_2003:*:*;cpe:2.3:a:hp:storage_data_protector:8.10:-:*:*:*:windows_server_2008:*:* CVE-2014-2624,0.0,,0.77355,"Unspecified vulnerability in HP Network Node Manager i (NNMi) 9.0x, 9.1x, and 9.2x allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-2264.",2014-09-11,Metasploit,cpe:2.3:a:hp:network_node_manager_i:9.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:network_node_manager_i:9.10:*:*:*:*:*:*:*;cpe:2.3:a:hp:network_node_manager_i:9.20:*:*:*:*:*:*:* CVE-2014-2630,0.0,,0.12237,"Unspecified vulnerability in HP Operations Agent 11.00, when Glance is used, allows local users to gain privileges via unknown vectors.",2014-08-12,Metasploit,cpe:2.3:a:hp:operations_agent:11.0:*:*:*:*:*:*:* CVE-2014-2817,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.23233,"Microsoft Internet Explorer 6 through 11 allows remote attackers to gain privileges via a crafted web site, aka ""Internet Explorer Elevation of Privilege Vulnerability.""",2014-08-12,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2014-2849,0.0,,0.73239,The Change Password dialog box (change_password) in Sophos Web Appliance before 3.8.2 allows remote authenticated users to change the admin user password via a crafted request.,2014-04-11,Metasploit,cpe:2.3:a:sophos:web_appliance_firmware:3.7.8:*:*:*:*:*:*:*;cpe:2.3:h:sophos:web_appliance:-:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.1.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.0.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.2.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.6:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.7:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.3.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.6.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.6:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.3.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.6:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.7:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.8:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.1.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.1.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.6:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.1.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.2.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.2.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.2.4.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.2.4.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.4.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.4.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.6:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.7:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.8.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.8.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.9.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.9:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.8.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.8.1:*:*:*:*:*:*:* CVE-2014-2850,0.0,,0.75717,The network interface configuration page (netinterface) in Sophos Web Appliance before 3.8.2 allows remote administrators to execute arbitrary commands via shell metacharacters in the address parameter.,2014-04-11,Metasploit,cpe:2.3:a:sophos:web_appliance_firmware:3.7.8:*:*:*:*:*:*:*;cpe:2.3:h:sophos:web_appliance:-:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.1.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.0.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.0.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.1.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.2.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.6:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.2.7:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.3.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.6.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.3.6:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.3.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.6:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.7:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.4.8:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.1.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.1.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.5.6:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.1.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.2.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.2.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.2.4.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.2.4.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.4.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.4.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.6.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.3:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.4:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.5:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.6:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.7:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.8.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.8.2:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.9.1:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.7.9:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.8.0:*:*:*:*:*:*:*;cpe:2.3:o:sophos:web_appliance_firmware:3.8.1:*:*:*:*:*:*:* CVE-2014-2908,0.0,,0.46587,Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x and 3.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.,2014-04-25,Nuclei,cpe:2.3:h:siemens:simatic_s7_cpu-1211c:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_s7_cpu_1212c:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_s7_cpu_1214c:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_s7_cpu_1215c:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_s7_cpu_1217c:-:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_s7_cpu_1200_firmware:2.0:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_s7_cpu_1200_firmware:3.0.2:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_s7_cpu_1200_firmware:3.0:*:*:*:*:*:*:* CVE-2014-2928,0.0,,0.64597,"The iControl API in F5 BIG-IP LTM, APM, ASM, GTM, Link Controller, and PSM 10.0.0 through 10.2.4 and 11.0.0 through 11.5.1, BIG-IP AAM 11.4.0 through 11.5.1, BIG-IP AFM and PEM 11.3.0 through 11.5.1, BIG-IP Analytics 11.0.0 through 11.5.1, BIG-IP Edge Gateway, WebAccelerator, WOM 10.1.0 through 10.2.4 and 11.0.0 through 11.3.0, Enterprise Manager 2.1.0 through 2.3.0 and 3.0.0 through 3.1.1, and BIG-IQ Cloud, Device, and Security 4.0.0 through 4.3.0 allows remote administrators to execute arbitrary commands via shell metacharacters in the hostname element in a SOAP request.",2014-05-12,Metasploit,cpe:2.3:a:f5:big-ip_access_policy_manager:10.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_access_policy_manager:11.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:10.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:10.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:10.2.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:10.2.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:10.2.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:11.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_edge_gateway:10.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_edge_gateway:10.2.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_edge_gateway:10.2.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_edge_gateway:10.2.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_edge_gateway:11.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:10.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:10.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:11.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:10.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:10.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:10.2.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:10.2.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:10.2.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:11.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:10.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:10.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:11.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:10.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:10.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.3:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.4:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:11.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:11.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:11.2.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:11.2.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:9.4.5:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:9.4.6:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:9.4.7:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:9.4.8:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:10.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:10.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:10.2.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:10.2.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:10.2.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:10.2.3:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:10.2.4:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:11.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:11.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:11.2.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:11.2.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:9.4.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:9.4.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:9.4.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:9.4.3:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:9.4.4:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:9.4.5:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:9.4.6:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:9.4.7:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:9.4.8:*:*:*:*:*:*:* CVE-2014-2962,0.0,,0.87916,Absolute path traversal vulnerability in the webproc cgi module on the Belkin N150 F9K1009 v1 router with firmware before 1.00.08 allows remote attackers to read arbitrary files via a full pathname in the getpage parameter.,2014-06-19,Nuclei,cpe:2.3:h:belkin:n150_f9k1009:v1:*:*:*:*:*:*:*;cpe:2.3:o:belkin:n150_f9k1009_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:belkin:n150_f9k1009_firmware:1.00.01:*:*:*:*:*:*:* CVE-2014-3120,8.1,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N,0.84549,"The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.",2014-07-28,Metasploit/Nuclei/CISA,cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:* CVE-2014-3153,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.80511,"The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.",2014-06-07,Metasploit/CISA,cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:* CVE-2014-3206,0.0,,0.90906,Seagate BlackArmor NAS allows remote attackers to execute arbitrary code via the session parameter to localhost/backupmgt/localJob.php or the auth_name parameter to localhost/backupmgmt/pre_connect_check.php.,2018-02-23,Nuclei,cpe:2.3:h:seagate:blackarmor_nas_110:-:*:*:*:*:*:*:*;cpe:2.3:h:seagate:blackarmor_nas_220:-:*:*:*:*:*:*:*;cpe:2.3:o:seagate:blackarmor_nas_110_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:seagate:blackarmor_nas_220_firmware:-:*:*:*:*:*:*:* CVE-2014-3300,0.0,,0.45577,"The BVSMWeb portal in the web framework in Cisco Unified Communications Domain Manager (CDM) in Unified CDM Application Software before 10 does not properly implement access control, which allows remote attackers to modify user information via a crafted URL, aka Bug ID CSCum77041.",2014-07-07,Metasploit,cpe:2.3:a:cisco:unified_cdm_application_software:*:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_cdm_application_software:8.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:unified_communications_domain_manager:-:*:*:*:*:*:*:* CVE-2014-3566,3.4,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N,0.94015,"The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the ""POODLE"" issue.",2014-10-15,Metasploit,cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.1.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.1.7:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.1.8:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.1.9:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:2.2.3.4:*:*:*:*:*:*:*;cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*;cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8z:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:0.9.8zb:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*;cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*;cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0:beta:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_desktop:10.0:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_desktop:9.0:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*;cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_supplementary:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:7.0:*:*:*:*:*:*:* CVE-2014-3704,0.0,,0.94366,"The expandArguments function in the database abstraction API in Drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct SQL injection attacks via an array containing crafted keys.",2014-10-16,Metasploit/Nuclei,cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* CVE-2014-3744,0.0,,0.5516,Directory traversal vulnerability in the st module before 0.2.5 for Node.js allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in an unspecified path.,2017-10-23,Nuclei,cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:* CVE-2014-3789,0.0,,0.71003,GetPermissions.asp in Cogent Real-Time Systems Cogent DataHub before 7.3.5 allows remote attackers to execute arbitrary commands via unspecified vectors.,2014-05-22,Metasploit,cpe:2.3:a:cogentdatahub:cogent_datahub:*:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.0:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1.63:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.2.2:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.3.1:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.3.2:*:*:*:*:*:*:*;cpe:2.3:a:cogentdatahub:cogent_datahub:7.3.3:*:*:*:*:*:*:* CVE-2014-3791,0.0,,0.77234,Stack-based buffer overflow in Easy File Sharing (EFS) Web Server 6.8 allows remote attackers to execute arbitrary code via a long string in a cookie UserID parameter to vfolder.ghp.,2014-05-20,Metasploit,cpe:2.3:a:efssoft:easy_file_sharing_web_server:6.8:*:*:*:*:*:*:* CVE-2014-3804,0.0,,0.80424,"The av-centerd SOAP service in AlienVault OSSIM before 4.7.0 allows remote attackers to execute arbitrary commands via a crafted (1) update_system_info_debian_package, (2) ossec_task, (3) set_ossim_setup admin_ip, (4) sync_rserver, or (5) set_ossim_setup framework_ip request, a different vulnerability than CVE-2014-3805.",2014-06-13,Metasploit,cpe:2.3:a:alienvault:open_source_security_information_management:*:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.0:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.1:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.2.3:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.2:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.3.3:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.3:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.4:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.5:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.6:*:*:*:*:*:*:* CVE-2014-3828,0.0,,0.78588,"Multiple SQL injection vulnerabilities in Centreon 2.5.1 and Centreon Enterprise Server 2.2 (fixed in Centreon web 2.5.3) allow remote attackers to execute arbitrary SQL commands via (1) the index_id parameter to views/graphs/common/makeXML_ListMetrics.php, (2) the sid parameter to views/graphs/GetXmlTree.php, (3) the session_id parameter to views/graphs/graphStatus/displayServiceStatus.php, (4) the mnftr_id parameter to configuration/configObject/traps/GetXMLTrapsForVendor.php, or (5) the index parameter to common/javascript/commandGetArgs/cmdGetExample.php in include/.",2014-10-23,Metasploit,cpe:2.3:a:merethis:centreon:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:merethis:centreon_enterprise_server:2.2:*:*:*:*:*:*:* CVE-2014-3829,0.0,,0.86204,"displayServiceStatus.php in Centreon 2.5.1 and Centreon Enterprise Server 2.2 (fixed in Centreon web 2.5.3) allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) session_id or (2) template_id parameter, related to the command_line variable.",2014-10-23,Metasploit,cpe:2.3:a:merethis:centreon:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:merethis:centreon_enterprise_server:2.2:*:*:*:*:*:*:* CVE-2014-3888,0.0,,0.2899,"Stack-based buffer overflow in BKFSim_vhfd.exe in Yokogawa CENTUM CS 1000, CENTUM CS 3000 R3.09.50 and earlier, CENTUM VP R5.03.20 and earlier, Exaopc R3.72.00 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier, when FCS/Test Function is enabled, allows remote attackers to execute arbitrary code via a crafted packet.",2014-07-10,Metasploit,cpe:2.3:a:yokogawa:b\/m9000_vp_software:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:b\/m9000cs_software:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_1000_software:-:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.01:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.02:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.03:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.04:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.05:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.06:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.07:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.50:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.70:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.08:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.09.50:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.09:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000_entry_class_software:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000_software:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_vp_entry_class_software:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_vp_software:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_vp_software:4.03.00:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:exaopc:3.71.02:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:b\/m9000_vp:-:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:b\/m9000cs:-:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:centum_cs_1000:-:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:centum_cs_3000_entry_class:-:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:centum_vp_entry_class:-:*:*:*:*:*:*:* CVE-2014-3913,0.0,,0.78737,Stack-based buffer overflow in AccessServer32.exe in Ericom AccessNow Server allows remote attackers to execute arbitrary code via a request for a non-existent file.,2014-06-04,Metasploit,cpe:2.3:a:ericom:accessnow_server:-:*:*:*:*:*:*:* CVE-2014-3914,0.0,,0.81114,"Directory traversal vulnerability in the Admin Center for Tivoli Storage Manager (TSM) in Rocket ServerGraph 1.2 allows remote attackers to (1) create arbitrary files via a .. (dot dot) in the query parameter in a writeDataFile action to the fileRequestor servlet, execute arbitrary files via a .. (dot dot) in the query parameter in a (2) run or (3) runClear action to the fileRequestor servlet, (4) read arbitrary files via a readDataFile action to the fileRequestor servlet, (5) execute arbitrary code via a save_server_groups action to the userRequest servlet, or (6) delete arbitrary files via a del action in the fileRequestServlet servlet.",2014-08-07,Metasploit,cpe:2.3:a:rocketsoftware:rocket_servergraph:1.2:*:*:*:*:*:*:* CVE-2014-3931,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.61835,fastping.c in MRLG (aka Multi-Router Looking Glass) before 5.5.0 allows remote attackers to cause an arbitrary memory write and memory corruption.,2017-03-31,CISA,cpe:2.3:a:multi-router_looking_glass_project:multi-router_looking_glass:*:*:*:*:*:*:*:* CVE-2014-3936,0.0,,0.86285,"Stack-based buffer overflow in the do_hnap function in www/my_cgi.cgi in D-Link DSP-W215 (Rev. A1) with firmware 1.01b06 and earlier, DIR-505 with firmware before 1.08b10, and DIR-505L with firmware 1.01 and earlier allows remote attackers to execute arbitrary code via a long Content-Length header in a GetDeviceSettings action in an HNAP request.",2014-06-02,Metasploit,cpe:2.3:h:dlink:dir-505l_shareport_mobile_companion:a1:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir505_shareport_mobile_companion:a1:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dsp-w215:a1:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir505_shareport_mobile_companion_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir505l_shareport_mobile_companion_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dsp-w215_firmware:*:b06:*:*:*:*:*:* CVE-2014-3996,0.0,,0.71162,"SQL injection vulnerability in the LinkViewFetchServlet servlet in ManageEngine Desktop Central (DC) and Desktop Central Managed Service Providers (MSP) edition before 9 build 90043, Password Manager Pro (PMP) and Password Manager Pro Managed Service Providers (MSP) edition before 7 build 7003, IT360 and IT360 Managed Service Providers (MSP) edition before 10.3.3 build 10330, and possibly other ManageEngine products, allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the sv parameter to LinkViewFetchServlet.dat.",2014-12-05,Metasploit,cpe:2.3:a:manageengine:desktop_central:*:build_90043:*:*:*:*:*:*;cpe:2.3:a:manageengine:desktop_central:*:build_90043:*:*:managed_service_providers:*:*:*;cpe:2.3:a:manageengine:it360:*:build_10330:*:*:*:*:*:*;cpe:2.3:a:manageengine:it360:*:build_10330:*:*:managed_service_providers:*:*:*;cpe:2.3:a:manageengine:password_manager_pro:*:build_7003:*:*:*:*:*:*;cpe:2.3:a:manageengine:password_manager_pro:*:build_7003:*:*:managed_service_providers:*:*:* CVE-2014-4076,0.0,,0.47535,"Microsoft Windows Server 2003 SP2 allows local users to gain privileges via a crafted IOCTL call to (1) tcpip.sys or (2) tcpip6.sys, aka ""TCP/IP Elevation of Privilege Vulnerability.""",2014-11-11,Metasploit,cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:x86:* CVE-2014-4077,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.2956,"Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Office 2007 SP3, when IMJPDCT.EXE (aka IME for Japanese) is installed, allow remote attackers to bypass a sandbox protection mechanism via a crafted PDF document, aka ""Microsoft IME (Japanese) Elevation of Privilege Vulnerability,"" as exploited in the wild in 2014.",2014-11-11,CISA,cpe:2.3:a:microsoft:office_2007_ime:-:*:*:ja:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2014-4113,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.82789,"win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka ""Win32k.sys Elevation of Privilege Vulnerability.""",2014-10-15,Metasploit/CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2014-4114,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.92026,"Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a ""Sandworm"" attack in June through October 2014, aka ""Windows OLE Remote Code Execution Vulnerability.""",2014-10-15,Metasploit/CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2014-4123,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.20983,"Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka ""Internet Explorer Elevation of Privilege Vulnerability,"" as exploited in the wild in October 2014, a different vulnerability than CVE-2014-4124.",2014-10-15,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2014-4148,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.34773,"win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted TrueType font, as exploited in the wild in October 2014, aka ""TrueType Font Parsing Remote Code Execution Vulnerability.""",2014-10-15,CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2014-4210,0.0,,0.94152,Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services.,2014-07-17,Nuclei,cpe:2.3:a:oracle:fusion_middleware:10.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware:10.3.6:*:*:*:*:*:*:* CVE-2014-4404,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.60436,Heap-based buffer overflow in IOHIDFamily in Apple iOS before 8 and Apple TV before 7 allows attackers to execute arbitrary code in a privileged context via an application that provides crafted key-mapping properties.,2014-09-18,Metasploit/CISA,cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* CVE-2014-4511,0.0,,0.84126,"Gitlist before 0.5.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the file name in the URI of a request for a (1) blame, (2) file, or (3) stats page, as demonstrated by requests to blame/master/, master/, and stats/master/.",2014-07-22,Metasploit,cpe:2.3:a:gitlist:gitlist:*:*:*:*:*:*:*:*;cpe:2.3:a:gitlist:gitlist:0.1:*:*:*:*:*:*:*;cpe:2.3:a:gitlist:gitlist:0.2:*:*:*:*:*:*:*;cpe:2.3:a:gitlist:gitlist:0.3:*:*:*:*:*:*:* CVE-2014-4513,0.0,,0.03718,"Multiple cross-site scripting (XSS) vulnerabilities in server/offline.php in the ActiveHelper LiveHelp Live Chat plugin 3.1.0 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) MESSAGE, (2) EMAIL, or (3) NAME parameter.",2014-07-01,Nuclei,cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:*:*:*:*:*:wordpress:*:*;cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:2.6.0:*:*:*:*:wordpress:*:*;cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:2.6.1:*:*:*:*:wordpress:*:*;cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:2.6.2:*:*:*:*:wordpress:*:*;cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:2.6.5:*:*:*:*:wordpress:*:*;cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:2.6.7:*:*:*:*:wordpress:*:*;cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:2.7.0:*:*:*:*:wordpress:*:*;cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:2.7.3:*:*:*:*:wordpress:*:*;cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:2.7.4:*:*:*:*:wordpress:*:*;cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:2.7.5:*:*:*:*:wordpress:*:*;cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:2.9.0:*:*:*:*:wordpress:*:*;cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:2.9.1:*:*:*:*:wordpress:*:*;cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:2.9.2:*:*:*:*:wordpress:*:*;cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:2.9.5:*:*:*:*:wordpress:*:*;cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:3.0.0:*:*:*:*:wordpress:*:* CVE-2014-4535,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.03802,Cross-site scripting (XSS) vulnerability in the Import Legacy Media plugin 0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php.,2019-12-27,Nuclei,cpe:2.3:a:import_legacy_media_project:import_legacy_media:*:*:*:*:*:wordpress:*:* CVE-2014-4536,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.02649,"Multiple cross-site scripting (XSS) vulnerabilities in tests/notAuto_test_ContactService_pauseCampaign.php in the Infusionsoft Gravity Forms plugin before 1.5.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) go, (2) contactId, or (3) campaignId parameter.",2019-12-27,Nuclei,cpe:2.3:a:katz:infusionsoft_gravity_forms:*:*:*:*:*:wordpress:*:* CVE-2014-4539,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.0161,Cross-site scripting (XSS) vulnerability in the Movies plugin 0.6 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php.,2019-12-27,Nuclei,cpe:2.3:a:movies_project:movies:*:*:*:*:*:wordpress:*:* CVE-2014-4544,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.02584,Cross-site scripting (XSS) vulnerability in the Podcast Channels plugin 0.20 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the Filename parameter to getid3/demos/demo.write.php.,2019-12-27,Nuclei,cpe:2.3:a:podcast_channels_project:podcast_channels:*:*:*:*:*:wordpress:*:* CVE-2014-4550,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.02712,Cross-site scripting (XSS) vulnerability in preview-shortcode-external.php in the Shortcode Ninja plugin 1.4 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the shortcode parameter.,2019-12-27,Nuclei,cpe:2.3:a:visualshortcodes:ninja:*:*:*:*:*:wordpress:*:* CVE-2014-4558,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.1064,Cross-site scripting (XSS) vulnerability in test-plugin.php in the Swipe Checkout for WooCommerce plugin 2.7.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the api_url parameter.,2019-12-27,Nuclei,cpe:2.3:a:cybercompany:swipehq-payment-gateway-woocommerce:*:*:*:*:*:wordpress:*:* CVE-2014-4561,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.12801,The ultimate-weather plugin 1.0 for WordPress has XSS,2020-01-10,Nuclei,cpe:2.3:a:ultimate-weather_project:ultimate-weather:1.0:*:*:*:*:wordpress:*:* CVE-2014-4577,0.0,,0.03228,Absolute path traversal vulnerability in reviews.php in the WP AmASIN - The Amazon Affiliate Shop plugin 0.9.6 and earlier for WordPress allows remote attackers to read arbitrary files via a full pathname in the url parameter.,2014-10-21,Nuclei,cpe:2.3:a:websupporter:wp_amasin_-_the_amazon_affiliate_shop:*:*:*:*:*:wordpress:*:* CVE-2014-4592,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.03802,Cross-site scripting (XSS) vulnerability in rss.class/scripts/magpie_debug.php in the WP-Planet plugin 0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the url parameter.,2019-12-27,Nuclei,cpe:2.3:a:czepol:wp-planet:*:*:*:*:*:wordpress:*:* CVE-2014-4671,0.0,,0.35827,"Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API.",2014-07-09,Metasploit,cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:13.0.0.111:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:13.0.0.83:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.111:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.83:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.275:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.280:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.285:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.291:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.297:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.310:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.332:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.335:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.336:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.341:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.346:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.350:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.356:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:11.2.202.359:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:13.0.0.182:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:13.0.0.201:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:13.0.0.206:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:13.0.0.214:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2014-4863,0.0,,0.23121,"The Arris Touchstone DG950A cable modem with software 7.10.131 has an SNMP community of public, which allows remote attackers to obtain sensitive password, key, and SSID information via an SNMP request.",2014-09-05,Metasploit,cpe:2.3:a:arris:touchstone_dg950a_software:7.10.131:*:*:*:*:*:*:*;cpe:2.3:h:arris:touchstone_dg950a:-:*:*:*:*:*:*:* CVE-2014-4872,0.0,,0.82177,"BMC Track-It! 11.3.0.355 does not require authentication on TCP port 9010, which allows remote attackers to upload arbitrary files, execute arbitrary code, or obtain sensitive credential and configuration information via a .NET Remoting request to (1) FileStorageService or (2) ConfigurationService.",2014-10-10,Metasploit,cpe:2.3:a:bmc:track-it\!:11.3.0.355:*:*:*:*:*:*:* CVE-2014-4877,0.0,,0.69365,"Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.",2014-10-29,Metasploit,cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*;cpe:2.3:a:gnu:wget:1.12:*:*:*:*:*:*:*;cpe:2.3:a:gnu:wget:1.13.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:wget:1.13.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:wget:1.13.3:*:*:*:*:*:*:*;cpe:2.3:a:gnu:wget:1.13.4:*:*:*:*:*:*:*;cpe:2.3:a:gnu:wget:1.13:*:*:*:*:*:*:*;cpe:2.3:a:gnu:wget:1.14:*:*:*:*:*:*:* CVE-2014-4880,0.0,,0.77998,"Buffer overflow in Hikvision DVR DS-7204 Firmware 2.2.10 build 131009, and other models and versions, allows remote attackers to execute arbitrary code via an RTSP PLAY request with a long Authorization header.",2014-12-08,Metasploit,cpe:2.3:h:hikvision:dvr_ds-7204:-:*:*:*:*:*:*:*;cpe:2.3:o:hikvision:dvr_ds-7204_firmware:2.2.10:build_131009:*:*:*:*:*:* CVE-2014-4936,0.0,,0.18948,The upgrade functionality in Malwarebytes Anti-Malware (MBAM) consumer before 2.0.3 and Malwarebytes Anti-Exploit (MBAE) consumer 1.04.1.1012 and earlier allow man-in-the-middle attackers to execute arbitrary code by spoofing the update server and uploading an executable.,2014-12-16,Metasploit,cpe:2.3:a:malwarebytes:malwarebytes_anti-exploit:*:*:*:*:consumer:*:*:*;cpe:2.3:a:malwarebytes:malwarebytes_anti-malware:*:*:*:*:consumer:*:*:* CVE-2014-4940,0.0,,0.57666,Multiple directory traversal vulnerabilities in Tera Charts (tera-charts) plugin 0.1 for WordPress allow remote attackers to read arbitrary files via a .. (dot dot) in the fn parameter to (1) charts/treemap.php or (2) charts/zoomabletreemap.php.,2014-07-11,Nuclei,cpe:2.3:a:tera_charts_plugin_project:tera-charts:0.1:*:*:*:*:wordpress:*:* CVE-2014-4941,0.0,,0.00818,Absolute path traversal vulnerability in Cross-RSS (wp-cross-rss) plugin 1.7 for WordPress allows remote attackers to read arbitrary files via a full pathname in the rss parameter to proxy.php.,2014-07-11,Nuclei,cpe:2.3:a:cross-rss_plugin_project:wp-cross-rss:1.7:*:*:*:*:wordpress:*:* CVE-2014-4942,0.0,,0.02447,"The EasyCart (wp-easycart) plugin before 2.0.6 for WordPress allows remote attackers to obtain configuration information via a direct request to inc/admin/phpinfo.php, which calls the phpinfo function.",2014-07-11,Nuclei,cpe:2.3:a:levelfourdevelopment:wp-easycart:*:*:*:*:*:wordpress:*:*;cpe:2.3:a:levelfourdevelopment:wp-easycart:2.0.1:*:*:*:*:wordpress:*:*;cpe:2.3:a:levelfourdevelopment:wp-easycart:2.0.2:*:*:*:*:wordpress:*:*;cpe:2.3:a:levelfourdevelopment:wp-easycart:2.0.3:*:*:*:*:wordpress:*:*;cpe:2.3:a:levelfourdevelopment:wp-easycart:2.0.4:*:*:*:*:wordpress:*:* CVE-2014-4971,0.0,,0.1516,"Microsoft Windows XP SP3 does not validate addresses in certain IRP handler routines, which allows local users to write data to arbitrary memory locations, and consequently gain privileges, via a crafted address in an IOCTL call, related to (1) the MQAC.sys driver in the MQ Access Control subsystem and (2) the BthPan.sys driver in the Bluetooth Personal Area Networking subsystem.",2014-07-26,Metasploit,cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* CVE-2014-4977,0.0,,0.84481,"Multiple SQL injection vulnerabilities in Dell SonicWall Scrutinizer 11.0.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) selectedUserGroup parameter in a create new user request to cgi-bin/admin.cgi or the (2) user_id parameter in the changeUnit function, (3) methodDetail parameter in the methodDetail function, or (4) xcNetworkDetail parameter in the xcNetworkDetail function in d4d/exporters.php.",2014-07-16,Metasploit,cpe:2.3:a:sonicwall:scrutinizer:11.0.1:*:*:*:*:*:*:* CVE-2014-5005,0.0,,0.85825,Directory traversal vulnerability in ZOHO ManageEngine Desktop Central (DC) before 9 build 90055 allows remote attackers to execute arbitrary code via a .. (dot dot) in the fileName parameter in an LFU action to statusUpdate.,2014-10-21,Metasploit,cpe:2.3:a:zohocorp:manageengine_desktop_central:*:*:*:*:*:*:*:* CVE-2014-5073,0.0,,0.88269,vmtadmin.cgi in VMTurbo Operations Manager before 4.6 build 28657 allows remote attackers to execute arbitrary commands via shell metacharacters in the fileDate parameter in a DOWN call.,2014-08-29,Metasploit,cpe:2.3:a:vmturbo:operations_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:vmturbo:operations_manager:4.0:*:*:*:*:*:*:*;cpe:2.3:a:vmturbo:operations_manager:4.5:-:*:*:*:*:*:*;cpe:2.3:a:vmturbo:operations_manager:4.5:1:*:*:*:*:*:* CVE-2014-5111,0.0,,0.72857,"Multiple directory traversal vulnerabilities in Fonality trixbox allow remote attackers to read arbitrary files via a .. (dot dot) in the lang parameter to (1) home/index.php, (2) asterisk_info/asterisk_info.php, (3) repo/repo.php, or (4) endpointcfg/endpointcfg.php in maint/modules/.",2014-07-28,Nuclei,cpe:2.3:a:netfortris:trixbox:-:*:*:*:*:*:*:* CVE-2014-5181,0.0,,0.00514,Directory traversal vulnerability in lastfm-proxy.php in the Last.fm Rotation (lastfm-rotation) plugin 1.0 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the snode parameter.,2014-08-06,Nuclei,cpe:2.3:a:last.fm_rotation_plugin_project:lastfm-rotation_plugin:1.0:*:*:*:*:wordpress:*:* CVE-2014-5187,0.0,,0.00514,Directory traversal vulnerability in the Tom M8te (tom-m8te) plugin 1.5.3 for WordPress allows remote attackers to read arbitrary files via the file parameter to tom-download-file.php.,2014-08-06,Nuclei,cpe:2.3:a:tom_m8te_plugin_project:tom-m8te_plugin:1.5.3:*:*:*:*:wordpress:*:* CVE-2014-5208,0.0,,0.08455,"BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbitrary files via a STOR operation, or obtain sensitive database-location information via a PMODE operation, a different vulnerability than CVE-2014-0784.",2014-12-22,Metasploit,cpe:2.3:a:yokogawa:centum_cs_3000:r3.01:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.02:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.03:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.04:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.05:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.06:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.07:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.50:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.70:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.08:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.09.50:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_cs_3000:r3.09:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_vp:r5.01.00:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_vp:r5.01.20:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_vp:r5.02.00:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:centum_vp:r5.03.00:*:*:*:*:*:*:*;cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*;cpe:2.3:h:yokogawa:exaopc:-:*:*:*:*:*:*:* CVE-2014-5258,0.0,,0.83495,Directory traversal vulnerability in showTempFile.php in webEdition CMS before 6.3.9.0 Beta allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter.,2014-11-06,Nuclei,cpe:2.3:a:webedition:webedition_cms:*:*:*:*:*:*:*:* CVE-2014-5266,0.0,,0.76306,"The Incutio XML-RPC (IXR) Library, as used in WordPress before 3.9.2 and Drupal 6.x before 6.33 and 7.x before 7.31, does not limit the number of elements in an XML document, which allows remote attackers to cause a denial of service (CPU consumption) via a large document, a different vulnerability than CVE-2014-5265.",2014-08-18,Metasploit,cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.18:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.19:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.20:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.21:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.22:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.23:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.24:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.25:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.26:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.27:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.28:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.29:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.30:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.31:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.32:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*;cpe:2.3:a:drupal:drupal:7.x-dev:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.6.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.6:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.7.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.7:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* CVE-2014-5301,0.0,,0.78386,Directory traversal vulnerability in ServiceDesk Plus MSP v5 to v9.0 v9030; AssetExplorer v4 to v6.1; SupportCenter v5 to v7.9; IT360 v8 to v10.4.,2017-08-28,Metasploit,cpe:2.3:a:manageengine:assetexplorer:-:*:*:*:*:*:*:*;cpe:2.3:a:manageengine:it360:-:*:*:*:*:*:*:*;cpe:2.3:a:manageengine:servicedesk_plus:-:*:*:*:*:*:*:*;cpe:2.3:a:manageengine:supportcenter:-:*:*:*:*:*:*:* CVE-2014-5337,0.0,,0.52794,"The WordPress Mobile Pack plugin before 2.0.2 for WordPress does not properly restrict access to password protected posts, which allows remote attackers to obtain sensitive information via an exportarticles action to export/content.php.",2014-08-29,Metasploit,cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:*:*:*:*:*:wordpress:*:*;cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:1.2.0:*:*:*:*:wordpress:*:*;cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:1.2.0:b2:*:*:*:wordpress:*:*;cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:1.2.0:b:*:*:*:wordpress:*:*;cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.0.8223:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.1:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.2:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.3:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.91:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.92:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.9:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.1:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.3:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.4:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.5:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:2.0:*:*:*:*:wordpress:*:* CVE-2014-5368,0.0,,0.53297,Directory traversal vulnerability in the file_get_contents function in downloadfiles/download.php in the WP Content Source Control (wp-source-control) plugin 3.0.0 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the path parameter.,2014-08-22,Nuclei,cpe:2.3:a:wp_content_source_control_project:wp_content_source_control:*:*:*:*:*:wordpress:*:* CVE-2014-5377,0.0,,0.67644,ReadUsersFromMasterServlet in ManageEngine DeviceExpert before 5.9 build 5981 allows remote attackers to obtain user account credentials via a direct request.,2014-09-04,Metasploit,cpe:2.3:a:manageengine:device_expert:*:*:*:*:*:*:*:* CVE-2014-5383,0.0,,0.23456,SQL injection vulnerability in AlienVault OSSIM before 4.7.0 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.,2014-08-21,Metasploit,cpe:2.3:a:alienvault:open_source_security_information_management:*:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-1:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-2:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-3:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:2.1:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:3.1.10:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:3.1.12:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:3.1.9:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:3.1:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.0:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.1:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.2.3:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.2:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.3.3:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.3:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.4:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.5:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:open_source_security_information_management:4.6:*:*:*:*:*:*:* CVE-2014-5445,0.0,,0.91587,Multiple absolute path traversal vulnerabilities in ZOHO ManageEngine Netflow Analyzer 8.6 through 10.2 and IT360 10.3 allow remote attackers or remote authenticated users to read arbitrary files via a full pathname in the schFilePath parameter to the (1) CSVServlet or (2) CReportPDFServlet servlet.,2014-12-04,Metasploit,cpe:2.3:a:zohocorp:manageengine_it360:10.3.0:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:*:*:*:*:*:*:*:* CVE-2014-5460,0.0,,0.64727,"Unrestricted file upload vulnerability in the Tribulant Slideshow Gallery plugin before 1.4.7 for WordPress allows remote authenticated users to execute arbitrary code by uploading a PHP file, then accessing it via a direct request to the file in wp-content/uploads/slideshow-gallery/.",2014-09-11,Metasploit,cpe:2.3:a:tribulant:tibulant_slideshow_gallery:*:*:*:*:*:wordpress:*:*;cpe:2.3:a:tribulant:tibulant_slideshow_gallery:1.4.1:*:*:*:*:wordpress:*:*;cpe:2.3:a:tribulant:tibulant_slideshow_gallery:1.4.2:*:*:*:*:wordpress:*:*;cpe:2.3:a:tribulant:tibulant_slideshow_gallery:1.4.3:*:*:*:*:wordpress:*:*;cpe:2.3:a:tribulant:tibulant_slideshow_gallery:1.4.4:*:*:*:*:wordpress:*:*;cpe:2.3:a:tribulant:tibulant_slideshow_gallery:1.4.5:*:*:*:*:wordpress:*:*;cpe:2.3:a:tribulant:tibulant_slideshow_gallery:1.4:*:*:*:*:wordpress:*:* CVE-2014-5468,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.65256,"A File Inclusion vulnerability exists in Railo 4.2.1 and earlier via a specially-crafted URL request to the thumbnail.cfm to specify a malicious PNG file, which could let a remote malicious user obtain sensitive information or execute arbitrary code.",2020-02-07,Metasploit,cpe:2.3:a:getrailo:railo:*:*:*:*:*:*:*:* CVE-2014-5470,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.74344,Actual Analyzer through 2014-08-29 allows code execution via shell metacharacters because untrusted input is used for part of the input data passed to an eval operation.,2024-06-21,Metasploit, CVE-2014-5519,0.0,,0.82624,The Ploticus module in PhpWiki 1.5.0 allows remote attackers to execute arbitrary code via shell metacharacters in a device option in the edit[content] parameter to index.php/HeIp. NOTE: some of these details are obtained from third party information.,2014-09-11,Metasploit,cpe:2.3:a:phpwiki_project:phpwiki:1.5.0:*:*:*:*:*:*:* CVE-2014-6034,0.0,,0.86551,"Directory traversal vulnerability in the com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector servlet in ZOHO ManageEngine OpManager 8.8 through 11.3, Social IT Plus 11.0, and IT360 10.4 and earlier allows remote attackers or remote authenticated users to write to and execute arbitrary WAR files via a .. (dot dot) in the regionID parameter.",2014-12-04,Metasploit,cpe:2.3:a:zohocorp:manageengine_it360:*:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_opmanager:10.0:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_opmanager:10.1:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_opmanager:10.2:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_opmanager:11.0:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_opmanager:11.1:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_opmanager:11.2:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_opmanager:11.3:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_opmanager:8.8:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_opmanager:9.0:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_opmanager:9.1:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_opmanager:9.2:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_opmanager:9.4:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_social_it_plus:11.0:*:*:*:*:*:*:* CVE-2014-6037,0.0,,0.81733,"Directory traversal vulnerability in the agentUpload servlet in ZOHO ManageEngine EventLog Analyzer 9.0 build 9002 and 8.2 build 8020 allows remote attackers to execute arbitrary code by uploading a ZIP file which contains an executable file with .. (dot dot) sequences in its name, then accessing the executable via a direct request to the file under the web root. Fixed in Build 11072.",2014-10-26,Metasploit,cpe:2.3:a:zohocorp:manageengine_eventlog_analyzer:8.2:8020:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_eventlog_analyzer:9.0:9002:*:*:*:*:*:* CVE-2014-6038,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.83792,Zoho ManageEngine EventLog Analyzer versions 7 through 9.9 build 9002 have a database Information Disclosure Vulnerability. Fixed in EventLog Analyzer 10.0 Build 10000.,2020-01-13,Metasploit,cpe:2.3:a:zohocorp:manageengine_eventlog_analyzer:*:*:*:*:*:*:*:* CVE-2014-6039,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.83631,ManageEngine EventLog Analyzer version 7 through 9.9 build 9002 has a Credentials Disclosure Vulnerability. Fixed version 10 Build 10000.,2020-01-13,Metasploit,cpe:2.3:a:zohocorp:manageengine_eventlog_analyzer:*:*:*:*:*:*:*:* CVE-2014-6041,0.0,,0.62077,"The Android WebView in Android before 4.4 allows remote attackers to bypass the Same Origin Policy via a crafted attribute containing a \u0000 character, as demonstrated by an onclick=""window.open('\u0000javascript: sequence to the Android Browser application 4.2.1 or a third-party web browser.",2014-09-02,Metasploit,cpe:2.3:a:google:android_browser:4.2.1:*:*:*:*:android:*:* CVE-2014-6271,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9422,"GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka ""ShellShock."" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.",2014-09-24,Metasploit/Nuclei/CISA,cpe:2.3:a:checkpoint:security_gateway:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:8.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:pureapplication_system:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_risk_manager:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:mr1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:mr2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p10:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p11:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p12:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p13:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p7:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p8:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p9:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p7:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8.15:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p10:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p11:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p12:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p13:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p14:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p15:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p16:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p7:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p8:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p9:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.9:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p7:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p10:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p11:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p12:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p13:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p14:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p15:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p16:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p17:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p7:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p8:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p9:*:*:*:*:*:*;cpe:2.3:a:ibm:smartcloud_entry_appliance:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:smartcloud_entry_appliance:2.4.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:smartcloud_entry_appliance:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:smartcloud_entry_appliance:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:smartcloud_provisioning:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:kvm:*:*:*;cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:openflow:*:*:*;cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:vmware:*:*:*;cpe:2.3:a:ibm:starter_kit_for_cloud:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:workload_deployer:*:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*;cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.1:*:*:*:*:*:*:*;cpe:2.3:a:redhat:virtualization:3.4:*:*:*:*:*:*:*;cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.1:update_1:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.1:update_2:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.5:-:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.5:update_1:*:*:*:*:*:*;cpe:2.3:h:citrix:netscaler_sdx:-:*:*:*:*:*:*:*;cpe:2.3:h:f5:arx:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:flex_system_v7000:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:stn6500:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:stn6800:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:stn7800:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:citrix:netscaler_sdx_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:f5:arx_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:flex_system_v7000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.4:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.5:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.6:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.7:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.8:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*;cpe:2.3:o:ibm:stn6500_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:stn6800_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:stn7800_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*;cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*;cpe:2.3:o:novell:open_enterprise_server:11.0:sp2:*:*:*:linux_kernel:*:*;cpe:2.3:o:novell:open_enterprise_server:2.0:sp3:*:*:*:linux_kernel:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:4:*:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.1.1:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.1.1:build_0927:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.9_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.4_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.5_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.3_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.4_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.5_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.6_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.7_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.9_ppc:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.4_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.5_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*;cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*;cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:* CVE-2014-6278,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.91613,"GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.",2014-09-30,Metasploit/CISA,cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:* CVE-2014-6287,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94316,The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search action.,2014-10-07,Metasploit/Nuclei/CISA,cpe:2.3:a:rejetto:http_file_server:*:*:*:*:*:*:*:* CVE-2014-6308,0.0,,0.77267,Directory traversal vulnerability in OSClass before 3.4.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter in a render action to oc-admin/index.php.,2014-10-20,Nuclei,cpe:2.3:a:osclass:osclass:*:*:*:*:*:*:*:*;cpe:2.3:a:osclass:osclass:3.4.0:*:*:*:*:*:*:* CVE-2014-6324,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.85615,"The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote authenticated domain users to obtain domain administrator privileges via a forged signature in a ticket, as exploited in the wild in November 2014, aka ""Kerberos Checksum Vulnerability.""",2014-11-18,Metasploit/CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* CVE-2014-6332,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.93971,"OleAut32.dll in OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted web site, as demonstrated by an array-redimensioning attempt that triggers improper handling of a size value in the SafeArrayDimen function, aka ""Windows OLE Automation Array Remote Code Execution Vulnerability.""",2014-11-11,Metasploit/CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2014-6352,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.90891,"Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object, as exploited in the wild in October 2014 with a crafted PowerPoint document.",2014-10-22,Metasploit/CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2014-6446,0.0,,0.80814,"The Infusionsoft Gravity Forms plugin 1.5.3 through 1.5.10 for WordPress does not properly restrict access, which allows remote attackers to upload arbitrary files and execute arbitrary PHP code via a request to utilities/code_generator.php.",2014-09-26,Metasploit,cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.10:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.3:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.4.1:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.4.2:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.4:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.5:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.6:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.7.1:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.7.2:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.7:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.8.1:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.8:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.9.1:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.9.2:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.9.3:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.9.4:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.9.5:*:*:*:*:wordpress:*:*;cpe:2.3:a:infusionsoft_gravity_forms_project:infusionsoft_gravity_forms:1.5.9:*:*:*:*:wordpress:*:* CVE-2014-6593,0.0,,0.55045,"Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit 27.8.4 and 28.3.4 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.",2015-01-21,Metasploit,cpe:2.3:a:oracle:jdk:1.5.0:update75:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update85:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update71:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update72:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.8.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.8.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.5.0:update75:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update85:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update71:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update72:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.8.0:update25:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.8.0:update6:*:*:*:*:*:*;cpe:2.3:a:oracle:jrockit:r27.8.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jrockit:r28.3.4:*:*:*:*:*:*:* CVE-2014-7146,0.0,,0.80388,"The XmlImportExport plugin in MantisBT 1.2.17 and earlier allows remote attackers to execute arbitrary PHP code via a crafted (1) description field or (2) issuelink attribute in an XML file, which is not properly handled when executing the preg_replace function with the e modifier.",2014-11-18,Metasploit,cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:* CVE-2014-7169,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.90108,"GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.",2014-09-25,CISA,cpe:2.3:a:checkpoint:security_gateway:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:8.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:pureapplication_system:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_risk_manager:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:mr1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:mr2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p10:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p11:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p12:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p13:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p7:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p8:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p9:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p7:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8.15:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p10:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p11:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p12:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p13:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p14:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p15:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p16:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p7:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p8:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p9:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.9:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p7:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p10:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p11:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p12:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p13:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p14:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p15:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p16:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p17:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p7:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p8:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p9:*:*:*:*:*:*;cpe:2.3:a:ibm:smartcloud_entry_appliance:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:smartcloud_entry_appliance:2.4.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:smartcloud_entry_appliance:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:smartcloud_entry_appliance:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:smartcloud_provisioning:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:kvm:*:*:*;cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:openflow:*:*:*;cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:vmware:*:*:*;cpe:2.3:a:ibm:starter_kit_for_cloud:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:workload_deployer:*:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*;cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.1:*:*:*:*:*:*:*;cpe:2.3:a:redhat:virtualization:3.4:*:*:*:*:*:*:*;cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.1:update_1:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.1:update_2:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.5:-:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server_appliance:5.5:update_1:*:*:*:*:*:*;cpe:2.3:h:citrix:netscaler_sdx:-:*:*:*:*:*:*:*;cpe:2.3:h:f5:arx:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:flex_system_v7000:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:stn6500:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:stn6800:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:stn7800:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:citrix:netscaler_sdx_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:f5:arx_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:flex_system_v7000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.4:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.5:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.6:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.7:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.8:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*;cpe:2.3:o:ibm:stn6500_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:stn6800_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:stn7800_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*;cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*;cpe:2.3:o:novell:open_enterprise_server:11.0:sp2:*:*:*:linux_kernel:*:*;cpe:2.3:o:novell:open_enterprise_server:2.0:sp3:*:*:*:linux_kernel:*:*;cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:4:*:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.1.1:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.1.1:build_0927:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.9_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.4_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.5_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.3_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.4_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.5_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.6_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.7_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.9_ppc:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.4_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.5_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*;cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*;cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:* CVE-2014-7205,0.0,,0.84242,Eval injection vulnerability in the internals.batch function in lib/batch.js in the bassmaster plugin before 1.5.2 for the hapi server framework for Node.js allows remote attackers to execute arbitrary Javascript code via unspecified vectors.,2014-10-08,Metasploit,cpe:2.3:a:bassmaster_project:bassmaster:*:*:*:*:*:*:*:* CVE-2014-7228,0.0,,0.07974,"Akeeba Restore (restore.php), as used in Joomla! 2.5.4 through 2.5.25, 3.x through 3.2.5, and 3.3.0 through 3.3.4; Akeeba Backup for Joomla! Professional 3.0.0 through 4.0.2; Backup Professional for WordPress 1.0.b1 through 1.1.3; Solo 1.0.b1 through 1.1.2; Admin Tools Core and Professional 2.0.0 through 2.4.4; and CMS Update 1.0.a1 through 1.0.1, when performing a backup or update for an archive, does not delete parameters from $_GET and $_POST when it is cleansing $_REQUEST, but later accesses $_GET and $_POST using the getQueryParam function, which allows remote attackers to bypass encryption and execute arbitrary code via a command message that extracts a crafted archive.",2014-11-03,Metasploit,cpe:2.3:a:joomla:joomla\!:2.5.10:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.11:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.12:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.13:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.14:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.15:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.16:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.17:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.18:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.19:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.20:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.21:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.22:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.23:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.24:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.25:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.6:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.7:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.8:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.9:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.6:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.4:*:*:*:*:*:*:* CVE-2014-7236,9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,0.84226,Eval injection vulnerability in lib/TWiki/Plugins.pm in TWiki before 6.0.1 allows remote attackers to execute arbitrary Perl code via the debugenableplugins parameter to do/view/Main/WebHome.,2020-02-17,Metasploit,cpe:2.3:a:twiki:twiki:*:*:*:*:*:*:*:*;cpe:2.3:a:twiki:twiki:6.0:*:*:*:*:*:*:* CVE-2014-7285,0.0,,0.70626,The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.,2014-12-17,Metasploit,cpe:2.3:a:symantec:web_gateway:*:*:*:*:*:*:*:* CVE-2014-7816,0.0,,0.54404,"Directory traversal vulnerability in JBoss Undertow 1.0.x before 1.0.17, 1.1.x before 1.1.0.CR5, and 1.2.x before 1.2.0.Beta3, when running on Windows, allows remote attackers to read arbitrary files via a .. (dot dot) in a resource URI.",2014-12-01,Metasploit,cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:undertow:*:beta2:*:*:*:*:*:*;cpe:2.3:a:redhat:undertow:*:cr4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2014-7862,0.0,,0.81398,The DCPluginServelet servlet in ManageEngine Desktop Central and Desktop Central MSP before build 90109 allows remote attackers to create administrator accounts via an addPlugInUser action.,2018-01-04,Metasploit,cpe:2.3:a:zohocorp:desktop_central:*:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:desktop_central:*:*:*:*:managed_service_providers:*:*:* CVE-2014-7863,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.88867,"The FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine Applications Manager before 11.9 build 11912, OpManager 8 through 11.5 build 11400, and IT360 10.5 and earlier does not properly restrict access, which allows remote attackers and remote authenticated users to (1) read arbitrary files via the fileName parameter in a copyfile operation or (2) obtain sensitive information via a directory listing in a listdirectory operation to servlet/FailOverHelperServlet.",2020-02-08,Metasploit,cpe:2.3:a:zohocorp:manageengine_applications_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_it360:*:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:* CVE-2014-7992,0.0,,0.61221,"The DLSw implementation in Cisco IOS does not initialize packet buffers, which allows remote attackers to obtain sensitive credential information from process memory via a session on TCP port 2067, aka Bug ID CSCur14014.",2014-11-18,Metasploit,cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:* CVE-2014-8270,0.0,,0.62077,"BMC Track-It! 11.3 allows remote attackers to gain privileges and execute arbitrary code by creating an account whose name matches that of a local system account, then performing a password reset.",2014-12-12,Metasploit,cpe:2.3:a:bmc:track-it\!:11.3:*:*:*:*:*:*:* CVE-2014-8361,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94027,"The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.",2015-05-01,Metasploit/CISA,cpe:2.3:a:realtek:realtek_sdk:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:w1200ex-ms:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:w1200ex:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:w300p:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:w500p:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:wf300hp2:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:wf800hp:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:wg1200hp2:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:wg1200hp3:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:wg1200hp:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:wg1200hs2:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:wg1200hs:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:wg1800hp3:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:wg1800hp4:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:wg1900hp2:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:wg1900hp:-:*:*:*:*:*:*:*;cpe:2.3:h:aterm:wr8165n:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-501:a1:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-515:a1:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-600l:a1:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-600l:b1:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-605l:a1:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-605l:b1:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-605l:c1:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-615:fx:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-615:j1:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-619l:a1:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-809:a1:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-809:a2:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-900l:a1:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-905l:a1:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-905l:b1:*:*:*:*:*:*:*;cpe:2.3:o:aterm:w1200ex-ms_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:aterm:w1200ex_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:aterm:w300p_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:aterm:w500p_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:aterm:wf300hp2_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:aterm:wf800hp_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:aterm:wg1200hp2_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:aterm:wg1200hp3_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:aterm:wg1200hp_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:aterm:wg1200hs2_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:aterm:wg1200hs_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:aterm:wg1800hp3_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:aterm:wg1800hp4_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:aterm:wg1900hp2_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:aterm:wg1900hp_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:aterm:wr8165n_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-501_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-515_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-615_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-615_firmware:10.01b02:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-619l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-809_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-900l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-905l_firmware:*:*:*:*:*:*:*:* CVE-2014-8423,0.0,,0.41689,Unspecified vulnerability in the management portal in ARRIS VAP2500 before FW08.41 allows remote attackers to execute arbitrary commands via unknown vectors.,2014-11-28,Metasploit,cpe:2.3:o:arris:vap2500_firmware:*:*:*:*:*:*:*:* CVE-2014-8424,0.0,,0.53544,"ARRIS VAP2500 before FW08.41 does not properly validate passwords, which allows remote attackers to bypass authentication.",2014-11-28,Metasploit,cpe:2.3:o:arris:vap2500_firmware:*:*:*:*:*:*:*:* CVE-2014-8439,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.31479,"Adobe Flash Player before 13.0.0.258 and 14.x and 15.x before 15.0.0.239 on Windows and OS X and before 11.2.202.424 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK & Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference) via unspecified vectors.",2014-11-25,CISA,cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2014-8440,0.0,,0.86842,"Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0576, CVE-2014-0581, and CVE-2014-8441.",2014-11-11,Metasploit,cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2014-8499,0.0,,0.76519,Multiple SQL injection vulnerabilities in ManageEngine Password Manager Pro (PMP) and Password Manager Pro Managed Service Providers (MSP) edition before 7.1 build 7105 allow remote authenticated users to execute arbitrary SQL commands via the SEARCH_ALL parameter to (1) SQLAdvancedALSearchResult.cc or (2) AdvancedSearchResult.cc.,2014-11-17,Metasploit,cpe:2.3:a:manageengine:password_manager_pro:*:build_7104:*:*:*:*:*:*;cpe:2.3:a:manageengine:password_manager_pro:*:build_7104:*:*:managed_service_providers:*:*:* CVE-2014-8516,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.82704,"Unrestricted file upload vulnerability in Visual Mining NetCharts Server allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via unspecified vectors.",2020-01-03,Metasploit,cpe:2.3:a:cloudfastpath:netcharts_server:-:*:*:*:*:*:*:* CVE-2014-8517,0.0,,0.8518,"The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an HTTP redirect.",2014-11-17,Metasploit,cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.9.5:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:* CVE-2014-8586,0.0,,0.78024,SQL injection vulnerability in the CP Multi View Event Calendar plugin 1.01 for WordPress allows remote attackers to execute arbitrary SQL commands via the calid parameter.,2014-11-04,Metasploit,cpe:2.3:a:cp_multi_view_event_calendar_project:cp_multi_view_event_calendar:1.0.1:*:*:*:wordpress:*:*:* CVE-2014-8598,0.0,,0.67363,"The XML Import/Export plugin in MantisBT 1.2.x does not restrict access, which allows remote attackers to (1) upload arbitrary XML files via the import page or (2) obtain sensitive information via the export page. NOTE: this issue can be combined with CVE-2014-7146 to execute arbitrary PHP code.",2014-11-18,Metasploit,cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:* CVE-2014-8636,0.0,,0.83612,"The XrayWrapper implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly interact with a DOM object that has a named getter, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via unspecified vectors.",2015-01-14,Metasploit,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* CVE-2014-8676,0.0,,0.77744,Directory traversal vulnerability in the file_get_contents function in SOPlanning 1.32 and earlier allows remote attackers to determine the existence of arbitrary files via a .. (dot dot) in a URL path parameter.,2017-08-31,Nuclei,cpe:2.3:a:soplanning:soplanning:*:*:*:*:*:*:*:* CVE-2014-8682,0.0,,0.68379,"Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.",2014-11-21,Nuclei,cpe:2.3:a:gogits:gogs:*:*:*:*:*:*:*:*;cpe:2.3:a:gogits:gogs:0.3.1-9:*:*:*:*:*:*:*;cpe:2.3:a:gogits:gogs:0.4.1:*:*:*:*:*:*:*;cpe:2.3:a:gogits:gogs:0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:gogits:gogs:0.5.0:*:*:*:*:*:*:*;cpe:2.3:a:gogits:gogs:0.5.2:*:*:*:*:*:*:* CVE-2014-8684,0.0,,0.44845,CodeIgniter before 3.0 and Kohana 3.2.3 and earlier and 3.3.x through 3.3.2 make it easier for remote attackers to spoof session cookies and consequently conduct PHP object injection attacks by leveraging use of standard string comparison operators to compare cryptographic hashes.,2017-09-19,Metasploit,cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*;cpe:2.3:a:kohanaframework:kohana:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:kohanaframework:kohana:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:kohanaframework:kohana:3.3.1:*:*:*:*:*:*:* CVE-2014-8686,0.0,,0.31167,CodeIgniter before 2.2.0 makes it easier for attackers to decode session cookies by leveraging fallback to a custom XOR-based encryption scheme when the Mcrypt extension for PHP is not available.,2017-09-19,Metasploit,cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:* CVE-2014-8687,0.0,,0.49871,Seagate Business NAS devices with firmware before 2015.00322 allow remote attackers to execute arbitrary code with root privileges by leveraging use of a static encryption key to create session tokens.,2017-06-08,Metasploit,cpe:2.3:h:seagate:business_nas:-:*:*:*:*:*:*:*;cpe:2.3:o:seagate:business_nas_firmware:2014.00319:*:*:*:*:*:*:* CVE-2014-8739,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.82932,"Unrestricted file upload vulnerability in server/php/UploadHandler.php in the jQuery File Upload Plugin 6.4.4 for jQuery, as used in the Creative Solutions Creative Contact Form (formerly Sexy Contact Form) before 1.0.0 for WordPress and before 2.0.1 for Joomla!, allows remote attackers to execute arbitrary code by uploading a PHP file with an PHP extension, then accessing it via a direct request to the file in files/, as exploited in the wild in October 2014.",2020-02-08,Nuclei,cpe:2.3:a:creative-solutions:creative_contact_form:*:*:*:*:*:joomla\!:*:*;cpe:2.3:a:creative-solutions:creative_contact_form:*:*:*:*:*:wordpress:*:*;cpe:2.3:a:jquery_file_upload_project:jquery_file_upload:6.4.4:*:*:*:*:*:*:* CVE-2014-8741,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.7035,Directory traversal vulnerability in the GfdFileUploadServerlet servlet in Lexmark MarkVision Enterprise before 2.1 allows remote attackers to write to arbitrary files via unspecified vectors.,2020-01-27,Metasploit,cpe:2.3:a:lexmark:markvision_enterprise:*:*:*:*:*:*:*:* CVE-2014-8791,0.0,,0.52397,"project/register.php in Tuleap before 7.7, when sys_create_project_in_one_step is disabled, allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via the data parameter.",2014-12-02,Metasploit,cpe:2.3:a:enalean:tuleap:7.6:*:*:*:*:*:*:* CVE-2014-8799,0.0,,0.89134,Directory traversal vulnerability in the dp_img_resize function in php/dp-functions.php in the DukaPress plugin before 2.5.4 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the src parameter to lib/dp_image.php.,2014-11-28,Metasploit/Nuclei,cpe:2.3:a:dukapress:dukapress:*:*:*:*:*:wordpress:*:* CVE-2014-8998,0.0,,0.66001,"lib/message.php in X7 Chat 2.0.0 through 2.0.5.1 allows remote authenticated users to execute arbitrary PHP code via a crafted HTTP header to index.php, which is processed by the preg_replace function with the eval switch.",2014-11-20,Metasploit,cpe:2.3:a:x7chat:x7_chat:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:x7chat:x7_chat:2.0.0:a1:*:*:*:*:*:*;cpe:2.3:a:x7chat:x7_chat:2.0.0:a2:*:*:*:*:*:*;cpe:2.3:a:x7chat:x7_chat:2.0.0:a3:*:*:*:*:*:*;cpe:2.3:a:x7chat:x7_chat:2.0.0:b1:*:*:*:*:*:*;cpe:2.3:a:x7chat:x7_chat:2.0.0:b2:*:*:*:*:*:*;cpe:2.3:a:x7chat:x7_chat:2.0.1:a1:*:*:*:*:*:*;cpe:2.3:a:x7chat:x7_chat:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:x7chat:x7_chat:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:x7chat:x7_chat:2.0.4.1:*:*:*:*:*:*:*;cpe:2.3:a:x7chat:x7_chat:2.0.4.3:*:*:*:*:*:*:*;cpe:2.3:a:x7chat:x7_chat:2.0.4.4:*:*:*:*:*:*:*;cpe:2.3:a:x7chat:x7_chat:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:x7chat:x7_chat:2.0.5.1:*:*:*:*:*:*:*;cpe:2.3:a:x7chat:x7_chat:2.0.5:*:*:*:*:*:*:* CVE-2014-9016,0.0,,0.79786,The password hashing API in Drupal 7.x before 7.34 and the Secure Password Hashes (aka phpass) module 6.x-2.x before 6.x-2.1 for Drupal allows remote attackers to cause a denial of service (CPU and memory consumption) via a crafted request.,2014-11-24,Metasploit,cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*;cpe:2.3:a:secure_password_hashes_project:secure_passwords_hashes:*:*:*:*:*:drupal:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* CVE-2014-9094,0.0,,0.16392,Multiple cross-site scripting (XSS) vulnerabilities in deploy/designer/preview.php in the Digital Zoom Studio (DZS) Video Gallery plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) swfloc or (2) designrand parameter.,2014-11-26,Nuclei,cpe:2.3:a:digitalzoomstudio:video_gallery:-:*:*:*:*:wordpress:*:* CVE-2014-9119,0.0,,0.52011,Directory traversal vulnerability in download.php in the DB Backup plugin 4.5 and earlier for Wordpress allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.,2014-12-31,Nuclei,cpe:2.3:a:db_backup_project:db_backup:*:*:*:*:*:wordpress:*:* CVE-2014-9163,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.12835,"Stack-based buffer overflow in Adobe Flash Player before 13.0.0.259 and 14.x and 15.x before 15.0.0.246 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in December 2014.",2014-12-10,CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2014-9180,0.0,,0.11038,Open redirect vulnerability in go.php in Eleanor CMS allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the QUERY_STRING.,2014-12-02,Nuclei,cpe:2.3:a:eleanor-cms:eleanor_cms:-:*:*:*:*:*:*:* CVE-2014-9195,0.0,,0.86408,"Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.",2015-01-17,Metasploit,cpe:2.3:a:phoenixcontact-software:multiprog:5.0:*:*:*:*:*:*:*;cpe:2.3:a:phoenixcontact-software:multiprog:5.0:*:*:*:express:*:*:*;cpe:2.3:a:phoenixcontact-software:multiprog:5.0:*:*:*:pro\+:*:*:*;cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:*:*:*:*;cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:single_chip:*:*:*;cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:softplc:*:*:*;cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:visual_studio:*:*:* CVE-2014-9222,0.0,,0.86448,"AllegroSoft RomPager 4.34 and earlier, as used in Huawei Home Gateway products and other vendors and products, allows remote attackers to gain privileges via a crafted cookie that triggers memory corruption, aka the ""Misfortune Cookie"" vulnerability.",2014-12-24,Metasploit,cpe:2.3:a:allegrosoft:rompager:*:*:*:*:*:*:*:* CVE-2014-9308,0.0,,0.82898,"Unrestricted file upload vulnerability in inc/amfphp/administration/banneruploaderscript.php in the WP EasyCart (aka WordPress Shopping Cart) plugin before 3.0.9 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in products/banners/.",2015-01-15,Metasploit,cpe:2.3:a:wpeasycart:wp_easycart:*:*:*:*:*:wordpress:*:* CVE-2014-9312,0.0,,0.76455,Unrestricted File Upload vulnerability in Photo Gallery 1.2.5.,2017-08-28,Metasploit,cpe:2.3:a:10web:photo_gallery:1.2.5:*:*:*:*:wordpress:*:* CVE-2014-9390,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.53354,"Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.",2020-02-12,Metasploit,cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:xcode:6.2:-:*:*:*:*:*:*;cpe:2.3:a:apple:xcode:6.2:beta_2:*:*:*:*:*:*;cpe:2.3:a:eclipse:egit:*:*:*:*:*:*:*:*;cpe:2.3:a:eclipse:jgit:*:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*;cpe:2.3:a:libgit2:libgit2:*:*:*:*:*:*:*:*;cpe:2.3:a:mercurial:mercurial:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2014-9444,0.0,,0.03285,Cross-site scripting (XSS) vulnerability in the Frontend Uploader plugin 0.9.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the errors[fu-disallowed-mime-type][0][name] parameter to the default URI.,2015-01-02,Nuclei,cpe:2.3:a:frontend_uploader_project:frontend_uploader:0.9.2:*:*:*:*:wordpress:*:* CVE-2014-9566,0.0,,0.78926,"Multiple SQL injection vulnerabilities in the Manage Accounts page in the AccountManagement.asmx service in the Solarwinds Orion Platform 2015.1, as used in Network Performance Monitor (NPM) before 11.5, NetFlow Traffic Analyzer (NTA) before 4.1, Network Configuration Manager (NCM) before 7.3.2, IP Address Manager (IPAM) before 4.3, User Device Tracker (UDT) before 3.2, VoIP & Network Quality Manager (VNQM) before 4.2, Server & Application Manager (SAM) before 6.2, Web Performance Monitor (WPM) before 2.2, and possibly other Solarwinds products, allow remote authenticated users to execute arbitrary SQL commands via the (1) dir or (2) sort parameter to the (a) GetAccounts or (b) GetAccountGroups endpoint.",2015-03-10,Metasploit,cpe:2.3:a:solarwinds:orion_ip_address_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:orion_netflow_traffic_analyzer:*:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:orion_network_configuration_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:orion_network_performance_monitor:*:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:orion_server_and_application_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:orion_user_device_tracker:*:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:orion_voip_\&_network_quality_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:orion_web_performance_monitor:*:*:*:*:*:*:*:* CVE-2014-9583,0.0,,0.91049,"common.c in infosvr in ASUS WRT firmware 3.0.0.4.376_1071, 3.0.0.376.2524-g0013f52, and other versions, as used in RT-AC66U, RT-N66U, and other routers, does not properly check the MAC address for a request, which allows remote attackers to bypass authentication and execute arbitrary commands via a NET_CMD_ID_MANU_CMD packet to UDP port 9999. NOTE: this issue was incorrectly mapped to CVE-2014-10000, but that ID is invalid due to its use as an example of the 2014 CVE ID syntax change.",2015-01-08,Metasploit,cpe:2.3:h:asus:rt-ac66u:*:*:*:*:*:*:*:*;cpe:2.3:h:asus:rt-n66u:*:*:*:*:*:*:*:*;cpe:2.3:o:asus:wrt_firmware:3.0.0.4.376.2524-g0012f52:*:*:*:*:*:*:*;cpe:2.3:o:asus:wrt_firmware:3.0.0.4.376_1071:*:*:*:*:*:*:*;cpe:2.3:o:t-mobile:tm-ac1900:3.0.0.4.376_3169:*:*:*:*:*:*:* CVE-2014-9606,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.09412,"Multiple cross-site scripting (XSS) vulnerabilities in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) server parameter to remotereporter/load_logfiles.php, (2) customctid parameter to webadmin/policy/category_table_ajax.php, (3) urllist parameter to webadmin/alert/alert.php, (4) QUERY_STRING to webadmin/ajaxfilemanager/ajax_get_file_listing.php, or (5) PATH_INFO to webadmin/policy/policy_table_ajax.php/.",2020-02-19,Nuclei,cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* CVE-2014-9607,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.08963,Cross-site scripting (XSS) vulnerability in remotereporter/load_logfiles.php in Netsweeper 4.0.3 and 4.0.4 allows remote attackers to inject arbitrary web script or HTML via the url parameter.,2020-02-19,Nuclei,cpe:2.3:a:netsweeper:netsweeper:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:netsweeper:netsweeper:4.0.4:*:*:*:*:*:*:* CVE-2014-9608,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.25742,"Cross-site scripting (XSS) vulnerability in webadmin/policy/group_table_ajax.php/ in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.",2020-02-19,Nuclei,cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* CVE-2014-9609,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.33789,"Directory traversal vulnerability in webadmin/reporter/view_server_log.php in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to list directory contents via a .. (dot dot) in the log parameter in a stats action.",2020-02-19,Nuclei,cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* CVE-2014-9614,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.69538,"The Web Panel in Netsweeper before 4.0.5 has a default password of branding for the branding account, which makes it easier for remote attackers to obtain access via a request to webadmin/.",2020-02-19,Nuclei,cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* CVE-2014-9615,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.09355,Cross-site scripting (XSS) vulnerability in Netsweeper 4.0.4 allows remote attackers to inject arbitrary web script or HTML via the url parameter to webadmin/deny/index.php.,2020-02-19,Nuclei,cpe:2.3:a:netsweeper:netsweeper:4.0.4:*:*:*:*:*:*:* CVE-2014-9617,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.26191,Open redirect vulnerability in remotereporter/load_logfiles.php in Netsweeper before 4.0.5 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter.,2020-02-19,Nuclei,cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* CVE-2014-9618,0.0,,0.68171,"The Client Filter Admin portal in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and subsequently create arbitrary profiles via a showdeny action to the default URL.",2017-09-19,Nuclei,cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:*;cpe:2.3:a:netsweeper:netsweeper:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:netsweeper:netsweeper:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:netsweeper:netsweeper:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:netsweeper:netsweeper:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:netsweeper:netsweeper:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:netsweeper:netsweeper:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:netsweeper:netsweeper:4.0.6:*:*:*:*:*:*:*;cpe:2.3:a:netsweeper:netsweeper:4.0.7:*:*:*:*:*:*:*;cpe:2.3:a:netsweeper:netsweeper:4.0.8:*:*:*:*:*:*:*;cpe:2.3:a:netsweeper:netsweeper:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:netsweeper:netsweeper:4.1.1:*:*:*:*:*:*:* CVE-2014-9707,0.0,,0.66123,"EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.",2015-03-31,Metasploit,cpe:2.3:a:embedthis:goahead:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:embedthis:goahead:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:embedthis:goahead:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:embedthis:goahead:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:embedthis:goahead:3.3.4:*:*:*:*:*:*:*;cpe:2.3:a:embedthis:goahead:3.3.5:*:*:*:*:*:*:*;cpe:2.3:a:embedthis:goahead:3.3.6:*:*:*:*:*:*:*;cpe:2.3:a:embedthis:goahead:3.4.0:*:*:*:*:*:*:* CVE-2014-9727,0.0,,0.87064,AVM Fritz!Box allows remote attackers to execute arbitrary commands via shell metacharacters in the var:lang parameter to cgi-bin/webcm.,2015-05-29,Metasploit,cpe:2.3:a:avm:fritz\!box:*:*:*:*:*:*:*:* CVE-2014-9735,0.0,,0.82904,"The ThemePunch Slider Revolution (revslider) plugin before 3.0.96 for WordPress and Showbiz Pro plugin 1.7.1 and earlier for Wordpress does not properly restrict access to administrator AJAX functionality, which allows remote attackers to (1) upload and execute arbitrary files via an update_plugin action; (2) delete arbitrary sliders via a delete_slider action; and (3) create, (4) update, (5) import, or (6) export arbitrary sliders via unspecified vectors.",2015-06-30,Metasploit/Nuclei,cpe:2.3:a:themepunch:showbiz_pro:*:*:*:*:*:wordpress:*:*;cpe:2.3:a:themepunch:slider_revolution:*:*:*:*:*:wordpress:*:* CVE-2015-0002,0.0,,0.45054,"The AhcVerifyAdminContext function in ahcache.sys in the Application Compatibility component in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not verify that an impersonation token is associated with an administrative account, which allows local users to gain privileges by running AppCompatCache.exe with a crafted DLL file, aka MSRC ID 20544 or ""Microsoft Application Compatibility Infrastructure Elevation of Privilege Vulnerability.""",2015-01-13,Metasploit,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:x64:*:* CVE-2015-0016,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.91148,"Directory traversal vulnerability in the TS WebProxy (aka TSWbPrxy) component in Microsoft Windows Vista SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via a crafted pathname in an executable file, as demonstrated by a transition from Low Integrity to Medium Integrity, aka ""Directory Traversal Elevation of Privilege Vulnerability.""",2015-01-13,Metasploit/CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2015-0071,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,0.38043,"Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka ""Internet Explorer ASLR Bypass Vulnerability.""",2015-02-11,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2015-0072,0.0,,0.88552,"Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origin Policy and inject arbitrary web script or HTML via vectors involving an IFRAME element that triggers a redirect, a second IFRAME element that does not trigger a redirect, and an eval of a WindowProxy object, aka ""Universal XSS (UXSS).""",2015-02-07,Metasploit,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:* CVE-2015-0096,0.0,,0.88654,"Untrusted search path vulnerability in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, leading to DLL loading during Windows Explorer access to the icon of a crafted shortcut, aka ""DLL Planting Remote Code Execution Vulnerability.""",2015-03-11,Metasploit,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2015-0235,0.0,,0.85447,"Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka ""GHOST.""",2015-01-28,Metasploit,cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:pureapplication_system:1.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:pureapplication_system:1.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:security_access_manager_for_enterprise_single_sign-on:8.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_eagle_application_processor:16.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_lsms:13.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_policy_management:10.4.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_policy_management:11.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_policy_management:12.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_policy_management:9.7.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_policy_management:9.9.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_session_border_controller:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_session_border_controller:7.2.0:-:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_user_data_repository:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_webrtc_session_controller:7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_webrtc_session_controller:7.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*;cpe:2.3:a:php:php:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:* CVE-2015-0240,0.0,,0.90928,"The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.",2015-02-24,Metasploit,cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*;cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_desktop:12:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_server:12:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* CVE-2015-0310,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.40551,"Adobe Flash Player before 13.0.0.262 and 14.x through 16.x before 16.0.0.287 on Windows and OS X and before 11.2.202.438 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism on Windows, and have an unspecified impact on other platforms, via unknown vectors, as exploited in the wild in January 2015.",2015-01-23,CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2015-0311,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92745,"Unspecified vulnerability in Adobe Flash Player through 13.0.0.262 and 14.x, 15.x, and 16.x through 16.0.0.287 on Windows and OS X and through 11.2.202.438 on Linux allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in January 2015.",2015-01-23,Metasploit/CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:* CVE-2015-0313,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92841,"Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2015, a different vulnerability than CVE-2015-0315, CVE-2015-0320, and CVE-2015-0322.",2015-02-02,Metasploit/CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:* CVE-2015-0318,0.0,,0.89185,"Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0321, CVE-2015-0329, and CVE-2015-0330.",2015-02-06,Metasploit,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2015-0336,0.0,,0.91735,"Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code by leveraging an unspecified ""type confusion,"" a different vulnerability than CVE-2015-0334.",2015-03-13,Metasploit,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.305:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2015-0359,0.0,,0.89602,"Double free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0346.",2015-04-14,Metasploit,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2015-0554,0.0,,0.38604,"The ADB (formerly Pirelli Broadband Solutions) P.DGA4001N router with firmware PDG_TEF_SP_4.06L.6 does not properly restrict access to the web interface, which allows remote attackers to obtain sensitive information or cause a denial of service (device restart) as demonstrated by a direct request to (1) wlsecurity.html or (2) resetrouter.html.",2015-01-21,Nuclei,cpe:2.3:h:adb:p.dga4001n:*:*:*:*:*:*:*:*;cpe:2.3:o:adb:p.dga4001n_firmware:pdg_tef_sp_4.06l.6:*:*:*:*:*:*:* CVE-2015-0666,0.0,,0.68969,"Directory traversal vulnerability in the fmserver servlet in Cisco Prime Data Center Network Manager (DCNM) before 7.1(1) allows remote attackers to read arbitrary files via a crafted pathname, aka Bug ID CSCus00241.",2015-04-03,CISA,cpe:2.3:a:cisco:prime_data_center_network_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:6.3\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:6.3\(2\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_data_center_network_manager:7.0\(1\):*:*:*:*:*:*:* CVE-2015-0779,0.0,,0.80149,"Directory traversal vulnerability in UploadServlet in Novell ZENworks Configuration Management (ZCM) 10 and 11 before 11.3.2 allows remote attackers to execute arbitrary code via a crafted directory name in the uid parameter, in conjunction with a WAR filename in the filename parameter and WAR content in the POST data, a different vulnerability than CVE-2010-5323 and CVE-2010-5324.",2015-06-07,Metasploit,cpe:2.3:a:novell:zenworks_configuration_management:11.2.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.2.2:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.2.3:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11:sp1:*:*:*:*:*:* CVE-2015-0802,0.0,,0.80386,"Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.",2015-04-01,Metasploit,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* CVE-2015-0816,0.0,,0.8537,"Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.",2015-04-01,Metasploit,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* CVE-2015-0921,0.0,,0.58217,XML external entity (XXE) vulnerability in the Server Task Log in McAfee ePolicy Orchestrator (ePO) before 4.6.9 and 5.x before 5.1.2 allows remote authenticated users to read arbitrary files via the conditionXML parameter to the taskLogTable to orionUpdateTableFilter.do.,2015-01-09,Metasploit,cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:epolicy_orchestrator:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:epolicy_orchestrator:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:epolicy_orchestrator:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:epolicy_orchestrator:5.1.1:*:*:*:*:*:*:* CVE-2015-0922,0.0,,0.45748,"McAfee ePolicy Orchestrator (ePO) before 4.6.9 and 5.x before 5.1.2 uses the same secret key across different customers' installations, which allows attackers to obtain the administrator password by leveraging knowledge of the encrypted password.",2015-01-09,Metasploit,cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:epolicy_orchestrator:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:epolicy_orchestrator:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:epolicy_orchestrator:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:epolicy_orchestrator:5.1.1:*:*:*:*:*:*:* CVE-2015-0923,0.0,,0.77782,"The ContentBlockEx method in Workarea/ServerControlWS.asmx in Ektron Content Management System (CMS) 8.5 and 8.7 before 8.7sp2 and 9.0 before sp1 allows remote attackers to read arbitrary files via an external entity declaration in conjunction with an entity reference within an XML document named in the xslt parameter, related to an XML External Entity (XXE) issue.",2015-02-14,Metasploit,cpe:2.3:a:ektron:ektron_content_management_system:8.5.0:*:*:*:*:*:*:*;cpe:2.3:a:ektron:ektron_content_management_system:8.7.0:*:*:*:*:*:*:*;cpe:2.3:a:ektron:ektron_content_management_system:8.7.0:sp1:*:*:*:*:*:*;cpe:2.3:a:ektron:ektron_content_management_system:8.9.0:*:*:*:*:*:*:* CVE-2015-0925,0.0,,0.65646,"The client in iPass Open Mobile before 2.4.5 on Windows allows remote authenticated users to execute arbitrary code via a DLL pathname in a crafted Unicode string that is improperly handled by a subprocess reached through a named pipe, as demonstrated by a UNC share pathname.",2015-01-22,Metasploit,cpe:2.3:a:ipass:ipass_open_mobile:*:*:*:*:*:windows:*:* CVE-2015-0936,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.86318,"Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote attackers to obtain SSH access by leveraging knowledge of the private key.",2017-06-01,Metasploit,cpe:2.3:h:ceragon:fibeair_ip-10c:-:*:*:*:*:*:*:*;cpe:2.3:h:ceragon:fibeair_ip-10e:-:*:*:*:*:*:*:*;cpe:2.3:h:ceragon:fibeair_ip-10g:-:*:*:*:*:*:*:*;cpe:2.3:o:ceragon:fibeair_ip-10_firmware:-:*:*:*:*:*:*:* CVE-2015-1000005,0.0,,0.21197,Remote file download vulnerability in candidate-application-form v1.0 wordpress plugin,2016-10-06,Nuclei,cpe:2.3:a:candidate-application-form_project:candidate-application-form:1.0:*:*:*:*:wordpress:*:* CVE-2015-1000010,0.0,,0.31974,Remote file download in simple-image-manipulator v1.0 wordpress plugin,2016-10-06,Nuclei,cpe:2.3:a:simple-image-manipulator_project:simple-image-manipulator:1.0:*:*:*:*:wordpress:*:* CVE-2015-1000012,0.0,,0.68585,Local File Inclusion Vulnerability in mypixs v0.3 wordpress plugin,2016-10-06,Nuclei,cpe:2.3:a:mypixs_project:mypixs:0.3:*:*:*:*:wordpress:*:* CVE-2015-1126,0.0,,0.65446,"WebKit, as used in Apple iOS before 8.3 and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, does not properly handle the userinfo field in FTP URLs, which allows remote attackers to trigger incorrect resource access via unspecified vectors.",2015-04-10,Metasploit,cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:8.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:8.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:8.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:8.0.4:*:*:*:*:*:*:*;cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* CVE-2015-1130,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.22446,The XPC implementation in Admin Framework in Apple OS X before 10.10.3 allows local users to bypass authentication and obtain admin privileges via unspecified vectors.,2015-04-10,Metasploit/CISA,cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* CVE-2015-1155,0.0,,0.5513,"The history implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to bypass the Same Origin Policy and read arbitrary files via a crafted web site.",2015-05-08,Metasploit,cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:7.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:8.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:8.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:8.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:8.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:8.0.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* CVE-2015-1171,0.0,,0.76868,Stack-based buffer overflow in GSM SIM Utility (aka SIM Card Editor) 6.6 allows remote attackers to execute arbitrary code via a long entry in a .sms file.,2015-08-28,Metasploit,cpe:2.3:a:gsm:sim_card_editor:6.6:*:*:*:*:*:*:* CVE-2015-1172,0.0,,0.81153,"Unrestricted file upload vulnerability in admin/upload-file.php in the Holding Pattern theme (aka holding_pattern) 0.6 and earlier for WordPress allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in an unspecified directory.",2015-02-11,Metasploit,cpe:2.3:a:holding_pattern_project:holding_pattern:*:*:*:*:*:wordpress:*:* CVE-2015-1187,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.7816,The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.,2017-09-21,Metasploit/CISA,cpe:2.3:h:dlink:dir-626l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-636l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-651:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-808l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-810l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-820l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-826l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-830l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-836l:-:*:*:*:*:*:*:*;cpe:2.3:h:trendnet:tew-651br:-:*:*:*:*:*:*:*;cpe:2.3:h:trendnet:tew-652br:-:*:*:*:*:*:*:*;cpe:2.3:h:trendnet:tew-711br:-:*:*:*:*:*:*:*;cpe:2.3:h:trendnet:tew-731br:-:*:*:*:*:*:*:*;cpe:2.3:h:trendnet:tew-810dr:-:*:*:*:*:*:*:*;cpe:2.3:h:trendnet:tew-813dru:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-626l_firmware:1.04:b04:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-636l_firmware:1.04:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-651_firmware:1.10na:b02:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-808l_firmware:1.03:b05:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-810l_firmware:1.01:b04:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-810l_firmware:2.02:b01:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-820l_firmware:1.02:b10:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-820l_firmware:1.05:b03:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-820l_firmware:2.01:b02:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-826l_firmware:1.00:b23:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-830l_firmware:1.00:b07:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-836l_firmware:1.01:b03:*:*:*:*:*:*;cpe:2.3:o:trendnet:tew-651br_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:trendnet:tew-652br_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:trendnet:tew-711br_firmware:1.00:b31:*:*:*:*:*:*;cpe:2.3:o:trendnet:tew-731br_firmware:2.01:b01:*:*:*:*:*:*;cpe:2.3:o:trendnet:tew-810dr_firmware:1.00:b19:*:*:*:*:*:*;cpe:2.3:o:trendnet:tew-813dru_firmware:1.00:b23:*:*:*:*:*:* CVE-2015-1318,0.0,,0.26699,The crash reporting feature in Apport 2.13 through 2.17.x before 2.17.1 allows local users to gain privileges via a crafted usr/share/apport/apport file in a namespace (container).,2015-04-17,Metasploit,cpe:2.3:a:apport_project:apport:2.13.1:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.13.2:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.13.3:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.13:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.14.1:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.14.2:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.14.3:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.14.4:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.14.5:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.14.6:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.14.7:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.14:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.15.1:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.15:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.16.1:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.16.2:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.16:*:*:*:*:*:*:*;cpe:2.3:a:apport_project:apport:2.17:*:*:*:*:*:*:* CVE-2015-1328,0.0,,0.89564,"The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace.",2016-11-28,Metasploit,cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* CVE-2015-1376,0.0,,0.7051,"pixabay-images.php in the Pixabay Images plugin before 2.4 for WordPress does not validate hostnames, which allows remote authenticated users to write to arbitrary files via an upload URL with a host other than pixabay.com.",2015-01-28,Metasploit,cpe:2.3:a:pixabay_images_project:pixabay_images:*:*:*:*:*:wordpress:*:* CVE-2015-1419,0.0,,0.3529,"Unspecified vulnerability in vsftpd 3.0.2 and earlier allows remote attackers to bypass access restrictions via unknown vectors, related to deny_file parsing.",2015-01-28,Nuclei,cpe:2.3:a:vsftpd_project:vsftpd:*:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* CVE-2015-1427,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92882,The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.,2015-02-17,Metasploit/Nuclei/CISA,cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:fuse:1.0.0:*:*:*:*:*:*:* CVE-2015-1486,0.0,,0.78501,The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote attackers to bypass authentication via a crafted password-reset action that triggers a new administrative session.,2015-08-01,Metasploit,cpe:2.3:a:symantec:endpoint_protection_manager:12.1.0:*:*:*:*:*:*:* CVE-2015-1487,0.0,,0.51202,"The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote authenticated users to write to arbitrary files, and consequently obtain administrator privileges, via a crafted filename.",2015-08-01,Metasploit,cpe:2.3:a:symantec:endpoint_protection_manager:12.1.0:*:*:*:*:*:*:* CVE-2015-1489,0.0,,0.60766,The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote authenticated users to gain privileges via unspecified vectors.,2015-08-01,Metasploit,cpe:2.3:a:symantec:endpoint_protection_manager:12.1.0:*:*:*:*:*:*:* CVE-2015-1497,0.0,,0.88255,"radexecd.exe in Persistent Systems Radia Client Automation (RCA) 7.9, 8.1, 9.0, and 9.1 allows remote attackers to execute arbitrary commands via a crafted request to TCP port 3465.",2015-02-16,Metasploit,cpe:2.3:a:persistent_systems:radia_client_automation:7.9:*:*:*:*:*:*:*;cpe:2.3:a:persistent_systems:radia_client_automation:8.1:*:*:*:*:*:*:*;cpe:2.3:a:persistent_systems:radia_client_automation:9.0:*:*:*:*:*:*:*;cpe:2.3:a:persistent_systems:radia_client_automation:9.1:*:*:*:*:*:*:* CVE-2015-1503,0.0,,0.91758,Multiple directory traversal vulnerabilities in IceWarp Mail Server before 11.2 allow remote attackers to read arbitrary files via a (1) .. (dot dot) in the file parameter to a webmail/client/skins/default/css/css.php page or .../. (dot dot dot slash dot) in the (2) script or (3) style parameter to webmail/old/calendar/minimizer/index.php.,2018-05-08,Nuclei,cpe:2.3:a:icewarp:mail_server:*:*:*:*:*:*:*:* CVE-2015-1579,0.0,,0.7211,Directory traversal vulnerability in the Elegant Themes Divi theme for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter in a revslider_show_image action to wp-admin/admin-ajax.php. NOTE: this vulnerability may be a duplicate of CVE-2014-9734.,2015-02-11,Nuclei,cpe:2.3:a:elegant_themes:divi:-:*:*:*:*:wordpress:*:* CVE-2015-1587,0.0,,0.80627,"Unrestricted file upload vulnerability in file_to_index.php in Maarch LetterBox 2.8 and earlier and GEC/GED 1.4 and earlier allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a request to a predictable filename in tmp/.",2015-02-19,Metasploit,cpe:2.3:a:maarch:gec\/ged:*:*:*:*:*:*:*:*;cpe:2.3:a:maarch:letterbox:*:*:*:*:*:*:*:* CVE-2015-1592,0.0,,0.81049,"Movable Type Pro, Open Source, and Advanced before 5.2.12 and Pro and Advanced 6.0.x before 6.0.7 does not properly use the Perl Storable::thaw function, which allows remote attackers to include and execute arbitrary local Perl files and possibly execute arbitrary code via unspecified vectors.",2015-02-19,Metasploit,cpe:2.3:a:sixapart:movable_type:*:*:*:*:advanced:*:*:*;cpe:2.3:a:sixapart:movable_type:*:*:*:*:open_source:*:*:*;cpe:2.3:a:sixapart:movable_type:*:*:*:*:pro:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* CVE-2015-1635,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9431,"HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka ""HTTP.sys Remote Code Execution Vulnerability.""",2015-04-14,Metasploit/Nuclei/CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* CVE-2015-1641,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.93526,"Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allow remote attackers to execute arbitrary code via a crafted RTF document, aka ""Microsoft Office Memory Corruption Vulnerability.""",2015-04-14,CISA,cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2011:*:*:*:*:mac_os_x:*:*;cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2011:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:word:2013:sp1:*:*:-:*:*:*;cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:* CVE-2015-1642,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.64711,"Microsoft Office 2007 SP3, 2010 SP2, and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted document, aka ""Microsoft Office Memory Corruption Vulnerability.""",2015-08-15,CISA,cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:* CVE-2015-1671,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.74138,"The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2; Office 2007 SP3 and 2010 SP2; Live Meeting 2007 Console; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; Lync Basic 2013 SP1; Silverlight 5 before 5.1.40416.00; and Silverlight 5 Developer Runtime before 5.1.40416.00, allows remote attackers to execute arbitrary code via a crafted TrueType font, aka ""TrueType Font Parsing Vulnerability.""",2015-05-13,CISA,cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:4.0:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:4.5.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:4.5:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:live_meeting:2007:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:lync:2010:*:*:*:attendee:*:*:*;cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:silverlight:5.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2015-1701,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.90346,"Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka ""Win32k Elevation of Privilege Vulnerability.""",2015-04-21,Metasploit/CISA,cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2015-1769,6.6,CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.12652,"Mount Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles symlinks, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka ""Mount Manager Elevation of Privilege Vulnerability.""",2015-08-15,CISA,cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2015-1770,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.73204,"Microsoft Office 2013 SP1 and 2013 RT SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka ""Microsoft Office Uninitialized Memory Use Vulnerability.""",2015-06-10,CISA,cpe:2.3:a:microsoft:office:2013:sp1:*:*:-:*:*:*;cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:* CVE-2015-1793,0.0,,0.82588,"The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.",2015-07-09,Metasploit,cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:supply_chain_products_suite:6.1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:supply_chain_products_suite:6.1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:supply_chain_products_suite:6.2.0:*:*:*:*:*:*:*;cpe:2.3:o:oracle:opus_10g_ethernet_switch_family:*:*:*:*:*:*:*:* CVE-2015-1830,0.0,,0.88003,Directory traversal vulnerability in the fileserver upload/download functionality for blob messages in Apache ActiveMQ 5.x before 5.11.2 for Windows allows remote attackers to create JSP files in arbitrary directories via unspecified vectors.,2015-08-19,Metasploit,cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.10.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.10.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.10.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.11.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.11.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.4.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.4.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.7.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.8.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.9.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:activemq:5.9.1:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2015-1880,0.0,,0.59363,Cross-site scripting (XSS) vulnerability in the sslvpn login page in Fortinet FortiOS 5.2.x before 5.2.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.,2015-05-12,Nuclei,cpe:2.3:o:fortinet:fortios:5.2.0:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.2.1:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.2.2:*:*:*:*:*:*:* CVE-2015-20067,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.19119,"The WP Attachment Export WordPress plugin before 0.2.4 does not have proper access controls, allowing unauthenticated users to download the XML data that holds all the details of attachments/posts on a Wordpress",2021-11-01,Nuclei,cpe:2.3:a:wp_attachment_export_project:wp_attachment_export:*:*:*:*:*:wordpress:*:* CVE-2015-2049,0.0,,0.82874,Unrestricted file upload vulnerability in D-Link DCS-931L with firmware 1.04 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension.,2015-02-23,Metasploit,cpe:2.3:h:dlink:dcs-931l:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dcs-931l_firmware:*:*:*:*:*:*:*:* CVE-2015-2051,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.91307,The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.,2015-02-23,CISA,cpe:2.3:h:dlink:dir-645:a1:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-645_firmware:*:*:*:*:*:*:*:* CVE-2015-2065,0.0,,0.80939,SQL injection vulnerability in videogalleryrss.php in the Apptha WordPress Video Gallery (contus-video-gallery) plugin before 2.8 for WordPress allows remote attackers to execute arbitrary SQL commands via the vid parameter in a rss action to wp-admin/admin-ajax.php.,2015-02-24,Metasploit,cpe:2.3:a:apptha:wordpress_video_gallery:*:*:*:*:*:wordpress:*:* CVE-2015-2067,0.0,,0.82764,Directory traversal vulnerability in web/ajax_pluginconf.php in the MAGMI (aka Magento Mass Importer) plugin for Magento Server allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.,2015-02-24,Nuclei,cpe:2.3:a:magmi_project:magmi:-:*:*:*:*:magento_server:*:* CVE-2015-2068,0.0,,0.05406,Multiple cross-site scripting (XSS) vulnerabilities in the MAGMI (aka Magento Mass Importer) plugin for Magento Server allow remote attackers to inject arbitrary web script or HTML via the (1) profile parameter to web/magmi.php or (2) QUERY_STRING to web/magmi_import_run.php.,2015-02-24,Nuclei,cpe:2.3:a:magmi_project:magmi:-:*:*:*:*:magento_server:*:* CVE-2015-2080,0.0,,0.92996,"The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.",2016-10-07,Nuclei,cpe:2.3:a:eclipse:jetty:9.2.3:*:*:*:*:*:*:*;cpe:2.3:a:eclipse:jetty:9.2.4:*:*:*:*:*:*:*;cpe:2.3:a:eclipse:jetty:9.2.5:*:*:*:*:*:*:*;cpe:2.3:a:eclipse:jetty:9.2.6:*:*:*:*:*:*:*;cpe:2.3:a:eclipse:jetty:9.2.7:*:*:*:*:*:*:*;cpe:2.3:a:eclipse:jetty:9.2.8:*:*:*:*:*:*:*;cpe:2.3:a:eclipse:jetty:9.3.0:m0:*:*:*:*:*:*;cpe:2.3:a:eclipse:jetty:9.3.0:m1:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* CVE-2015-2166,0.0,,0.73601,"Directory traversal vulnerability in the Instance Monitor in Ericsson Drutt Mobile Service Delivery Platform (MSDP) 4, 5, and 6 allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the default URI.",2015-04-06,Nuclei,cpe:2.3:a:ericsson:drutt_mobile_service_delivery_platform:4.0:*:*:*:*:*:*:*;cpe:2.3:a:ericsson:drutt_mobile_service_delivery_platform:5.0:*:*:*:*:*:*:*;cpe:2.3:a:ericsson:drutt_mobile_service_delivery_platform:6.0:*:*:*:*:*:*:* CVE-2015-2196,0.0,,0.04669,SQL injection vulnerability in Spider Event Calendar 1.4.9 for WordPress allows remote attackers to execute arbitrary SQL commands via the cat_id parameter in a spiderbigcalendar_month action to wp-admin/admin-ajax.php.,2015-03-03,Nuclei,cpe:2.3:a:web-dorado:spider_calendar:1.4.9:*:*:*:*:wordpress:*:* CVE-2015-2208,0.0,,0.88268,The saveObject function in moadmin.php in phpMoAdmin 1.1.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the object parameter.,2015-03-12,Metasploit,cpe:2.3:a:avinu:phpmoadmin:1.1.2:*:*:*:*:*:*:* CVE-2015-2219,0.0,,0.29577,"Lenovo System Update (formerly ThinkVantage System Update) before 5.06.0034 uses predictable security tokens, which allows local users to gain privileges by sending a valid token with a command to the System Update service (SUService.exe) through an unspecified named pipe.",2015-05-12,Metasploit,cpe:2.3:a:lenovo:system_update:*:*:*:*:*:*:*:* CVE-2015-2284,0.0,,0.80888,"userlogin.jsp in SolarWinds Firewall Security Manager (FSM) before 6.6.5 HotFix1 allows remote attackers to gain privileges and execute arbitrary code via unspecified vectors, related to client session handling.",2015-03-24,Metasploit,cpe:2.3:a:solarwinds:firewall_security_manager:*:*:*:*:*:*:*:* CVE-2015-2291,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.02737,"(1) IQVW32.sys before 1.3.1.0 and (2) IQVW64.sys before 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8086200F, or (d) 0x80862007 IOCTL call.",2017-08-09,CISA,cpe:2.3:a:intel:ethernet_diagnostics_driver_iqvw32.sys:1.03.0.7:*:*:*:*:*:*:*;cpe:2.3:a:intel:ethernet_diagnostics_driver_iqvw64.sys:1.03.0.7:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2015-2342,0.0,,0.92031,"The JMX RMI service in VMware vCenter Server 5.0 before u3e, 5.1 before u3b, 5.5 before u3, and 6.0 before u1 does not restrict registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol.",2015-10-12,Metasploit,cpe:2.3:a:vmware:vcenter_server:5.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:5.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:5.5:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:6.0:*:*:*:*:*:*:* CVE-2015-2360,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.05865,"win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka ""Win32k Elevation of Privilege Vulnerability.""",2015-06-10,CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:r2:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2015-2387,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.1941,"ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka ""ATMFD.DLL Memory Corruption Vulnerability.""",2015-07-14,CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2015-2419,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.83699,"JScript 9 in Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka ""JScript9 Memory Corruption Vulnerability.""",2015-07-14,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* CVE-2015-2424,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.76606,"Microsoft PowerPoint 2007 SP3, Word 2007 SP3, PowerPoint 2010 SP2, Word 2010 SP2, PowerPoint 2013 SP1, Word 2013 SP1, and PowerPoint 2013 RT SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka ""Microsoft Office Memory Corruption Vulnerability.""",2015-07-14,CISA,cpe:2.3:a:microsoft:excel_viewer:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2011:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:2013:sp1:*:*:-:*:*:*;cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:powerpoint:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:powerpoint:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:word_viewer:-:*:*:*:*:*:*:* CVE-2015-2425,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.40446,"Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka ""Internet Explorer Memory Corruption Vulnerability,"" a different vulnerability than CVE-2015-2383 and CVE-2015-2384.",2015-07-14,CISA,cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* CVE-2015-2426,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.91612,"Buffer underflow in atmfd.dll in the Windows Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted OpenType font, aka ""OpenType Font Driver Vulnerability.""",2015-07-20,Metasploit/CISA,cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2015-2433,0.0,,0.15861,"The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to bypass the ASLR protection mechanism via a crafted application, aka ""Kernel ASLR Bypass Vulnerability.""",2015-08-15,Metasploit,cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2015-2502,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.22563,"Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka ""Memory Corruption Vulnerability,"" as exploited in the wild in August 2015.",2015-08-19,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2015-2509,0.0,,0.88429,"Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Windows 8.1 allows user-assisted remote attackers to execute arbitrary code via a crafted Media Center link (mcl) file, aka ""Windows Media Center RCE Vulnerability.""",2015-09-09,Metasploit,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2015-2545,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.92947,"Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2013 RT SP1 allows remote attackers to execute arbitrary code via a crafted EPS image, aka ""Microsoft Office Malformed EPS File Vulnerability.""",2015-09-09,CISA,cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2013:sp1:*:*:-:*:*:*;cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*;cpe:2.3:a:microsoft:office:2016:*:-:*:-:*:-:* CVE-2015-2546,8.2,CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H,0.39088,"The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka ""Win32k Memory Corruption Elevation of Privilege Vulnerability,"" a different vulnerability than CVE-2015-2511, CVE-2015-2517, and CVE-2015-2518.",2015-09-09,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2015-2562,0.0,,0.41485,"Multiple SQL injection vulnerabilities in the Web-Dorado ECommerce WD (com_ecommercewd) component 1.2.5 for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) search_category_id, (2) sort_order, or (3) filter_manufacturer_ids in a displayproducts action to index.php.",2015-03-20,Metasploit,cpe:2.3:a:web-dorado:ecommerce_wd:1.2.5:*:*:*:*:joomla\!:*:* CVE-2015-2590,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.64618,"Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.",2015-07-16,CISA,cpe:2.3:a:oracle:jdk:1.6.0:update95:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update75:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update80:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.8.0:update45:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.8.0:update_33:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update_95:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update_75:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update_80:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.8.0:update_33:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.8.0:update_45:*:*:*:*:*:*;cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*;cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.1_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.1_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.1_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* CVE-2015-2673,0.0,,0.63767,The ec_ajax_update_option and ec_ajax_clear_all_taxrates functions in inc/admin/admin_ajax_functions.php in the WP EasyCart plugin 1.1.30 through 3.0.20 for WordPress allow remote attackers to gain administrator privileges and execute arbitrary code via the option_name and option_value parameters.,2017-10-06,Metasploit,cpe:2.3:a:wpeasycart:wp_easycart:1.1.30:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.1.31:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.1.32:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.1.33:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.1.34:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.1.35:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.1.36:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.0:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.10:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.11:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.12:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.13:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.14:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.15:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.16:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.1:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.2:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.3:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.4:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.5:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.6:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.7:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.8:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:1.2.9:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.10:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.11:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.12:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.13:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.14:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.15:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.16:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.17:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.18:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.19:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.1:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.1\@824267:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.20:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.21:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.22:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.2:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.3:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.4:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.5:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.6:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.7:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.8:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.0.9:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.0:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.10:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.11:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.12:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.13:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.14:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.15:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.16:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.17:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.18:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.19:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.1:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.20:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.21:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.22:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.23:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.24:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.25:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.26:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.27:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.28:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.29:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.2:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.30:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.31:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.32:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.33:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.34:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.35:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.36:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.3:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.4:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.5:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.6:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.7:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.8:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:2.1.9:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.0:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.10:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.11:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.12:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.13:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.14:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.15:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.16:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.17:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.18:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.19:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.1:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.20:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.2:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.3:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.4:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.5:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.6:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.7:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.8:*:*:*:*:wordpress:*:*;cpe:2.3:a:wpeasycart:wp_easycart:3.0.9:*:*:*:*:wordpress:*:* CVE-2015-2755,0.0,,0.00693,"Multiple cross-site request forgery (CSRF) vulnerabilities in the AB Google Map Travel (AB-MAP) plugin before 4.0 for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) lat (Latitude), (2) long (Longitude), (3) map_width, (4) map_height, or (5) zoom (Map Zoom) parameter in the ab_map_options page to wp-admin/admin.php.",2015-04-01,Nuclei,cpe:2.3:a:ab_google_map_travel_project:ab_google_map_travel:*:*:*:*:*:wordpress:*:* CVE-2015-2794,0.0,,0.92349,The installation wizard in DotNetNuke (DNN) before 7.4.1 allows remote attackers to reinstall the application and gain SuperUser access via a direct request to Install/InstallWizard.aspx.,2017-02-06,Nuclei,cpe:2.3:a:dotnetnuke:dotnetnuke:*:*:*:*:*:*:*:* CVE-2015-2797,0.0,,0.78328,"Stack-based buffer overflow in AirTies Air 6372, 5760, 5750, 5650TT, 5453, 5444TT, 5443, 5442, 5343, 5342, 5341, and 5021 DSL modems with firmware 1.0.2.0 and earlier allows remote attackers to execute arbitrary code via a long string in the redirect parameter to cgi-bin/login.",2015-06-19,Metasploit,cpe:2.3:h:airties:air_5021:-:*:*:*:*:*:*:*;cpe:2.3:h:airties:air_5341:-:*:*:*:*:*:*:*;cpe:2.3:h:airties:air_5342:-:*:*:*:*:*:*:*;cpe:2.3:h:airties:air_5343:-:*:*:*:*:*:*:*;cpe:2.3:h:airties:air_5442:-:*:*:*:*:*:*:*;cpe:2.3:h:airties:air_5443:-:*:*:*:*:*:*:*;cpe:2.3:h:airties:air_5444tt:-:*:*:*:*:*:*:*;cpe:2.3:h:airties:air_5453:-:*:*:*:*:*:*:*;cpe:2.3:h:airties:air_5650tt:-:*:*:*:*:*:*:*;cpe:2.3:h:airties:air_5750:-:*:*:*:*:*:*:*;cpe:2.3:h:airties:air_5760:-:*:*:*:*:*:*:*;cpe:2.3:h:airties:air_6372:-:*:*:*:*:*:*:*;cpe:2.3:o:airties:air_firmware:*:*:*:*:*:*:*:* CVE-2015-2807,0.0,,0.0689,Cross-site scripting (XSS) vulnerability in js/window.php in the Navis DocumentCloud plugin before 0.1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the wpbase parameter.,2015-09-01,Nuclei,cpe:2.3:a:documentcloud:navis_documentcloud:*:*:*:*:*:wordpress:*:* CVE-2015-2843,0.0,,0.80047,Multiple SQL injection vulnerabilities in GoAutoDial GoAdmin CE before 3.3-1421902800 allow remote attackers to execute arbitrary SQL commands via the (1) user_name or (2) user_pass parameter in go_login.php or the PATH_INFO to (3) go_login/validate_credentials/admin/ or (4) index.php/go_site/go_get_user_info/.,2015-05-12,Metasploit,cpe:2.3:a:goautodial:goadmin_ce:3.0:*:*:*:*:*:*:*;cpe:2.3:a:goautodial:goadmin_ce:3.3:*:*:*:*:*:*:* CVE-2015-2845,0.0,,0.87464,The cpanel function in go_site.php in GoAutoDial GoAdmin CE before 3.3-1421902800 allows remote attackers to execute arbitrary commands via the $type portion of the PATH_INFO.,2015-05-12,Metasploit,cpe:2.3:a:goautodial:goadmin_ce:3.0:*:*:*:*:*:*:*;cpe:2.3:a:goautodial:goadmin_ce:3.3:*:*:*:*:*:*:* CVE-2015-2856,0.0,,0.71207,Directory traversal vulnerability in the template function in function.inc in Accellion File Transfer Appliance devices before FTA_9_11_210 allows remote attackers to read arbitrary files via a .. (dot dot) in the statecode cookie.,2017-10-10,Metasploit,cpe:2.3:a:accellion:file_transfer_appliance:*:*:*:*:*:*:*:* CVE-2015-2857,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.85425,Accellion File Transfer Appliance before FTA_9_11_210 allows remote attackers to execute arbitrary code via shell metacharacters in the oauth_token parameter.,2017-08-22,Metasploit,cpe:2.3:a:accellion:file_transfer_appliance:*:*:*:*:*:*:*:* CVE-2015-2863,0.0,,0.49733,"Open redirect vulnerability in Kaseya Virtual System Administrator (VSA) 7.x before 7.0.0.29, 8.x before 8.0.0.18, 9.0 before 9.0.0.14, and 9.1 before 9.1.0.4 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.",2015-07-20,Nuclei,cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:* CVE-2015-2993,0.0,,0.77003,"SysAid Help Desk before 15.2 does not properly restrict access to certain functionality, which allows remote attackers to (1) create administrator accounts via a crafted request to /createnewaccount or (2) write to arbitrary files via the fileName parameter to /userentry.",2015-06-08,Metasploit,cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:* CVE-2015-2994,0.0,,0.76861,"Unrestricted file upload vulnerability in ChangePhoto.jsp in SysAid Help Desk before 15.2 allows remote administrators to execute arbitrary code by uploading a file with a .jsp extension, then accessing it via a direct request to the file in icons/user_photo/.",2015-06-08,Metasploit,cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:* CVE-2015-2995,0.0,,0.79205,"The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file.",2015-06-08,Metasploit,cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:* CVE-2015-2996,0.0,,0.91904,Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum.,2015-06-08,Metasploit/Nuclei,cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:* CVE-2015-2997,0.0,,0.6813,"SysAid Help Desk before 15.2 allows remote attackers to obtain sensitive information via an invalid value in the accountid parameter to getAgentLogFile, as demonstrated by a large directory traversal sequence, which reveals the installation path in an error message.",2015-06-08,Metasploit,cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:* CVE-2015-2998,0.0,,0.62156,"SysAid Help Desk before 15.2 uses a hardcoded encryption key, which makes it easier for remote attackers to obtain sensitive information, as demonstrated by decrypting the database password in WEB-INF/conf/serverConf.xml.",2015-06-08,Metasploit,cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:* CVE-2015-3035,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.93178,"Directory traversal vulnerability in TP-LINK Archer C5 (1.2) with firmware before 150317, C7 (2.0) with firmware before 150304, and C8 (1.0) with firmware before 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware before 150302, TL-WR740N (5.0) and TL-WR741ND (5.0) with firmware before 150312, and TL-WR841N (9.0), TL-WR841N (10.0), TL-WR841ND (9.0), and TL-WR841ND (10.0) with firmware before 150310 allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.",2015-04-22,Metasploit/Nuclei/CISA,cpe:2.3:h:tp-link:archer_c5_\(1.2\):-:*:*:*:*:*:*:*;cpe:2.3:h:tp-link:archer_c7_\(2.0\):-:*:*:*:*:*:*:*;cpe:2.3:h:tp-link:archer_c8_\(1.0\):-:*:*:*:*:*:*:*;cpe:2.3:h:tp-link:archer_c9_\(1.0\):-:*:*:*:*:*:*:*;cpe:2.3:h:tp-link:tl-wdr3500_\(1.0\):-:*:*:*:*:*:*:*;cpe:2.3:h:tp-link:tl-wdr3600_\(1.0\):-:*:*:*:*:*:*:*;cpe:2.3:h:tp-link:tl-wdr4300_\(1.0\):-:*:*:*:*:*:*:*;cpe:2.3:h:tp-link:tl-wr740n_\(5.0\):-:*:*:*:*:*:*:*;cpe:2.3:h:tp-link:tl-wr741nd_\(5.0\):-:*:*:*:*:*:*:*;cpe:2.3:h:tp-link:tl-wr841n_\(10.0\):-:*:*:*:*:*:*:*;cpe:2.3:h:tp-link:tl-wr841n_\(9.0\):-:*:*:*:*:*:*:*;cpe:2.3:h:tp-link:tl-wr841nd_\(10.0\):-:*:*:*:*:*:*:*;cpe:2.3:h:tp-link:tl-wr841nd_\(9.0\):-:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:archer_c5_\(1.2\)_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:archer_c7_\(2.0\)_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:archer_c8_\(1.0\)_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:archer_c9_\(1.0\)_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:tl-wdr3500_\(1.0\)_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:tl-wdr3600_\(1.0\)_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:tl-wdr4300_\(1.0\)_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:tl-wr740n_\(5.0\)_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:tl-wr741nd_\(5.0\)_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:tl-wr841n_\(10.0\)_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:tl-wr841n_\(9.0\)_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:tl-wr841nd_\(10.0\)_firmware:150104:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:tl-wr841nd_\(9.0\)_firmware:*:*:*:*:*:*:*:* CVE-2015-3043,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.86512,"Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in April 2015, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3042.",2015-04-14,Metasploit/CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2015-3090,0.0,,0.89847,"Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3089, and CVE-2015-3093.",2015-05-13,Metasploit,cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2015-3105,0.0,,0.90282,"Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.",2015-06-10,Metasploit,cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2015-3113,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92905,"Heap-based buffer overflow in Adobe Flash Player before 13.0.0.296 and 14.x through 18.x before 18.0.0.194 on Windows and OS X and before 11.2.202.468 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in June 2015.",2015-06-23,Metasploit/CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:insight_orchestration:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:systems_insight_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:version_control_agent:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:version_control_repository_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:version_control_repository_manager:7.6:*:*:*:*:*:*:*;cpe:2.3:a:hp:virtual_connect_enterprise_manager:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:* CVE-2015-3224,0.0,,0.86797,"request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.",2015-07-26,Metasploit/Nuclei,cpe:2.3:a:rubyonrails:web_console:*:*:*:*:*:*:*:* CVE-2015-3245,0.0,,0.11161,"Incomplete blacklist vulnerability in the chfn function in libuser before 0.56.13-8 and 0.60 before 0.60-7, as used in the userhelper program in the usermode package, allows local users to cause a denial of service (/etc/passwd corruption) via a newline character in the GECOS field.",2015-08-11,Metasploit,cpe:2.3:a:redhat:libuser:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:libuser:0.60-1:*:*:*:*:*:*:*;cpe:2.3:a:redhat:libuser:0.60-2:*:*:*:*:*:*:*;cpe:2.3:a:redhat:libuser:0.60-3:*:*:*:*:*:*:*;cpe:2.3:a:redhat:libuser:0.60-4:*:*:*:*:*:*:*;cpe:2.3:a:redhat:libuser:0.60-5:*:*:*:*:*:*:*;cpe:2.3:a:redhat:libuser:0.60-6:*:*:*:*:*:*:* CVE-2015-3246,0.0,,0.16399,"libuser before 0.56.13-8 and 0.60 before 0.60-7, as used in the userhelper program in the usermode package, directly modifies /etc/passwd, which allows local users to cause a denial of service (inconsistent file state) by causing an error during the modification. NOTE: this issue can be combined with CVE-2015-3245 to gain privileges.",2015-08-11,Metasploit,cpe:2.3:a:redhat:libuser:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:libuser:0.60-1:*:*:*:*:*:*:*;cpe:2.3:a:redhat:libuser:0.60-2:*:*:*:*:*:*:*;cpe:2.3:a:redhat:libuser:0.60-3:*:*:*:*:*:*:*;cpe:2.3:a:redhat:libuser:0.60-4:*:*:*:*:*:*:*;cpe:2.3:a:redhat:libuser:0.60-5:*:*:*:*:*:*:*;cpe:2.3:a:redhat:libuser:0.60-6:*:*:*:*:*:*:* CVE-2015-3306,0.0,,0.93963,The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.,2015-05-18,Metasploit/Nuclei,cpe:2.3:a:proftpd:proftpd:1.3.5:*:*:*:*:*:*:* CVE-2015-3315,0.0,,0.06347,"Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to librpm.",2017-06-26,Metasploit,cpe:2.3:a:redhat:automatic_bug_reporting_tool:-:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2015-3337,0.0,,0.90729,"Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2, when a site plugin is enabled, allows remote attackers to read arbitrary files via unspecified vectors.",2015-05-01,Nuclei,cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:*;cpe:2.3:a:elasticsearch:elasticsearch:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:elasticsearch:elasticsearch:1.5.1:*:*:*:*:*:*:* CVE-2015-3628,0.0,,0.76242,"The iControl API in F5 BIG-IP LTM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.3.0 before 11.5.3 HF2 and 11.6.0 before 11.6.0 HF6, BIG-IP AAM 11.4.0 before 11.5.3 HF2 and 11.6.0 before 11.6.0 HF6, BIG-IP Edge Gateway, WebAccelerator, and WOM 11.3.0, BIG-IP GTM 11.3.0 before 11.6.0 HF6, BIG-IP PSM 11.3.0 through 11.4.1, Enterprise Manager 3.1.0 through 3.1.1, BIG-IQ Cloud and Security 4.0.0 through 4.5.0, BIG-IQ Device 4.2.0 through 4.5.0, and BIG-IQ ADC 4.5.0 allows remote authenticated users with the ""Resource Administrator"" role to gain privileges via an iCall (1) script or (2) handler in a SOAP request to iControl/iControlPortal.cgi.",2015-12-07,Metasploit,cpe:2.3:a:f5:big-ip_access_policy_manager:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_access_policy_manager:11.4.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_access_policy_manager:11.4.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.3:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.4.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.4.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.3:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_analytics:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_analytics:11.4.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_analytics:11.4.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_analytics:11.5.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_analytics:11.5.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_analytics:11.5.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_analytics:11.5.3:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.4.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.4.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.3:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:11.4.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:11.4.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:11.5.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:11.5.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:11.5.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:11.5.3:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_edge_gateway:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_enterprise_manager:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_enterprise_manager:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_enterprise_manager:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:11.4.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:11.4.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.3:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:11.4.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:11.4.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:11.5.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:11.5.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:11.5.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:11.5.3:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.3:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.4.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.4.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.3:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.1:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_webaccelerator:11.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_adc:4.5.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_cloud:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_cloud:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_cloud:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_cloud:4.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_cloud:4.4.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_cloud:4.5.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_device:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_device:4.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_device:4.4.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_device:4.5.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_security:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_security:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_security:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_security:4.3.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_security:4.4.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-iq_security:4.5.0:*:*:*:*:*:*:* CVE-2015-3648,0.0,,0.45832,Directory traversal vulnerability in pages/setup.php in Montala Limited ResourceSpace before 7.2.6727 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the defaultlanguage parameter.,2015-06-09,Nuclei,cpe:2.3:a:montala:resourcespace:*:*:*:*:*:*:*:* CVE-2015-3673,0.0,,0.06029,"Admin Framework in Apple OS X before 10.10.4 does not properly restrict the location of writeconfig clients, which allows local users to obtain root privileges by moving and then modifying Directory Utility.",2015-07-03,Metasploit,cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* CVE-2015-3760,0.0,,0.03435,"dyld in Apple OS X before 10.10.5 does not properly validate pathnames in the environment, which allows local users to gain privileges via unspecified vectors.",2015-08-16,Metasploit,cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* CVE-2015-3864,0.0,,0.87588,"Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3824.",2015-10-01,Metasploit,cpe:2.3:o:google:android:*:*:*:*:*:*:*:* CVE-2015-3897,0.0,,0.6034,Directory traversal vulnerability in Bonita BPM Portal before 6.5.3 allows remote attackers to read arbitrary files via a .. (dot dot) in the theme parameter and a file path in the location parameter to bonita/portal/themeResource.,2015-06-18,Nuclei,cpe:2.3:a:bonitasoft:bonita_bpm_portal:*:*:*:*:*:*:*:* CVE-2015-4000,0.0,,0.94027,"The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the ""Logjam"" issue.",2015-05-21,Metasploit,cpe:2.3:a:apple:safari:-:*:*:*:*:*:*:*;cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*;cpe:2.3:a:ibm:content_manager:8.5:*:*:*:*:enterprise:*:*;cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:39.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox_esr:31.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:network_security_services:3.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.35:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:31.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:38.1:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera_browser:-:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update95:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update75:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update80:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.8.0:update45:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.8.0:update_33:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update_95:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update_75:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update_80:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.8.0:update_33:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.8.0:update_45:*:*:*:*:*:*;cpe:2.3:a:oracle:jrockit:r28.3.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:sparc-opl_service_processor:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*;cpe:2.3:o:mozilla:firefox_os:2.2:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*;cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:* CVE-2015-4050,0.0,,0.76192,"FragmentListener in the HttpKernel component in Symfony 2.3.19 through 2.3.28, 2.4.9 through 2.4.10, 2.5.4 through 2.5.11, and 2.6.0 through 2.6.7, when ESI or SSI support enabled, does not check if the _controller attribute is set, which allows remote attackers to bypass URL signing and security rules by including (1) no hash or (2) an invalid hash in a request to /_fragment.",2015-06-02,Nuclei,cpe:2.3:a:sensiolabs:symfony:2.3.19:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.3.20:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.3.21:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.3.22:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.3.23:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.3.24:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.3.25:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.3.26:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.3.27:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.3.28:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.4.10:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.4.9:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.5.10:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.5.11:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.5.4:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.5.5:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.5.6:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.5.7:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.5.8:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.5.9:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.6.3:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.6.4:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.6.5:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.6.6:*:*:*:*:*:*:*;cpe:2.3:a:sensiolabs:symfony:2.6.7:*:*:*:*:*:*:* CVE-2015-4062,0.0,,0.25156,SQL injection vulnerability in includes/nsp_search.php in the NewStatPress plugin before 0.9.9 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the where1 parameter in the nsp_search page to wp-admin/admin.php.,2015-05-27,Nuclei,cpe:2.3:a:newstatpress_project:newstatpress:*:*:*:*:*:wordpress:*:* CVE-2015-4063,0.0,,0.03077,Cross-site scripting (XSS) vulnerability in includes/nsp_search.php in the NewStatPress plugin before 0.9.9 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the where1 parameter in the nsp_search page to wp-admin/admin.php.,2015-05-27,Nuclei,cpe:2.3:a:newstatpress_project:newstatpress:*:*:*:*:*:wordpress:*:* CVE-2015-4068,9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,0.84121,Directory traversal vulnerability in Arcserve UDP before 5.0 Update 4 allows remote attackers to obtain sensitive information or cause a denial of service via a crafted file path to the (1) reportFileServlet or (2) exportServlet servlet.,2015-05-29,CISA,cpe:2.3:a:arcserve:udp:*:*:*:*:*:*:*:*;cpe:2.3:a:arcserve:udp:5.0:-:*:*:*:*:*:* CVE-2015-4074,0.0,,0.8582,Directory traversal vulnerability in the Helpdesk Pro plugin before 1.4.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter in a ticket.download_attachment task.,2017-09-20,Nuclei,cpe:2.3:a:helpdesk_pro_project:helpdesk_pro:*:*:*:*:*:joomla\!:*:* CVE-2015-4127,0.0,,0.01716,"Cross-site scripting (XSS) vulnerability in the church_admin plugin before 0.810 for WordPress allows remote attackers to inject arbitrary web script or HTML via the address parameter, as demonstrated by a request to index.php/2015/05/21/church_admin-registration-form/.",2015-05-28,Nuclei,cpe:2.3:a:church_admin_project:church_admin:*:*:*:*:*:wordpress:*:* CVE-2015-4133,0.0,,0.75217,"Unrestricted file upload vulnerability in admin/scripts/FileUploader/php.php in the ReFlex Gallery plugin before 3.1.4 for WordPress allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in uploads/ directory.",2015-05-28,Metasploit,cpe:2.3:a:reflex_gallery_project:reflex_gallery:*:*:*:*:*:wordpress:*:* CVE-2015-4414,0.0,,0.09051,Directory traversal vulnerability in download_audio.php in the SE HTML5 Album Audio Player (se-html5-album-audio-player) plugin 1.1.0 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.,2015-06-17,Nuclei,cpe:2.3:a:se_html5_album_audio_player_project:se_html5_album_audio_player:*:*:*:*:*:wordpress:*:* CVE-2015-4455,0.0,,0.80327,"Unrestricted file upload vulnerability in includes/upload.php in the Aviary Image Editor Add-on For Gravity Forms plugin 3.0 beta for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in wp-content/uploads/gform_aviary.",2017-05-23,Nuclei,cpe:2.3:a:aviary_image_editor_add-on_for_gravity_forms_project:aviary_image_editor_add-on_for_gravity_forms:*:beta:*:*:*:wordpress:*:* CVE-2015-4495,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.69924,"The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.",2015-08-08,Metasploit/CISA,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp1:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*;cpe:2.3:o:mozilla:firefox_os:*:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:* CVE-2015-4624,0.0,,0.4762,Hak5 WiFi Pineapple 2.0 through 2.3 uses predictable CSRF tokens.,2017-03-31,Metasploit,cpe:2.3:h:hak5:wi-fi_pineapple:-:*:*:*:*:*:*:*;cpe:2.3:o:hak5:wi-fi_pineapple_firmware:2.0:*:*:*:*:*:*:*;cpe:2.3:o:hak5:wi-fi_pineapple_firmware:2.1:*:*:*:*:*:*:*;cpe:2.3:o:hak5:wi-fi_pineapple_firmware:2.2:*:*:*:*:*:*:*;cpe:2.3:o:hak5:wi-fi_pineapple_firmware:2.3:*:*:*:*:*:*:* CVE-2015-4632,0.0,,0.77745,"Multiple directory traversal vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the template_path parameter to (1) svc/virtualshelves/search or (2) svc/members/search.",2018-10-18,Nuclei,cpe:2.3:a:koha:koha:*:*:*:*:*:*:*:* CVE-2015-4666,0.0,,0.16389,Directory traversal vulnerability in opm/read_sessionlog.php in Xceedium Xsuite 2.4.4.5 and earlier allows remote attackers to read arbitrary files via a ....// (quadruple dot double slash) in the logFile parameter.,2015-08-13,Nuclei,cpe:2.3:a:xceedium:xsuite:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:xceedium:xsuite:2.4.3.0:*:*:*:*:*:*:* CVE-2015-4668,0.0,,0.04202,Open redirect vulnerability in Xsuite 2.4.4.5 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirurl parameter.,2017-09-25,Nuclei,cpe:2.3:a:xceedium:xsuite:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:xceedium:xsuite:2.4.3.0:*:*:*:*:*:*:* CVE-2015-4694,0.0,,0.35068,Directory traversal vulnerability in download.php in the Zip Attachments plugin before 1.5.1 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the za_file parameter.,2016-01-08,Nuclei,cpe:2.3:a:zip_attachments_project:zip_attachments:*:*:*:*:*:wordpress:*:* CVE-2015-4852,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92461,"The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product.",2015-11-18,Metasploit/CISA,cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.1.2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.0.0:*:*:*:*:*:*:* CVE-2015-4902,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,0.09381,"Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60 allows remote attackers to affect integrity via unknown vectors related to Deployment.",2015-10-22,CISA,cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update101:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update85:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.8.0:update60:*:*:*:*:*:*;cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*;cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:* CVE-2015-5082,0.0,,0.86671,Endian Firewall before 3.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) NEW_PASSWORD_1 or (2) NEW_PASSWORD_2 parameter to cgi-bin/chpasswd.cgi.,2015-09-28,Metasploit,cpe:2.3:a:endian_firewall:endian_firewall:*:*:*:*:*:*:*:* CVE-2015-5119,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93268,"Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.296 and 14.x through 18.0.0.194 on Windows and OS X and 11.x through 11.2.202.468 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.",2015-07-08,Metasploit/CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:* CVE-2015-5122,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92583,"Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015.",2015-07-14,Metasploit/CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_10:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*;cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:* CVE-2015-5123,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.45202,"Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.",2015-07-14,CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:chrome:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*;cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:* CVE-2015-5287,0.0,,0.12902,"The abrt-hook-ccpp help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users with certain permissions to gain privileges via a symlink attack on a file with a predictable name, as demonstrated by /var/tmp/abrt/abrt-hax-coredump or /var/spool/abrt/abrt-hax-coredump.",2015-12-07,Metasploit,cpe:2.3:a:redhat:automatic_bug_reporting_tool:*:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2015-5317,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.27392,The Fingerprints pages in Jenkins before 1.638 and LTS before 1.625.2 might allow remote attackers to obtain sensitive job and build name information via a direct request.,2015-11-25,CISA,cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*;cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*;cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*;cpe:2.3:a:redhat:openshift:2.0:*:*:*:*:*:*:* CVE-2015-5354,0.0,,0.21803,Open redirect vulnerability in Novius OS 5.0.1 (Elche) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter to admin/nos/login.,2015-07-01,Nuclei,cpe:2.3:a:novius-os:novius_os:5.0.1:*:*:*:*:*:*:* CVE-2015-5371,0.0,,0.83033,The AuthenticationFilter class in SolarWinds Storage Manager allows remote attackers to upload and execute arbitrary scripts via unspecified vectors.,2015-07-06,Metasploit,cpe:2.3:a:solarwinds:storage_manager:-:*:*:*:*:*:*:* CVE-2015-5374,0.0,,0.84825,A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02. Specially crafted packets sent to port 50000/UDP could cause a denial-of-service of the affected device. A manual reboot may be required to recover the service of the device.,2015-07-18,Metasploit,cpe:2.3:h:siemens:siprotec_4:*:*:*:*:*:*:*:*;cpe:2.3:h:siemens:siprotec_compact:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:siprotec_firmware:4.24:*:*:*:*:*:*:* CVE-2015-5453,0.0,,0.72451,Watchguard XCS 9.2 and 10.0 before build 150522 allow remote authenticated users to execute arbitrary commands via shell metacharacters in the id parameter to ADMIN/mailqueue.spl.,2015-07-08,Metasploit,cpe:2.3:a:watchguard:xcs:10.0:*:*:*:*:*:*:*;cpe:2.3:a:watchguard:xcs:9.2:*:*:*:*:*:*:* CVE-2015-5461,0.0,,0.1779,Open redirect vulnerability in the Redirect function in stageshow_redirect.php in the StageShow plugin before 5.0.9 for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter.,2015-07-08,Nuclei,cpe:2.3:a:stageshow_project:stageshow:*:*:*:*:*:wordpress:*:* CVE-2015-5469,0.0,,0.4911,Absolute path traversal vulnerability in the MDC YouTube Downloader plugin 2.1.0 for WordPress allows remote attackers to read arbitrary files via a full pathname in the file parameter to includes/download.php.,2017-05-23,Nuclei,cpe:2.3:a:mdc_youtube_downloader_project:mdc_youtube_downloader:2.1.0:*:*:*:*:wordpress:*:* CVE-2015-5471,0.0,,0.38016,Absolute path traversal vulnerability in include/user/download.php in the Swim Team plugin 1.44.10777 for WordPress allows remote attackers to read arbitrary files via a full pathname in the file parameter.,2016-01-12,Nuclei,cpe:2.3:a:swim_team_project:swim_team:1.44.10777:*:*:*:*:wordpress:*:* CVE-2015-5477,0.0,,0.92832,named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.,2015-07-29,Metasploit,cpe:2.3:a:isc:bind:*:p1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:*:p2:*:*:*:*:*:* CVE-2015-5531,0.0,,0.84215,Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.,2015-08-17,Metasploit/Nuclei,cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:* CVE-2015-5603,0.0,,0.83417,"The HipChat for JIRA plugin before 6.30.0 for Atlassian JIRA allows remote authenticated users to execute arbitrary Java code via unspecified vectors, related to ""Velocity Template Injection Vulnerability.""",2015-09-21,Metasploit,cpe:2.3:a:atlassian:hipchat:*:*:*:*:*:*:*:* CVE-2015-5688,0.0,,0.70183,Directory traversal vulnerability in lib/app/index.js in Geddy before 13.0.8 for Node.js allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the PATH_INFO to the default URI.,2015-09-04,Nuclei,cpe:2.3:a:geddyjs:geddy:13.0.7:*:*:*:*:node.js:*:* CVE-2015-5889,0.0,,0.127,rsh in the remote_cmds component in Apple OS X before 10.11 allows local users to obtain root privileges via vectors involving environment variables.,2015-10-09,Metasploit,cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* CVE-2015-5958,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.47374,phpFileManager 0.9.8 allows remote attackers to execute arbitrary commands via a crafted URL.,2017-08-31,Metasploit,cpe:2.3:a:phpfilemanager_project:phpfilemanager:0.9.8:*:*:*:*:*:*:* CVE-2015-6000,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.7742,"Unrestricted file upload vulnerability in the Settings_Vtiger_CompanyDetailsSave_Action class in modules/Settings/Vtiger/actions/CompanyDetailsSave.php in Vtiger CRM 6.3.0 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in test/logo/.",2020-02-06,Metasploit,cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:* CVE-2015-6127,0.0,,0.74369,"Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Windows 8.1 allows remote attackers to read arbitrary files via a crafted .mcl file, aka ""Windows Media Center Information Disclosure Vulnerability.""",2015-12-09,Metasploit,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2015-6128,0.0,,0.43967,"Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 mishandle library loading, which allows local users to gain privileges via a crafted application, aka ""Windows Library Loading Remote Code Execution Vulnerability.""",2015-12-09,Metasploit,cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* CVE-2015-6132,0.0,,0.74499,"Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle library loading, which allows local users to gain privileges via a crafted application, aka ""Windows Library Loading Remote Code Execution Vulnerability.""",2015-12-09,Metasploit,cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2015-6133,0.0,,0.61218,"Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle library loading, which allows local users to gain privileges via a crafted application, aka ""Windows Library Loading Remote Code Execution Vulnerability.""",2015-12-09,Metasploit,cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* CVE-2015-6175,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.02283,"The kernel in Microsoft Windows 10 Gold allows local users to gain privileges via a crafted application, aka ""Windows Kernel Memory Elevation of Privilege Vulnerability.""",2015-12-09,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:* CVE-2015-6477,0.0,,0.3338,Multiple cross-site scripting (XSS) vulnerabilities in the Wind Farm Portal application in Nordex Control 2 (NC2) SCADA 16 and earlier allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.,2015-10-18,Nuclei,cpe:2.3:o:nordex:nordex_control_2_scada:*:*:*:*:*:*:*:* CVE-2015-6522,0.0,,0.78195,SQL injection vulnerability in the WP Symposium plugin before 15.8 for WordPress allows remote attackers to execute arbitrary SQL commands via the size parameter to get_album_item.php.,2015-08-19,Metasploit,cpe:2.3:a:wpsymposium:wp_symposium:*:*:*:*:*:wordpress:*:* CVE-2015-6544,0.0,,0.51077,Cross-site scripting (XSS) vulnerability in application/dashboard.class.inc.php in Combodo iTop before 2.2.0-2459 allows remote attackers to inject arbitrary web script or HTML via a dashboard title.,2018-02-20,Nuclei,cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:* CVE-2015-6920,0.0,,0.02035,Cross-site scripting (XSS) vulnerability in js/window.php in the sourceAFRICA plugin 0.1.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the wpbase parameter.,2015-09-11,Nuclei,cpe:2.3:a:sourceafrica_project:sourceafrica:0.1.3:*:*:*:*:wordpress:*:* CVE-2015-6922,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.76716,"Kaseya Virtual System Administrator (VSA) 7.x before 7.0.0.33, 8.x before 8.0.0.23, 9.0 before 9.0.0.19, and 9.1 before 9.1.0.9 does not properly require authentication, which allows remote attackers to bypass authentication and (1) add an administrative account via crafted request to LocalAuth/setAccount.aspx or (2) write to and execute arbitrary files via a full pathname in the PathData parameter to ConfigTab/uploader.aspx.",2020-02-17,Metasploit,cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:* CVE-2015-6967,0.0,,0.86769,"Unrestricted file upload vulnerability in the My Image plugin in Nibbleblog before 4.0.5 allows remote administrators to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in content/private/plugins/my_image/image.php.",2015-09-16,Metasploit,cpe:2.3:a:nibbleblog:nibbleblog:*:*:*:*:*:*:*:* CVE-2015-7007,0.0,,0.78161,Script Editor in Apple OS X before 10.11.1 allows remote attackers to bypass an intended user-confirmation requirement for AppleScript execution via unspecified vectors.,2015-10-23,Metasploit,cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* CVE-2015-7243,0.0,,0.73318,Buffer overflow in Boxoft WAV to MP3 Converter allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted WAV file.,2015-09-18,Metasploit,cpe:2.3:a:boxoft:boxoft_wav_to_mp3_converter:-:*:*:*:*:*:*:* CVE-2015-7245,0.0,,0.85375,"Directory traversal vulnerability in D-Link DVG-N5402SP with firmware W1000CN-00, W1000CN-03, or W2000EN-00 allows remote attackers to read sensitive information via a .. (dot dot) in the errorpage parameter.",2017-04-24,Nuclei,cpe:2.3:h:dlink:dvg-n5402sp:-:*:*:*:*:*:*:*;cpe:2.3:o:d-link:dvg-n5402sp_firmware:w1000cn-00:*:*:*:*:*:*:*;cpe:2.3:o:d-link:dvg-n5402sp_firmware:w1000cn-03:*:*:*:*:*:*:*;cpe:2.3:o:d-link:dvg-n5402sp_firmware:w2000en-00:*:*:*:*:*:*:* CVE-2015-7297,0.0,,0.9338,"SQL injection vulnerability in Joomla! 3.2 before 3.4.4 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2015-7858.",2015-10-29,Metasploit/Nuclei,cpe:2.3:a:joomla:joomla\!:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.4:*:*:*:*:*:*:* CVE-2015-7309,0.0,,0.60269,"The theme editor in Bolt before 2.2.5 does not check the file extension when renaming files, which allows remote authenticated users to execute arbitrary code by renaming a crafted file and then directly accessing it.",2015-09-22,Metasploit,cpe:2.3:a:boltcms:bolt:*:*:*:*:*:*:*:* CVE-2015-7377,0.0,,0.07045,Cross-site scripting (XSS) vulnerability in pie-register/pie-register.php in the Pie Register plugin before 2.0.19 for WordPress allows remote attackers to inject arbitrary web script or HTML via the invitaion_code parameter in a pie-register page to the default URI.,2015-10-16,Nuclei,cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:* CVE-2015-7387,0.0,,0.82227,"ZOHO ManageEngine EventLog Analyzer 10.6 build 10060 and earlier allows remote attackers to bypass intended restrictions and execute arbitrary SQL commands via an allowed query followed by a disallowed one in the query parameter to event/runQuery.do, as demonstrated by ""SELECT 1;INSERT INTO."" Fixed in Build 11200.",2015-09-28,Metasploit,cpe:2.3:a:zohocorp:manageengine_eventlog_analyzer:*:*:*:*:*:*:*:* CVE-2015-7450,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93845,"Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library.",2016-01-02,Metasploit/Nuclei/CISA,cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:sterling_integrator:5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_common_reporting:2.1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_common_reporting:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_common_reporting:2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_common_reporting:3.1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_common_reporting:3.1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_common_reporting:3.1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_common_reporting:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_common_reporting:3.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:watson_content_analytics:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:watson_explorer_analytical_components:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:watson_explorer_analytical_components:11.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:watson_explorer_annotation_administration_console:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:watson_explorer_annotation_administration_console:11.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:websphere_application_server:7.0.0.0:*:*:*:-:*:*:*;cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:-:*:*:*;cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:hypervisor:*:*:*;cpe:2.3:a:ibm:websphere_application_server:8.5.5.5:*:*:*:liberty:*:*:*;cpe:2.3:a:ibm:websphere_application_server:8.5:*:*:*:traditional:*:*:* CVE-2015-7601,0.0,,0.5258,Directory traversal vulnerability in PCMan's FTP Server 2.0.7 allows remote attackers to read arbitrary files via a ..// (dot dot double slash) in a RETR command.,2015-09-29,Metasploit,cpe:2.3:a:pcman\'s_ftp_server_project:pcman\'s_ftp_server:2.0.7:*:*:*:*:*:*:* CVE-2015-7602,0.0,,0.5258,Directory traversal vulnerability in BisonWare BisonFTP 3.5 allows remote attackers to read arbitrary files via a ../ (dot dot slash) in a RETR command.,2015-09-29,Metasploit,cpe:2.3:a:bisonware:bisonftp:3.5:*:*:*:*:*:*:* CVE-2015-7603,0.0,,0.68138,Directory traversal vulnerability in Konica Minolta FTP Utility 1.0 allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in a RETR command.,2015-09-29,Metasploit,cpe:2.3:a:konicaminolta:ftp_utility:1.0:*:*:*:*:*:*:* CVE-2015-7611,0.0,,0.76237,"Apache James Server 2.3.2, when configured with file-based user repositories, allows attackers to execute arbitrary system commands via unspecified vectors.",2016-06-07,Metasploit,cpe:2.3:a:apache:james_server:2.3.2:*:*:*:*:*:*:* CVE-2015-7645,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.84843,"Adobe Flash Player 18.x through 18.0.0.252 and 19.x through 19.0.0.207 on Windows and OS X and 11.x through 11.2.202.535 on Linux allows remote attackers to execute arbitrary code via a crafted SWF file, as exploited in the wild in October 2015.",2015-10-15,CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:* CVE-2015-7709,0.0,,0.88851,The arkeiad daemon in the Arkeia Backup Agent in Western Digital Arkeia 11.0.12 and earlier allows remote attackers to bypass authentication and execute arbitrary commands via a series of crafted requests involving the ARKFS_EXEC_CMD operation.,2015-10-05,Metasploit,cpe:2.3:a:arkeia:western_digital_arkeia:*:*:*:*:*:*:*:* CVE-2015-7755,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.91206,"Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session.",2015-12-19,Metasploit/CISA,cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:*;cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:*;cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:*;cpe:2.3:o:juniper:screenos:6.3.0:r20:*:*:*:*:*:* CVE-2015-7765,0.0,,0.80848,"ZOHO ManageEngine OpManager 11.5 build 11600 and earlier uses a hardcoded password of ""plugin"" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password.",2015-10-09,Metasploit,cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:* CVE-2015-7766,0.0,,0.77548,"PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by ""INSERT/**/INTO.""",2015-10-09,Metasploit,cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_opmanager:11.6:*:*:*:*:*:*:* CVE-2015-7768,0.0,,0.69304,Buffer overflow in Konica Minolta FTP Utility 1.0 allows remote attackers to execute arbitrary code via a long CWD command.,2015-10-09,Metasploit,cpe:2.3:a:konicaminolta:ftp_utility:1.0:*:*:*:*:*:*:* CVE-2015-7780,0.0,,0.36216,Directory traversal vulnerability in ManageEngine Firewall Analyzer before 8.0.,2017-06-27,Nuclei,cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:*:*:*:*:*:*:*:* CVE-2015-7808,0.0,,0.8478,The vB_Api_Hook::decodeArguments method in vBulletin 5 Connect 5.1.2 through 5.1.9 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object in the arguments parameter to ajax/api/hook/decodeArguments.,2015-11-24,Metasploit,cpe:2.3:a:vbulletin:vbulletin:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.1.0:rc1:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.1.2:beta1:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.1.2:rc1:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.1.2:rc2:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.1.3:alpha5:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.1.4:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.1.5:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.1.6:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.1.7:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.1.8:*:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:5.1.9:*:*:*:*:*:*:* CVE-2015-7823,0.0,,0.13294,Open redirect vulnerability in CMSPages/GetDocLink.ashx in Kentico CMS 8.2 through 8.2.41 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the link parameter.,2015-10-21,Nuclei,cpe:2.3:a:kentico:kentico_cms:8.2:*:*:*:*:*:*:* CVE-2015-7857,0.0,,0.85485,SQL injection vulnerability in the getListQuery function in administrator/components/com_contenthistory/models/history.php in Joomla! 3.2 before 3.4.5 allows remote attackers to execute arbitrary SQL commands via the list[select] parameter to index.php.,2015-10-29,Metasploit,cpe:2.3:a:joomla:joomla\!:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.4:*:*:*:*:*:*:* CVE-2015-7858,0.0,,0.87599,"SQL injection vulnerability in Joomla! 3.2 before 3.4.4 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2015-7297.",2015-10-29,Metasploit,cpe:2.3:a:joomla:joomla\!:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.3:*:*:*:*:*:*:* CVE-2015-7871,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.76653,"Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.",2017-08-07,Metasploit,cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*;cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p186:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p187:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p188:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p189:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p190:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p191:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p192:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p193:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p194:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p195:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p196:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p197:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p198:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p199:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p200:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p201:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p202:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p203:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p204:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p205:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p206:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p207:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p208:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p209:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p210:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p211:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p212:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p213:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p214:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p215:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p216:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p217:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p218:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p219:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p220:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p221:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p222:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p223:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p224:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p225:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p226:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p227:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p228:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p229:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p230:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p231_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p232_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p233_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p234_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p235_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p236_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p237_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p238_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p239_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p240_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p241_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p242_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p243_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p244_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p245_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p246_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p247_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p248_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p249_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:p250_rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:* CVE-2015-8103,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9037,"The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the ""Groovy variant in 'ysoserial'"".",2015-11-25,Metasploit,cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*;cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*;cpe:2.3:a:redhat:openshift_container_platform:2.2:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openshift_container_platform:3.1:*:*:*:*:*:*:* CVE-2015-8249,0.0,,0.81787,The FileUploadServlet class in ManageEngine Desktop Central 9 before build 91093 allows remote attackers to upload and execute arbitrary files via the ConnectionId parameter.,2017-09-28,Metasploit,cpe:2.3:a:manageengine:desktop_central:9.0:*:*:*:*:*:*:* CVE-2015-8279,0.0,,0.52232,Web Viewer 1.0.0.193 on Samsung SRN-1670D devices allows remote attackers to read arbitrary files via a request to an unspecified PHP script.,2016-01-15,Metasploit,cpe:2.3:a:samsung:web_viewer:*:*:*:*:*:*:*:* CVE-2015-8349,0.0,,0.09843,Cross-site scripting (XSS) vulnerability in SourceBans before 2.0 pre-alpha allows remote attackers to inject arbitrary web script or HTML via the advSearch parameter to index.php.,2017-09-11,Nuclei,cpe:2.3:a:gameconnect:sourcebans:*:*:*:*:*:*:*:* CVE-2015-8399,0.0,,0.91782,Atlassian Confluence before 5.8.17 allows remote authenticated users to read configuration files via the decoratorName parameter to (1) spaces/viewdefaultdecorator.action or (2) admin/viewdefaultdecorator.action.,2016-04-11,Nuclei,cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:* CVE-2015-8562,0.0,,0.93238,"Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.",2015-12-16,Metasploit/Nuclei,cpe:2.3:a:joomla:joomla\!:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.10:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.11:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.12:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.13:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.14:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.15:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.16:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.17:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.18:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.19:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.20:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.21:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.22:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.23:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.24:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.25:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.26:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.6:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.7:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.8:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.5.9:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.6.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.6.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.6.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.6.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.6.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.6.6:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.7.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.7.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:1.7.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.10:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.11:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.12:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.13:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.14:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.15:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.16:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.17:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.18:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.19:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.20:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.21:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.22:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.23:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.24:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.25:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.26:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.27:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.28:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.6:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.7:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.8:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:2.5.9:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.1.6:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.3.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.3:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.4:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:3.4.5:*:*:*:*:*:*:* CVE-2015-8612,0.0,,0.25002,The EnableNetwork method in the Network class in plugins/mechanism/Network.py in Blueman before 2.0.3 allows local users to gain privileges via the dhcp_handler argument.,2016-01-08,Metasploit,cpe:2.3:a:blueman_project:blueman:*:*:*:*:*:*:*:* CVE-2015-8651,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.89783,"Integer overflow in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors.",2015-12-28,CISA,cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:insight_control:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:insight_control_server_provisioning:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:matrix_operating_environment:7.6:*:*:*:*:*:*:*;cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:systems_insight_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:version_control_repository_manager:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:* CVE-2015-8660,6.7,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,0.65431,"The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.",2015-12-28,Metasploit,cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* CVE-2015-8813,0.0,,0.83448,The Page_Load function in Umbraco.Web/umbraco.presentation/umbraco/dashboard/FeedProxy.aspx.cs in Umbraco before 7.4.0 allows remote attackers to conduct server-side request forgery (SSRF) attacks via the url parameter.,2017-03-03,Nuclei,cpe:2.3:a:umbraco:umbraco:*:*:*:*:*:*:*:* CVE-2015-9312,0.0,,0.04178,The newstatpress plugin before 1.0.5 for WordPress has XSS related to an IMG element.,2019-08-14,Nuclei,cpe:2.3:a:newstatpress_project:newstatpress:*:*:*:*:*:wordpress:*:* CVE-2015-9323,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.63264,The 404-to-301 plugin before 2.0.3 for WordPress has SQL injection.,2019-08-16,Nuclei,cpe:2.3:a:duckdev:404_to_301:*:*:*:*:*:wordpress:*:* CVE-2015-9406,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.42085,Directory traversal vulnerability in the mTheme-Unus theme before 2.3 for WordPress allows an attacker to read arbitrary files via a .. (dot dot) in the files parameter to css/css.php.,2019-09-20,Nuclei,cpe:2.3:a:mtheme-unus_project:mtheme-unus:*:*:*:*:*:wordpress:*:* CVE-2015-9414,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.01759,The wp-symposium plugin through 15.8.1 for WordPress has XSS via the wp-content/plugins/wp-symposium/get_album_item.php?size parameter.,2019-09-26,Nuclei,cpe:2.3:a:wpsymposiumpro:wp-symposium:*:*:*:*:*:wordpress:*:* CVE-2015-9415,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,0.21008,The bj-lazy-load plugin before 1.0 for WordPress has Remote File Inclusion.,2019-09-26,Nuclei,cpe:2.3:a:angrycreative:bj_lazy_load:*:*:*:*:*:wordpress:*:* CVE-2015-9480,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.2916,The RobotCPA plugin 5 for WordPress has directory traversal via the f.php l parameter.,2019-10-10,Nuclei,cpe:2.3:a:robot-cpa:robotcpa:5:*:*:*:*:wordpress:*:* CVE-2015-9499,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.64458,The Showbiz Pro plugin through 1.7.1 for WordPress has PHP code execution by uploading a .php file within a ZIP archive.,2019-10-22,Nuclei,cpe:2.3:a:themepunch:showbiz_pro:*:*:*:*:*:wordpress:*:* CVE-2016-0034,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.53354,"Microsoft Silverlight 5 before 5.1.41212.0 mishandles negative offsets during decoding, which allows remote attackers to execute arbitrary code or cause a denial of service (object-header corruption) via a crafted web site, aka ""Silverlight Runtime Remote Code Execution Vulnerability.""",2016-01-13,CISA,cpe:2.3:a:microsoft:silverlight:*:*:*:*:*:*:*:* CVE-2016-0040,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.77872,"The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka ""Windows Elevation of Privilege Vulnerability.""",2016-02-10,Metasploit/CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2016-0041,0.0,,0.60439,"Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold and 1511, and Internet Explorer 10 and 11 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka ""DLL Loading Remote Code Execution Vulnerability.""",2016-02-10,Metasploit,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* CVE-2016-0051,0.0,,0.7854,"The WebDAV client in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka ""WebDAV Elevation of Privilege Vulnerability.""",2016-02-10,Metasploit,cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* CVE-2016-0099,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.9132,"The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka ""Secondary Logon Elevation of Privilege Vulnerability.""",2016-03-09,Metasploit/CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2016-0100,0.0,,0.6875,"Microsoft Windows Vista SP2 and Server 2008 SP2 mishandle library loading, which allows local users to gain privileges via a crafted application, aka ""Library Loading Input Validation Remote Code Execution Vulnerability.""",2016-03-09,Metasploit,cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* CVE-2016-0151,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.60408,"The Client-Server Run-time Subsystem (CSRSS) in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 mismanages process tokens, which allows local users to gain privileges via a crafted application, aka ""Windows CSRSS Security Feature Bypass Vulnerability.""",2016-04-12,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* CVE-2016-0162,4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N,0.20719,"Microsoft Internet Explorer 9 through 11 allows remote attackers to determine the existence of files via crafted JavaScript code, aka ""Internet Explorer Information Disclosure Vulnerability.""",2016-04-12,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2016-0165,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.11623,"The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka ""Win32k Elevation of Privilege Vulnerability,"" a different vulnerability than CVE-2016-0143 and CVE-2016-0167.",2016-04-12,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2016-0167,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.02024,"The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka ""Win32k Elevation of Privilege Vulnerability,"" a different vulnerability than CVE-2016-0143 and CVE-2016-0165.",2016-04-12,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2016-0185,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.82752,"Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, and Windows 8.1 allows remote attackers to execute arbitrary code via a crafted Media Center link (aka .mcl) file, aka ""Windows Media Center Remote Code Execution Vulnerability.""",2016-05-11,CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2016-0189,7.5,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,0.92259,"The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka ""Scripting Engine Memory Corruption Vulnerability,"" a different vulnerability than CVE-2016-0187.",2016-05-11,Metasploit/CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:jscript:5.8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:vbscript:5.7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:vbscript:5.8:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2016-0491,0.0,,0.88432,Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control 12.4.0.2 and 12.5.0.2 allows remote attackers to affect integrity and availability via unknown vectors related to Load Testing for Web Apps. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that the UploadFileAction servlet allows remote authenticated users to upload and execute arbitrary files via an * (asterisk) character in the fileType parameter.,2016-01-21,Metasploit,cpe:2.3:a:oracle:application_testing_suite:12.4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:application_testing_suite:12.5.0.2:*:*:*:*:*:*:* CVE-2016-0492,0.0,,0.91458,"Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control 12.4.0.2 and 12.5.0.2 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Load Testing for Web Apps, a different vulnerability than CVE-2016-0488. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a directory traversal vulnerability in the isAllowedUrl function, which allows remote attackers to bypass authentication via directory traversal sequences following a URI entry that does not require authentication, as demonstrated by olt/Login.do/../../olt/UploadFileUpload.do.",2016-01-21,Metasploit,cpe:2.3:a:oracle:application_testing_suite:12.4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:application_testing_suite:12.5.0.2:*:*:*:*:*:*:* CVE-2016-0709,0.0,,0.66979,"Directory traversal vulnerability in the Import/Export function in the Portal Site Manager in Apache Jetspeed before 2.3.1 allows remote authenticated administrators to write to arbitrary files, and consequently execute arbitrary code, via a .. (dot dot) in a ZIP archive entry, as demonstrated by ""../../webapps/x.jsp.""",2016-04-11,Metasploit,cpe:2.3:a:apache:jetspeed:*:*:*:*:*:*:*:* CVE-2016-0710,0.0,,0.7922,Multiple SQL injection vulnerabilities in the User Manager service in Apache Jetspeed before 2.3.1 allow remote attackers to execute arbitrary SQL commands via the (1) role or (2) user parameter to services/usermanager/users/.,2016-04-11,Metasploit,cpe:2.3:a:apache:jetspeed:*:*:*:*:*:*:*:* CVE-2016-0752,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.92705,"Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.",2016-02-16,Metasploit/CISA,cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_module_for_containers:12:*:*:*:*:*:*:* CVE-2016-0792,0.0,,0.89805,"Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.",2016-04-07,Metasploit,cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*;cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*;cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:* CVE-2016-0800,0.0,,0.90348,"The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ""DROWN"" attack.",2016-03-01,Metasploit,cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*;cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:client:-:*:*:*:*:iphone_os:*:*;cpe:2.3:a:pulsesecure:steel_belted_radius:-:*:*:*:*:*:*:* CVE-2016-0854,0.0,,0.73701,Unrestricted file upload vulnerability in the uploadImageCommon function in the UploadAjaxAction script in the WebAccess Dashboard Viewer in Advantech WebAccess before 8.1 allows remote attackers to write to files of arbitrary types via unspecified vectors.,2016-01-15,Metasploit,cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:* CVE-2016-0957,0.0,,0.90447,"Dispatcher before 4.1.5 in Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0 does not properly implement a URL filter, which allows remote attackers to bypass dispatcher rules via unspecified vectors.",2016-02-10,Nuclei,cpe:2.3:a:adobe:dispatcher:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:experience_manager:5.6.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:experience_manager:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:experience_manager:6.1.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2016-0984,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.67509,"Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0983.",2016-02-10,CISA,cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*;cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* CVE-2016-1000126,0.0,,0.02773,Reflected XSS in wordpress plugin admin-font-editor v1.8,2016-10-10,Nuclei,cpe:2.3:a:admin-font-editor_project:admin-font-editor:*:*:*:*:*:wordpress:*:* CVE-2016-1000127,0.0,,0.02773,Reflected XSS in wordpress plugin ajax-random-post v2.00,2016-10-10,Nuclei,cpe:2.3:a:ajax-random-post_project:ajax-random-post:*:*:*:*:*:wordpress:*:* CVE-2016-1000128,0.0,,0.02927,Reflected XSS in wordpress plugin anti-plagiarism v3.60,2016-10-10,Nuclei,cpe:2.3:a:anti-plagiarism_project:anti-plagiarism:*:*:*:*:*:wordpress:*:* CVE-2016-1000129,0.0,,0.02773,Reflected XSS in wordpress plugin defa-online-image-protector v3.3,2016-10-10,Nuclei,cpe:2.3:a:defa-online-image-protector_project:defa-online-image-protector:*:*:*:*:*:wordpress:*:* CVE-2016-1000130,0.0,,0.01668,Reflected XSS in wordpress plugin e-search v1.0,2016-10-10,Nuclei,cpe:2.3:a:e-search_project:e-search:1.0:*:*:*:*:wordpress:*:* CVE-2016-1000131,0.0,,0.02155,Reflected XSS in wordpress plugin e-search v1.0,2016-10-10,Nuclei,cpe:2.3:a:e-search_project:esearch:1.0:*:*:*:*:wordpress:*:* CVE-2016-1000132,0.0,,0.02422,Reflected XSS in wordpress plugin enhanced-tooltipglossary v3.2.8,2016-10-10,Nuclei,cpe:2.3:a:cminds:tooltip_glossary:*:*:*:*:*:wordpress:*:* CVE-2016-1000133,0.0,,0.02995,Reflected XSS in wordpress plugin forget-about-shortcode-buttons v1.1.1,2016-10-10,Nuclei,cpe:2.3:a:designsandcode:forget_about_shortcode_buttons:*:*:*:*:*:wordpress:*:* CVE-2016-1000134,0.0,,0.02155,Reflected XSS in wordpress plugin hdw-tube v1.2,2016-10-10,Nuclei,cpe:2.3:a:hdw-tube_project:hdw-tube:*:*:*:*:*:wordpress:*:* CVE-2016-1000135,0.0,,0.02155,Reflected XSS in wordpress plugin hdw-tube v1.2,2016-10-10,Nuclei,cpe:2.3:a:hdw-tube_project:hdw-tube:*:*:*:*:*:wordpress:*:* CVE-2016-1000136,0.0,,0.06584,Reflected XSS in wordpress plugin heat-trackr v1.0,2016-10-10,Nuclei,cpe:2.3:a:heat-trackr_project:heat-trackr:1.0:*:*:*:*:wordpress:*:* CVE-2016-1000137,0.0,,0.07251,Reflected XSS in wordpress plugin hero-maps-pro v2.1.0,2016-10-10,Nuclei,cpe:2.3:a:hero-maps-pro_project:hero-maps-pro:*:*:*:*:*:wordpress:*:* CVE-2016-1000138,0.0,,0.06584,Reflected XSS in wordpress plugin indexisto v1.0.5,2016-10-10,Nuclei,cpe:2.3:a:indexisto_project:indexisto:*:*:*:*:*:wordpress:*:* CVE-2016-1000139,0.0,,0.02927,Reflected XSS in wordpress plugin infusionsoft v1.5.11,2016-10-10,Nuclei,cpe:2.3:a:infusionsoft_project:infusionsoft:*:*:*:*:*:wordpress:*:* CVE-2016-1000140,0.0,,0.06584,Reflected XSS in wordpress plugin new-year-firework v1.1.9,2016-10-10,Nuclei,cpe:2.3:a:new-year-firework_project:new-year-firework:*:*:*:*:*:wordpress:*:* CVE-2016-1000141,0.0,,0.06584,Reflected XSS in wordpress plugin page-layout-builder v1.9.3,2016-10-10,Nuclei,cpe:2.3:a:page-layout-builder_project:page-layout-builder:*:*:*:*:*:wordpress:*:* CVE-2016-1000142,0.0,,0.07251,Reflected XSS in wordpress plugin parsi-font v4.2.5,2016-10-10,Nuclei,cpe:2.3:a:parsi-font_project:parsi-font:4.2.5:*:*:*:*:wordpress:*:* CVE-2016-1000143,0.0,,0.06584,Reflected XSS in wordpress plugin photoxhibit v2.1.8,2016-10-10,Nuclei,cpe:2.3:a:photoxhibit_project:photoxhibit:*:*:*:*:*:wordpress:*:* CVE-2016-1000146,0.0,,0.0204,Reflected XSS in wordpress plugin pondol-formmail v1.1,2016-10-10,Nuclei,cpe:2.3:a:pondol-formmail_project:pondol-formmail:*:*:*:*:*:wordpress:*:* CVE-2016-1000148,0.0,,0.09352,Reflected XSS in wordpress plugin s3-video v0.983,2016-10-10,Nuclei,cpe:2.3:a:s3-video_project:s3-video:*:*:*:*:*:wordpress:*:* CVE-2016-1000149,0.0,,0.07335,Reflected XSS in wordpress plugin simpel-reserveren v3.5.2,2016-10-10,Nuclei,cpe:2.3:a:simpel-reserveren_project:simpel-reserveren:*:*:*:*:*:wordpress:*:* CVE-2016-1000152,0.0,,0.06492,Reflected XSS in wordpress plugin tidio-form v1.0,2016-10-10,Nuclei,cpe:2.3:a:tidio-form_project:tidio-form:1.0:*:*:*:*:wordpress:*:* CVE-2016-1000153,0.0,,0.01868,Reflected XSS in wordpress plugin tidio-gallery v1.1,2016-10-10,Nuclei,cpe:2.3:a:tidio-gallery_project:tidio-gallery:*:*:*:*:*:wordpress:*:* CVE-2016-1000154,0.0,,0.05754,Reflected XSS in wordpress plugin whizz v1.0.7,2016-10-10,Nuclei,cpe:2.3:a:browserweb:whizz:*:*:*:*:*:wordpress:*:* CVE-2016-1000155,0.0,,0.02155,Reflected XSS in wordpress plugin wpsolr-search-engine v7.6,2016-10-10,Nuclei,cpe:2.3:a:wpsolr:wpsolr-search-engine:7.6:*:*:*:*:wordpress:*:* CVE-2016-1000282,0.0,,0.74231,Haraka version 2.8.8 and earlier comes with a plugin for processing attachments for zip files. Versions 2.8.8 and earlier can be vulnerable to command injection.,2019-02-05,Metasploit,cpe:2.3:a:haraka_project:haraka:*:*:*:*:*:*:*:* CVE-2016-10033,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94428,"The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \"" (backslash double quote) in a crafted Sender property.",2016-12-30,Metasploit/Nuclei/CISA,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:phpmailer_project:phpmailer:*:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* CVE-2016-10045,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93602,The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.,2016-12-30,Metasploit,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:phpmailer_project:phpmailer:*:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* CVE-2016-10073,0.0,,0.53554,"The from method in library/core/class.email.php in Vanilla Forums before 2.3.1 allows remote attackers to spoof the email domain in sent messages and potentially obtain sensitive information via a crafted HTTP Host header, as demonstrated by a password reset request.",2017-05-23,Metasploit,cpe:2.3:a:vanillaforums:vanilla:*:*:*:*:*:*:*:* CVE-2016-1010,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.31545,"Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0963 and CVE-2016-0993.",2016-03-12,CISA,cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*;cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:* CVE-2016-10108,0.0,,0.91159,Unauthenticated Remote Command injection as root occurs in the Western Digital MyCloud NAS 2.11.142 /web/google_analytics.php URL via a modified arg parameter in the POST data.,2017-01-03,Metasploit/Nuclei,cpe:2.3:a:western_digital:mycloud_nas:2.11.142:*:*:*:*:*:*:* CVE-2016-10134,0.0,,0.88001,SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php.,2017-02-17,Metasploit/Nuclei,cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:3.0.3:*:*:*:*:*:*:* CVE-2016-10174,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9184,The NETGEAR WNR2000v5 router contains a buffer overflow in the hidden_lang_avi parameter when invoking the URL /apply.cgi?/lang_check.html. This buffer overflow can be exploited by an unauthenticated attacker to achieve remote code execution.,2017-01-30,Metasploit/CISA,cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:jnr1010v2:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:jnr3300:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:jwnr2010v5:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r2000:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r6100:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r7500:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r7500v2:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wndr3700v4:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wndr3800:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wndr4300:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wndr4300v2:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wndr4500v3:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wndr4700:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wnr1000v2:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wnr1000v4:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wnr2000v3:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wnr2000v4:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wnr2000v5:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wnr2020:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wnr2050:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wnr2200:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wnr2500:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wnr614:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wnr618:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:d6100_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:d7000_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:d7800_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:jnr1010v2_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:jnr3300_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:jwnr2010v5_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r2000_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r6100_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r6220_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r7500_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r7500v2_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wndr3700v4_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wndr3800_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wndr4300_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wndr4300v2_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wndr4500v3_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wndr4700_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr1000v2_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr1000v4_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr2000v3_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr2000v4_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr2000v5_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr2020_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr2050_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr2200_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr2500_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr614_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr618_firmware:-:*:*:*:*:*:*:* CVE-2016-10175,0.0,,0.81606,"The NETGEAR WNR2000v5 router leaks its serial number when performing a request to the /BRS_netgear_success.html URI. This serial number allows a user to obtain the administrator username and password, when used in combination with the CVE-2016-10176 vulnerability that allows resetting the answers to the password-recovery questions.",2017-01-30,Metasploit,cpe:2.3:h:netgear:wnr2000v5:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr2000v5_firmware:*:*:*:*:*:*:*:* CVE-2016-10176,0.0,,0.86619,"The NETGEAR WNR2000v5 router allows an administrator to perform sensitive actions by invoking the apply.cgi URL on the web server of the device. This special URL is handled by the embedded web server (uhttpd) and processed accordingly. The web server also contains another URL, apply_noauth.cgi, that allows an unauthenticated user to perform sensitive actions on the device. This functionality can be exploited to change the router settings (such as the answers to the password-recovery questions) and achieve remote code execution.",2017-01-30,Metasploit,cpe:2.3:h:netgear:wnr2000v5:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr2000v5_firmware:*:*:*:*:*:*:*:* CVE-2016-1019,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.77059,"Adobe Flash Player 21.0.0.197 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, as exploited in the wild in April 2016.",2016-04-07,CISA,cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*;cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* CVE-2016-10225,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.06061,"The sunxi-debug driver in Allwinner 3.4 legacy kernel for H3, A83T and H8 devices allows local users to gain root privileges by sending ""rootmydevice"" to /proc/sunxi_debug/sunxi_debug.",2017-03-27,Metasploit,cpe:2.3:h:allwinner:a83t:-:*:*:*:*:*:*:*;cpe:2.3:h:allwinner:h3:-:*:*:*:*:*:*:*;cpe:2.3:h:allwinner:h8:-:*:*:*:*:*:*:*;cpe:2.3:o:allwinner:linux-3.4-sunxi:-:*:*:*:*:*:*:* CVE-2016-10367,0.0,,0.52468,"In Opsview Monitor Pro (Prior to 5.1.0.162300841, prior to 5.0.2.27475, prior to 4.6.4.162391051, and 4.5.x without a certain 2016 security patch), an unauthenticated Directory Traversal vulnerability can be exploited by issuing a specially crafted HTTP GET request utilizing a simple URL encoding bypass, %252f instead of /.",2017-05-03,Nuclei,cpe:2.3:a:opsview:opsview:4.5.0:*:*:*:pro:*:*:*;cpe:2.3:a:opsview:opsview:4.6.4:*:*:*:pro:*:*:*;cpe:2.3:a:opsview:opsview:5.0.2:*:*:*:pro:*:*:*;cpe:2.3:a:opsview:opsview:5.1.0:*:*:*:pro:*:*:* CVE-2016-10368,0.0,,0.01027,"Open redirect vulnerability in Opsview Monitor Pro (Prior to 5.1.0.162300841, prior to 5.0.2.27475, prior to 4.6.4.162391051, and 4.5.x without a certain 2016 security patch) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the back parameter to the /login URI.",2017-05-03,Nuclei,cpe:2.3:a:opsview:opsview:4.5.0:*:*:*:pro:*:*:*;cpe:2.3:a:opsview:opsview:4.6.4:*:*:*:pro:*:*:*;cpe:2.3:a:opsview:opsview:5.0.2:*:*:*:pro:*:*:*;cpe:2.3:a:opsview:opsview:5.1.0:*:*:*:pro:*:*:* CVE-2016-10372,0.0,,0.91956,"The Eir D1000 modem does not properly restrict the TR-064 protocol, which allows remote attackers to execute arbitrary commands via TCP port 7547, as demonstrated by opening WAN access to TCP port 80, retrieving the login password (which defaults to the Wi-Fi password), and using the NewNTPServer feature.",2017-05-16,Metasploit,cpe:2.3:h:eir:d1000_modem:-:*:*:*:*:*:*:*;cpe:2.3:o:eir:d1000_modem_firmware:-:*:*:*:*:*:*:* CVE-2016-10709,0.0,,0.77886,"pfSense before 2.3 allows remote authenticated users to execute arbitrary OS commands via a '|' character in the status_rrd_graph_img.php graph parameter, related to _rrd_graph_img.php.",2018-01-22,Metasploit,cpe:2.3:a:pfsense:pfsense:*:*:*:*:community:*:*:* CVE-2016-10924,0.0,,0.62226,The ebook-download plugin before 1.2 for WordPress has directory traversal.,2019-08-22,Nuclei,cpe:2.3:a:zedna_ebook_download_project:zedna_ebook_download:*:*:*:*:*:wordpress:*:* CVE-2016-10940,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,0.14101,The zm-gallery plugin 1.0 for WordPress has SQL injection via the order parameter.,2019-09-13,Nuclei,cpe:2.3:a:zm-gallery_project:zm-gallery:1.0:*:*:*:*:wordpress:*:* CVE-2016-10956,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.83794,The mail-masta plugin 1.0 for WordPress has local file inclusion in count_of_send.php and csvexport.php.,2019-09-16,Nuclei,cpe:2.3:a:mail-masta_project:mail-masta:1.0:*:*:*:*:wordpress:*:* CVE-2016-10960,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.58125,The wsecure plugin before 2.4 for WordPress has remote code execution via shell metacharacters in the wsecure-config.php publish parameter.,2019-09-16,Nuclei,cpe:2.3:a:joomlaserviceprovider:wsecure:*:*:*:*:lite:wordpress:*:* CVE-2016-10972,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.73429,The newspaper theme before 6.7.2 for WordPress has a lack of options access control via td_ajax_update_panel.,2019-09-16,Nuclei,cpe:2.3:a:tagdiv:newspaper:*:*:*:*:*:wordpress:*:* CVE-2016-10973,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.01324,The Brafton plugin before 3.4.8 for WordPress has XSS via the wp-admin/admin.php?page=BraftonArticleLoader tab parameter to BraftonAdminPage.php.,2019-09-16,Nuclei,cpe:2.3:a:brafton:brafton:*:*:*:*:*:wordpress:*:* CVE-2016-10976,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.02444,"The safe-editor plugin before 1.2 for WordPress has no se_save authentication, with resultant XSS.",2019-09-17,Nuclei,cpe:2.3:a:kodebyraaet:safe_editor:*:*:*:*:*:wordpress:*:* CVE-2016-10993,5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,0.01717,The ScoreMe theme through 2016-04-01 for WordPress has XSS via the s parameter.,2019-09-17,Nuclei,cpe:2.3:a:scoreme_project:scoreme:*:*:*:*:*:wordpress:*:* CVE-2016-11021,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,0.90446,setSystemCommand on D-Link DCS-930L devices before 2.12 allows a remote attacker to execute code via an OS command in the SystemCommand parameter.,2020-03-09,CISA,cpe:2.3:h:dlink:dcs-930l:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dcs-930l_firmware:*:*:*:*:*:*:*:* CVE-2016-1209,0.0,,0.77252,The Ninja Forms plugin before 2.9.42.1 for WordPress allows remote attackers to conduct PHP object injection attacks via crafted serialized values in a POST request.,2016-05-14,Metasploit,cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:* CVE-2016-1240,0.0,,0.18611,"The Tomcat init script in the tomcat7 package before 7.0.56-3+deb8u4 and tomcat8 package before 8.0.14-1+deb8u3 on Debian jessie and the tomcat6 and libtomcat6-java packages before 6.0.35-1ubuntu3.8 on Ubuntu 12.04 LTS, the tomcat7 and libtomcat7-java packages before 7.0.52-1ubuntu0.7 on Ubuntu 14.04 LTS, and tomcat8 and libtomcat8-java packages before 8.0.32-1ubuntu1.2 on Ubuntu 16.04 LTS allows local users with access to the tomcat account to gain root privileges via a symlink attack on the Catalina log file, as demonstrated by /var/log/tomcat7/catalina.out.",2016-10-03,Metasploit,cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:7.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:8.0:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* CVE-2016-15042,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.72798,"The Frontend File Manager (versions < 4.0), N-Media Post Front-end Form (versions < 1.1) plugins for WordPress are vulnerable to arbitrary file uploads due to missing file type validation via the `nm_filemanager_upload_file` and `nm_postfront_upload_file` AJAX actions. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.",2024-10-16,Nuclei,cpe:2.3:a:najeebmedia:frontend_file_manager:*:*:*:*:*:wordpress:*:*;cpe:2.3:a:najeebmedia:post_front-end_form:*:*:*:*:*:wordpress:*:* CVE-2016-1524,0.0,,0.67599,"Multiple unrestricted file upload vulnerabilities in NETGEAR Management System NMS300 1.5.0.11 and earlier allow remote attackers to execute arbitrary Java code by using (1) fileUpload.do or (2) lib-1.0/external/flash/fileUpload.do to upload a JSP file, and then accessing it via a direct request for a /null URI.",2016-02-13,Metasploit,cpe:2.3:a:netgear:prosafe_network_management_software_300:*:*:*:*:*:*:*:* CVE-2016-1525,0.0,,0.83584,Directory traversal vulnerability in data/config/image.do in NETGEAR Management System NMS300 1.5.0.11 and earlier allows remote authenticated users to read arbitrary files via a .. (dot dot) in the realName parameter.,2016-02-13,Metasploit,cpe:2.3:a:netgear:prosafe_network_management_software_300:1.5.0.11:*:*:*:*:*:*:* CVE-2016-1531,0.0,,0.52948,"Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.",2016-04-07,Metasploit,cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:* CVE-2016-1542,0.0,,0.74063,"The RPC API in RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX allows remote attackers to bypass authorization and enumerate users by sending an action packet to xmlrpc after an authorization failure.",2016-06-13,Metasploit,cpe:2.3:a:bmc:bladelogic_server_automation_console:8.2.02:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.2.03:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.2.04:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.3.00:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.3.01:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.3.02:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.3.03:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.5.00:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.5.01:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.6.00:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.7.00:*:*:*:*:*:*:* CVE-2016-1543,0.0,,0.75651,"The RPC API in the RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX allows remote attackers to bypass authorization and reset arbitrary user passwords by sending an action packet to xmlrpc after an authorization failure.",2016-06-13,Metasploit,cpe:2.3:a:bmc:bladelogic_server_automation_console:8.2.02:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.2.03:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.2.04:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.3.00:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.3.01:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.3.02:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.3.03:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.5.00:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.5.01:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.6.00:*:*:*:*:*:*:*;cpe:2.3:a:bmc:bladelogic_server_automation_console:8.7.00:*:*:*:*:*:*:* CVE-2016-1555,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93967,"(1) boardData102.php, (2) boardData103.php, (3) boardDataJP.php, (4) boardDataNA.php, and (5) boardDataWW.php in Netgear WN604 before 3.3.3 and WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360, and WNDAP660 before 3.5.5.0 allow remote attackers to execute arbitrary commands.",2017-04-21,Metasploit/Nuclei/CISA,cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wn802tv2:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wndap210v2:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wn802tv2_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wndap210v2_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:* CVE-2016-1560,0.0,,0.81672,"ExaGrid appliances with firmware before 4.8 P26 have a default password of (1) inflection for the root shell account and (2) support for the support account in the web interface, which allows remote attackers to obtain administrative access via an SSH or HTTP session.",2017-04-21,Metasploit,cpe:2.3:h:exagrid:ex10000e:-:*:*:*:*:*:*:*;cpe:2.3:h:exagrid:ex13000e:-:*:*:*:*:*:*:*;cpe:2.3:h:exagrid:ex21000e:-:*:*:*:*:*:*:*;cpe:2.3:h:exagrid:ex3000:-:*:*:*:*:*:*:*;cpe:2.3:h:exagrid:ex32000e:-:*:*:*:*:*:*:*;cpe:2.3:h:exagrid:ex40000e:-:*:*:*:*:*:*:*;cpe:2.3:h:exagrid:ex5000:-:*:*:*:*:*:*:*;cpe:2.3:h:exagrid:ex7000:-:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex10000e_firmware:4.8:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex13000e_firmware:4.8:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex21000e_firmware:4.8:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex3000_firmware:4.8:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex32000e_firmware:4.8:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex40000e_firmware:4.8:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex5000_firmware:4.8:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex7000_firmware:4.8:*:*:*:*:*:*:* CVE-2016-1561,0.0,,0.84403,"ExaGrid appliances with firmware before 4.8 P26 have a default SSH public key in the authorized_keys file for root, which allows remote attackers to obtain SSH access by leveraging knowledge of a private key from another installation or a firmware image.",2017-04-21,Metasploit,cpe:2.3:h:exagrid:ex10000e:-:*:*:*:*:*:*:*;cpe:2.3:h:exagrid:ex13000e:-:*:*:*:*:*:*:*;cpe:2.3:h:exagrid:ex21000e:-:*:*:*:*:*:*:*;cpe:2.3:h:exagrid:ex3000:-:*:*:*:*:*:*:*;cpe:2.3:h:exagrid:ex32000e:-:*:*:*:*:*:*:*;cpe:2.3:h:exagrid:ex40000e:-:*:*:*:*:*:*:*;cpe:2.3:h:exagrid:ex5000:-:*:*:*:*:*:*:*;cpe:2.3:h:exagrid:ex7000:-:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex10000e_firmware:4.8:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex13000e_firmware:4.8:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex21000e_firmware:4.8:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex3000_firmware:4.8:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex32000e_firmware:4.8:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex40000e_firmware:4.8:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex5000_firmware:4.8:*:*:*:*:*:*:*;cpe:2.3:o:exagrid:ex7000_firmware:4.8:*:*:*:*:*:*:* CVE-2016-1593,0.0,,0.85112,Directory traversal vulnerability in the import users feature in Micro Focus Novell Service Desk before 7.2 allows remote authenticated administrators to upload and execute arbitrary JSP files via a .. (dot dot) in a filename within a multipart/form-data POST request to a LiveTime.woa URL.,2016-04-22,Metasploit,cpe:2.3:a:novell:service_desk:*:*:*:*:*:*:*:* CVE-2016-1646,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.71722,"The Array.prototype.concat implementation in builtins.cc in Google V8, as used in Google Chrome before 49.0.2623.108, does not properly consider element data types, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted JavaScript code.",2016-03-29,CISA,cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2016-1713,0.0,,0.61943,"Unrestricted file upload vulnerability in the Settings_Vtiger_CompanyDetailsSave_Action class in modules/Settings/Vtiger/actions/CompanyDetailsSave.php in Vtiger CRM 6.4.0 allows remote authenticated users to execute arbitrary code by uploading a crafted image file with an executable extension, then accessing it via a direct request to the file in test/logo/. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6000.",2017-04-14,Metasploit,cpe:2.3:a:vtiger:vtiger_crm:6.4.0:*:*:*:*:*:*:* CVE-2016-1909,0.0,,0.81812,"Fortinet FortiAnalyzer before 5.0.12 and 5.2.x before 5.2.5; FortiSwitch 3.3.x before 3.3.3; FortiCache 3.0.x before 3.0.8; and FortiOS 4.1.x before 4.1.11, 4.2.x before 4.2.16, 4.3.x before 4.3.17 and 5.0.x before 5.0.8 have a hardcoded passphrase for the Fortimanager_Access account, which allows remote attackers to obtain administrative access via an SSH session.",2016-01-15,Metasploit,cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.0:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.1:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.2:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.3:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.4:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.5:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.6:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.7:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0:*:*:*:*:*:*:* CVE-2016-20017,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.88202,"D-Link DSL-2750B devices before 1.05 allow remote unauthenticated command injection via the login.cgi cli parameter, as exploited in the wild in 2016 through 2022.",2022-10-19,CISA,cpe:2.3:h:dlink:dsl-2750b:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dsl-2750b_firmware:*:*:*:*:*:*:*:* CVE-2016-2004,0.0,,0.92308,"HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allow remote attackers to execute arbitrary code via unspecified vectors related to lack of authentication. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2623.",2016-04-21,Metasploit/Nuclei,cpe:2.3:a:hp:data_protector:*:*:*:*:*:*:*:* CVE-2016-2055,0.0,,0.67997,"xymond/xymond.c in xymond in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow remote attackers to read arbitrary files in the configuration directory via a ""config"" command.",2016-04-13,Metasploit,cpe:2.3:a:xymon:xymon:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.1.2:p1:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.1.2:p2:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2.2:rc1:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2.3:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2.3:rc1:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2:alfa:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2:beta20060605:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2:rc20060712:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.0:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.0:beta1:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.0:beta2:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.0:beta3:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.0:rc1:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.10:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.11:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.12:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.13:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.14:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.15:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.16:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.17:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.18:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.19:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.19:rc1:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.20:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.21:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.22:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.23:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.24:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.3:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.4:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.5:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.6:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.7:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.8:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.9:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* CVE-2016-2056,0.0,,0.56347,"xymond in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow remote authenticated users to execute arbitrary commands via shell metacharacters in the adduser_name argument in (1) web/useradm.c or (2) web/chpasswd.c.",2016-04-13,Metasploit,cpe:2.3:a:xymon:xymon:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.1.2:p1:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.1.2:p2:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2.2:rc1:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2.3:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2.3:rc1:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2:alfa:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2:beta20060605:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.2:rc20060712:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.0:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.0:beta1:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.0:beta2:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.0:beta3:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.0:rc1:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.10:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.11:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.12:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.13:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.14:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.15:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.16:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.17:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.18:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.19:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.19:rc1:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.20:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.21:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.22:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.23:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.24:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.3:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.4:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.5:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.6:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.7:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.8:*:*:*:*:*:*:*;cpe:2.3:a:xymon:xymon:4.3.9:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* CVE-2016-2098,0.0,,0.86074,"Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.",2016-04-07,Metasploit,cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.10:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.1:-:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.1:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.1:rc3:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.1:rc4:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.4:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.6:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.6:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.6:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.6:rc3:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.7:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.8:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.0.9:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.0:-:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.0:beta1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.0:beta2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.0:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.0:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.10:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.10:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.10:rc3:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.10:rc4:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.12:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.13:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.14:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.14:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.2:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.2:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.2:rc3:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.4:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.6:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.6:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.7:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.8:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.1.9:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:ruby_on_rails:4.1.14.1:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* CVE-2016-2203,0.0,,0.29571,The management console on Symantec Messaging Gateway (SMG) Appliance devices before 10.6.1 allows local users to discover an encrypted AD password by leveraging certain read privileges.,2016-04-22,Metasploit,cpe:2.3:a:symantec:messaging_gateway:10.6.0:patch3:*:*:*:*:*:*;cpe:2.3:a:symantec:messaging_gateway:10.6.0:patch5:*:*:*:*:*:*;cpe:2.3:a:symantec:messaging_gateway:10.6.0:patch7:*:*:*:*:*:* CVE-2016-2296,0.0,,0.75312,"Meteocontrol WEB'log Basic 100, Light, Pro, and Pro Unlimited does not require authentication for ""post-admin"" login pages, which allows remote attackers to obtain sensitive information or modify data via unspecified vectors.",2016-05-14,Metasploit,cpe:2.3:a:meteocontrol:web\'log_basic_100:-:*:*:*:*:*:*:*;cpe:2.3:a:meteocontrol:web\'log_light:-:*:*:*:*:*:*:*;cpe:2.3:a:meteocontrol:web\'log_pro:-:*:*:*:*:*:*:*;cpe:2.3:a:meteocontrol:web\'log_pro_unlimited:-:*:*:*:*:*:*:* CVE-2016-2298,0.0,,0.73028,"Meteocontrol WEB'log Basic 100, Light, Pro, and Pro Unlimited allows remote attackers to obtain sensitive cleartext information via unspecified vectors.",2016-05-14,Metasploit,cpe:2.3:a:meteocontrol:web\'log_basic_100:-:*:*:*:*:*:*:*;cpe:2.3:a:meteocontrol:web\'log_light:-:*:*:*:*:*:*:*;cpe:2.3:a:meteocontrol:web\'log_pro:-:*:*:*:*:*:*:*;cpe:2.3:a:meteocontrol:web\'log_pro_unlimited:-:*:*:*:*:*:*:* CVE-2016-2386,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.44333,"SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka SAP Security Note 2101079.",2016-02-16,CISA,cpe:2.3:a:sap:netweaver_application_server_java:7.40:*:*:*:*:*:*:* CVE-2016-2388,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.4794,"The Universal Worklist Configuration in SAP NetWeaver AS JAVA 7.4 allows remote attackers to obtain sensitive user information via a crafted HTTP request, aka SAP Security Note 2256846.",2016-02-16,CISA,cpe:2.3:a:sap:netweaver_application_server_java:*:*:*:*:*:*:*:* CVE-2016-2389,0.0,,0.7326,"Directory traversal vulnerability in the GetFileList function in the SAP Manufacturing Integration and Intelligence (xMII) component 15.0 for SAP NetWeaver 7.4 allows remote attackers to read arbitrary files via a .. (dot dot) in the Path parameter to /Catalog, aka SAP Security Note 2230978.",2016-02-16,Nuclei,cpe:2.3:a:sap:netweaver:7.40:*:*:*:*:*:*:* CVE-2016-2555,0.0,,0.7874,SQL injection vulnerability in include/lib/mysql_connect.inc.php in ATutor 2.2.1 allows remote attackers to execute arbitrary SQL commands via the searchFriends function to friends.inc.php.,2017-04-13,Metasploit,cpe:2.3:a:atutor:atutor:2.2.1:*:*:*:*:*:*:* CVE-2016-2776,0.0,,0.90734,"buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.",2016-09-28,Metasploit,cpe:2.3:a:isc:bind:*:p3:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.3:p4:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.11.0:a1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.11.0:a2:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.11.0:a3:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.11.0:b1:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.11.0:b2:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.11.0:b3:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.11.0:rc1:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.31:*:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:10.0:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*;cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*;cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*;cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:* CVE-2016-3081,0.0,,0.94036,"Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via method: prefix, related to chained expressions.",2016-04-26,Metasploit/Nuclei,cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:siebel_e-billing:7.1:*:*:*:*:*:*:* CVE-2016-3087,0.0,,0.86541,"Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin.",2016-06-07,Metasploit,cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:* CVE-2016-3088,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9429,The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.,2016-06-01,Metasploit/Nuclei/CISA,cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:* CVE-2016-3213,0.0,,0.78311,"The Web Proxy Auto Discovery (WPAD) protocol implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold and 1511, and Internet Explorer 9 through 11 has an improper fallback mechanism, which allows remote attackers to gain privileges via NetBIOS name responses, aka ""WPAD Elevation of Privilege Vulnerability.""",2016-06-16,Metasploit,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* CVE-2016-3225,0.0,,0.22288,"The SMB server component in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application that forwards an authentication request to an unintended service, aka ""Windows SMB Server Elevation of Privilege Vulnerability.""",2016-06-16,Metasploit,cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* CVE-2016-3235,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.82095,"Microsoft Visio 2007 SP3, Visio 2010 SP2, Visio 2013 SP1, Visio 2016, Visio Viewer 2007 SP3, and Visio Viewer 2010 mishandle library loading, which allows local users to gain privileges via a crafted application, aka ""Microsoft Office OLE DLL Side Loading Vulnerability.""",2016-06-16,Metasploit/CISA,cpe:2.3:a:microsoft:visio:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:visio:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:visio:2013:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:visio:2016:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:visio_viewer:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:visio_viewer:2010:*:*:*:*:*:*:* CVE-2016-3236,0.0,,0.78002,"The Web Proxy Auto Discovery (WPAD) protocol implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 mishandles proxy discovery, which allows remote attackers to redirect network traffic via unspecified vectors, aka ""Windows WPAD Proxy Discovery Elevation of Privilege Vulnerability.""",2016-06-16,Metasploit,cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* CVE-2016-3298,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,0.27734,"Microsoft Internet Explorer 9 through 11 and the Internet Messaging API in Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote attackers to determine the existence of arbitrary files via a crafted web site, aka ""Internet Explorer Information Disclosure Vulnerability.""",2016-10-14,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2016-3309,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.53849,"The kernel-mode drivers in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka ""Win32k Elevation of Privilege Vulnerability,"" a different vulnerability than CVE-2016-3308, CVE-2016-3310, and CVE-2016-3311.",2016-08-09,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2016-3321,0.0,,0.29814,"Microsoft Internet Explorer 10 and 11 load different files for attempts to open a file:// URL depending on whether the file exists, which allows local users to enumerate files via vectors involving a file:// URL and an HTML5 sandbox iframe, aka ""Internet Explorer Information Disclosure Vulnerability.""",2016-08-09,Metasploit,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:* CVE-2016-3351,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,0.45632,"Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to obtain sensitive information via a crafted web site, aka ""Microsoft Browser Information Disclosure Vulnerability.""",2016-09-14,CISA,cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2016-3393,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.29859,"Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to execute arbitrary code via a crafted web site, aka ""Windows Graphics Component RCE Vulnerability.""",2016-10-14,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2016-3427,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93752,"Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.",2016-04-21,CISA,cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*;cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*;cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*;cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*;cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*;cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*;cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*;cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*;cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*;cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*;cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*;cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*;cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*;cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*;cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:* CVE-2016-3510,0.0,,0.94011,"Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to WLS Core Components, a different vulnerability than CVE-2016-3586.",2016-07-21,Metasploit/Nuclei,cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.0.0:*:*:*:*:*:*:* CVE-2016-3643,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.0446,"SolarWinds Virtualization Manager 6.3.1 and earlier allow local users to gain privileges by leveraging a misconfiguration of sudo, as demonstrated by ""sudo cat /etc/passwd.""",2016-06-17,CISA,cpe:2.3:a:solarwinds:virtualization_manager:*:*:*:*:*:*:*:* CVE-2016-3714,8.4,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93749,"The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka ""ImageTragick.""",2016-05-05,Metasploit/CISA,cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*;cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*;cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:* CVE-2016-3715,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,0.79798,The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.,2016-05-05,CISA,cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*;cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*;cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*;cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*;cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*;cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:* CVE-2016-3718,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,0.79254,The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image.,2016-05-05,CISA,cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*;cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*;cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*;cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*;cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*;cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:* CVE-2016-3976,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.81466,"Directory traversal vulnerability in SAP NetWeaver AS Java 7.1 through 7.5 allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the fileName parameter to CrashFileDownloadServlet, aka SAP Security Note 2234971.",2016-04-07,CISA,cpe:2.3:a:sap:netweaver_application_server_java:*:*:*:*:*:*:*:* CVE-2016-3978,0.0,,0.05549,"The Web User Interface (WebUI) in FortiOS 5.0.x before 5.0.13, 5.2.x before 5.2.3, and 5.4.x before 5.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or cross-site scripting (XSS) attacks via the ""redirect"" parameter to ""login.""",2016-04-08,Nuclei,cpe:2.3:o:fortinet:fortios:5.0.0:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.10:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.11:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.12:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.1:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.2:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.3:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.4:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.5:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.6:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.7:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.8:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.0.9:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.2.0:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.2.1:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.2.2:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.4:*:*:*:*:*:*:* CVE-2016-4010,0.0,,0.87063,Magento CE and EE before 2.0.6 allows remote attackers to conduct PHP objection injection attacks and execute arbitrary PHP code via crafted serialized shopping cart data.,2017-01-23,Metasploit,cpe:2.3:a:magento:magento:*:*:*:*:community:*:*:*;cpe:2.3:a:magento:magento:*:*:*:*:enterprise:*:*:* CVE-2016-4117,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92777,"Adobe Flash Player 21.0.0.226 and earlier allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in May 2016.",2016-05-11,Metasploit/CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:* CVE-2016-4171,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.24517,"Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in June 2016.",2016-06-16,CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:* CVE-2016-4437,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94303,"Apache Shiro before 1.2.5, when a cipher key has not been configured for the ""remember me"" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.",2016-06-07,Metasploit/Nuclei/CISA,cpe:2.3:a:apache:aurora:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:shiro:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:fuse:1.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_middleware_text-only_advisories:1.0:*:*:*:*:middleware:*:* CVE-2016-4523,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.60192,The WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via unspecified vectors.,2016-06-09,CISA,cpe:2.3:a:trihedral:vtscada:*:*:*:*:*:*:*:* CVE-2016-4557,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.15042,"The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.",2016-05-23,Metasploit,cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* CVE-2016-4655,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,0.8245,The kernel in Apple iOS before 9.3.5 allows attackers to obtain sensitive information from memory via a crafted app.,2016-08-25,Metasploit/CISA,cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:iphone_os:10.0:*:*:*:*:*:*:* CVE-2016-4656,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.76221,The kernel in Apple iOS before 9.3.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.,2016-08-25,Metasploit/CISA,cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* CVE-2016-4657,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.81461,WebKit in Apple iOS before 9.3.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.,2016-08-25,Metasploit/CISA,cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* CVE-2016-4669,0.0,,0.33691,"An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the ""Kernel"" component. It allows local users to execute arbitrary code in a privileged context or cause a denial of service (MIG code mishandling and system crash) via unspecified vectors.",2017-02-20,Metasploit,cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* CVE-2016-4975,0.0,,0.70805,"Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the ""Location"" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).",2018-08-14,Nuclei,cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.31:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:* CVE-2016-4977,0.0,,0.94093,"When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.",2017-05-25,Nuclei,cpe:2.3:a:pivotal:spring_security_oauth:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:pivotal:spring_security_oauth:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:pivotal:spring_security_oauth:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:pivotal:spring_security_oauth:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:pivotal:spring_security_oauth:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:pivotal:spring_security_oauth:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:pivotal:spring_security_oauth:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:pivotal:spring_security_oauth:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:pivotal:spring_security_oauth:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:pivotal:spring_security_oauth:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:pivotal:spring_security_oauth:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:pivotal:spring_security_oauth:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:pivotal:spring_security_oauth:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:pivotal:spring_security_oauth:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:pivotal:spring_security_oauth:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:pivotal:spring_security_oauth:2.0.9:*:*:*:*:*:*:* CVE-2016-4997,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.05222,The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.,2016-07-03,Metasploit,cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*;cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:* CVE-2016-4998,0.0,,0.00922,The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.,2016-07-03,Metasploit,cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:* CVE-2016-5195,7.0,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,0.94249,"Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka ""Dirty COW.""",2016-11-10,CISA,cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:hci_storage_nodes:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_unified_manager_for_clustered_data_ontap:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_aus:6.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_aus:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_long_life:5.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_long_life:5.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_tus:6.5:*:*:*:*:*:*:* CVE-2016-5198,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.69403,"V8 in Google Chrome prior to 54.0.2840.90 for Linux, and 54.0.2840.85 for Android, and 54.0.2840.87 for Windows and Mac included incorrect optimisation assumptions, which allowed a remote attacker to perform arbitrary read/write operations, leading to code execution, via a crafted HTML page.",2017-01-19,CISA,cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2016-5330,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.25479,"Untrusted search path vulnerability in the HGFS (aka Shared Folders) feature in VMware Tools 10.0.5 in VMware ESXi 5.0 through 6.0, VMware Workstation Pro 12.1.x before 12.1.1, VMware Workstation Player 12.1.x before 12.1.1, and VMware Fusion 8.1.x before 8.1.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory.",2016-08-08,Metasploit,cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*;cpe:2.3:a:vmware:tools:*:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation_player:*:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:*:*:*:*:*:*:*:* CVE-2016-5425,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.14472,"The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.",2016-10-13,Metasploit,cpe:2.3:a:apache:tomcat:-:*:*:*:*:*:*:*;cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*;cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2016-5649,0.0,,0.75112,"A vulnerability is in the 'BSW_cxttongr.htm' page of the Netgear DGN2200, version DGN2200-V1.0.0.50_7.0.50, and DGND3700, version DGND3700-V1.0.0.17_1.0.17, which can allow a remote attacker to access this page without any authentication. When processed, it exposes the admin password in clear text before it gets redirected to absw_vfysucc.cgia. An attacker can use this password to gain administrator access to the targeted router's web interface.",2018-07-24,Nuclei,cpe:2.3:h:netgear:dgn2200:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:dgnd3700:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:dgn2200_firmware:1.0.0.50_7.0.50:*:*:*:*:*:*:*;cpe:2.3:o:netgear:dgnd3700_firmware:1.0.0.17_1.0.17:*:*:*:*:*:*:* CVE-2016-5674,0.0,,0.89376,"__debugging_center_utils___.php in NUUO NVRmini 2 1.7.5 through 3.0.0, NUUO NVRsolo 1.7.5 through 3.0.0, and NETGEAR ReadyNAS Surveillance 1.1.1 through 1.4.1 allows remote attackers to execute arbitrary PHP code via the log parameter.",2016-08-31,Metasploit/Nuclei,cpe:2.3:a:netgear:readynas_surveillance:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.3.2.14:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.4.2:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_2:1.7.5:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_2:1.7.6:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_2:2.0.0:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_2:2.2.1:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_2:3.0.0:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:1.75:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.0.0:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.0.1:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.1.5:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.2.2:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.3.1.20:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.3.7.10:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.3.7.9:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.3.9.6:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.3:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:3.0.0:*:*:*:*:*:*:* CVE-2016-5675,0.0,,0.73057,"handle_daylightsaving.php in NUUO NVRmini 2 1.7.5 through 3.0.0, NUUO NVRsolo 1.0.0 through 3.0.0, NUUO Crystal 2.2.1 through 3.2.0, and NETGEAR ReadyNAS Surveillance 1.1.1 through 1.4.1 allows remote attackers to execute arbitrary PHP code via the NTPServer parameter.",2016-08-31,Metasploit,cpe:2.3:a:netgear:readynas_surveillance:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.3.2.14:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:nuuo:crystal:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:nuuo:crystal:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:nuuo:crystal:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:nuuo:crystal:3.2.0:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_2:1.7.5:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_2:1.7.6:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_2:2.0.0:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_2:2.2.1:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_2:3.0.0:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:1.0.0:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:1.0.1:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:1.1.0.117:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:1.1.0:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:1.1.1:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:1.1.2:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:1.2.0:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:1.3.0:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:1.75:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.0.0:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.0.1:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.1.5:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.2.2:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.3.1.20:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.3.7.10:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.3.7.9:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.3.9.6:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.3:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:3.0.0:*:*:*:*:*:*:* CVE-2016-5676,0.0,,0.76234,"cgi-bin/cgi_system in NUUO NVRmini 2 1.7.5 through 2.x, NUUO NVRsolo 1.7.5 through 2.x, and NETGEAR ReadyNAS Surveillance 1.1.1 through 1.4.1 allows remote attackers to reset the administrator password via a cmd=loaddefconfig action.",2016-08-31,Metasploit,cpe:2.3:a:netgear:readynas_surveillance:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.3.2.14:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:netgear:readynas_surveillance:1.4.2:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_2:1.7.5:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_2:1.7.6:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_2:2.0.0:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_2:2.2.1:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_2:3.0.0:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:1.75:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.0.0:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.0.1:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.1.5:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.2.2:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.3.1.20:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.3.7.10:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.3.7.9:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.3.9.6:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:2.3:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrsolo:3.0.0:*:*:*:*:*:*:* CVE-2016-5734,0.0,,0.72916,"phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation.",2016-07-03,Metasploit,cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.10:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.11:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.12:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.13:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.14:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.15:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.1:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.2:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.3:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.4:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.5:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.6:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.7:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.8:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.9:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.1:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.6:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.7:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.8:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.9:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.0:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.10:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.11:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.12:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13.1:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.14.1:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.1:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.2:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.3:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.4:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.5:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.6:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.2:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.3:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.4:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.5:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6.1:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.7:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.8:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.9:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:alpha1:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:rc1:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:rc2:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.1:*:*:*:*:*:*:*;cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.2:*:*:*:*:*:*:* CVE-2016-5810,0.0,,0.25401,upAdminPg.asp in Advantech WebAccess before 8.1_20160519 allows remote authenticated administrators to obtain sensitive password information via unspecified vectors.,2017-05-02,Metasploit,cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:* CVE-2016-6195,0.0,,0.8643,"SQL injection vulnerability in forumrunner/includes/moderation.php in vBulletin before 4.2.2 Patch Level 5 and 4.2.3 before Patch Level 1 allows remote attackers to execute arbitrary SQL commands via the postids parameter to forumrunner/request.php, as exploited in the wild in July 2016.",2016-08-30,Nuclei,cpe:2.3:a:vbulletin:vbulletin:*:patch_level_4:*:*:*:*:*:*;cpe:2.3:a:vbulletin:vbulletin:4.2.3:*:*:*:*:*:*:* CVE-2016-6210,0.0,,0.92487,"sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.",2017-02-13,Metasploit,cpe:2.3:a:openbsd:openssh:*:p2:*:*:*:*:*:* CVE-2016-6253,0.0,,0.07271,"mail.local in NetBSD versions 6.0 through 6.0.6, 6.1 through 6.1.5, and 7.0 allows local users to change ownership of or append data to arbitrary files on the target system via a symlink attack on the user mailbox.",2017-01-20,Metasploit,cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:7.0:*:*:*:*:*:*:* CVE-2016-6267,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.72519,"SnmpUtils in Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) spare_Community, (2) spare_AllowGroupIP, or (3) spare_AllowGroupNetmask parameter to admin_notification.php.",2017-01-30,Metasploit,cpe:2.3:a:trendmicro:smart_protection_server:2.5:*:*:*:*:*:*:*;cpe:2.3:a:trendmicro:smart_protection_server:2.6:*:*:*:*:*:*:*;cpe:2.3:a:trendmicro:smart_protection_server:3.0:*:*:*:*:*:*:* CVE-2016-6277,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.94278,"NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.",2016-12-14,Metasploit/Nuclei/CISA,cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:* CVE-2016-6366,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.9098,"Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON.",2016-08-18,Metasploit/CISA,cpe:2.3:h:cisco:7604:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:7606-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:7609-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:7613-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5500-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5500:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5500_csc-ssm:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6500-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6500:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6509-neb-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6513:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_501:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_506:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_506e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_515:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_515e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_520:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_525:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_535:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:asa_1000v_cloud_firewall_software:8.7.1.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:asa_1000v_cloud_firewall_software:8.7.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:pix_firewall_software:-:*:*:*:*:*:*:* CVE-2016-6367,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.23087,"Cisco Adaptive Security Appliance (ASA) Software before 8.4(1) on ASA 5500, ASA 5500-X, PIX, and FWSM devices allows local users to gain privileges via invalid CLI commands, aka Bug ID CSCtu74257 or EPICBANANA.",2016-08-18,CISA,cpe:2.3:h:cisco:asa_5500-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5500:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5500_csc-ssm:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:firewall_services_module:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_501:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_506:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_506e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_515:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_515e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_520:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_525:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:pix_firewall_535:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* CVE-2016-6415,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.92948,"The server IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.6, IOS XE through 3.18S, IOS XR 4.3.x and 5.0.x through 5.2.x, and PIX before 7.0 allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request, aka Bug IDs CSCvb29204 and CSCvb36055 or BENIGNCERTAIN.",2016-09-19,Metasploit/CISA,cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:* CVE-2016-6433,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.72601,"The Threat Management Console in Cisco Firepower Management Center 5.2.0 through 6.0.1 allows remote authenticated users to execute arbitrary commands via crafted web-application parameters, aka Bug ID CSCva30872.",2016-10-06,Metasploit,cpe:2.3:a:cisco:secure_firewall_management_center:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.4:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.5:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.6:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.4:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.6:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:* CVE-2016-6435,0.0,,0.55026,"The web console in Cisco Firepower Management Center 6.0.1 allows remote authenticated users to read arbitrary files via crafted parameters, aka Bug ID CSCva30376.",2016-10-06,Metasploit,cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:* CVE-2016-6563,0.0,,0.87965,"Processing malformed SOAP messages when performing the HNAP Login action causes a buffer overflow in the stack in some D-Link DIR routers. The vulnerable XML fields within the SOAP body are: Action, Username, LoginPassword, and Captcha. The following products are affected: DIR-823, DIR-822, DIR-818L(W), DIR-895L, DIR-890L, DIR-885L, DIR-880L, DIR-868L, and DIR-850L.",2018-07-13,Metasploit,cpe:2.3:h:dlink:dir-818l\(w\):-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-822:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-823:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-868l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-880l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-885l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-890l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-895l:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-818l\(w\)_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-822_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-823_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-850l_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-868l_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-880l_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-885l_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-890l_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-895l_firmware:-:*:*:*:*:*:*:* CVE-2016-6600,0.0,,0.90636,Directory traversal vulnerability in the file upload functionality in ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to upload and execute arbitrary JSP files via a .. (dot dot) in the fileName parameter to servlets/FileUploadServlet.,2017-01-23,Metasploit,cpe:2.3:a:zohocorp:webnms_framework:5.2:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:webnms_framework:5.2:sp1:*:*:*:*:*:* CVE-2016-6601,0.0,,0.9278,Directory traversal vulnerability in the file download functionality in ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to read arbitrary files via a .. (dot dot) in the fileName parameter to servlets/FetchFile.,2017-01-23,Metasploit/Nuclei,cpe:2.3:a:zohocorp:webnms_framework:5.2:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:webnms_framework:5.2:sp1:*:*:*:*:*:* CVE-2016-6602,0.0,,0.47774,"ZOHO WebNMS Framework 5.2 and 5.2 SP1 use a weak obfuscation algorithm to store passwords, which allows context-dependent attackers to obtain cleartext passwords by leveraging access to WEB-INF/conf/securitydbData.xml. NOTE: this issue can be combined with CVE-2016-6601 for a remote exploit.",2017-01-23,Metasploit,cpe:2.3:a:zohocorp:webnms_framework:5.2:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:webnms_framework:5.2:sp1:*:*:*:*:*:* CVE-2016-6883,0.0,,0.69768,MatrixSSL before 3.8.3 configured with RSA Cipher Suites allows remote attackers to obtain sensitive information via a Bleichenbacher variant attack.,2017-03-03,Metasploit,cpe:2.3:a:matrixssl:matrixssl:*:*:*:*:*:*:*:* CVE-2016-6897,0.0,,0.30259,"Cross-site request forgery (CSRF) vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 allows remote attackers to hijack the authentication of subscribers for /dev/random read operations by leveraging a late call to the check_ajax_referer function, a related issue to CVE-2016-6896.",2017-01-18,Metasploit,cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* CVE-2016-7193,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.57854,"Microsoft Word 2007 SP2, Office 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted RTF document, aka ""Microsoft Office Memory Corruption Vulnerability.""",2016-10-14,CISA,cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2011:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:word:2013:sp1:*:*:-:*:*:*;cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*;cpe:2.3:a:microsoft:word:2016:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:word_viewer:-:*:*:*:*:*:*:* CVE-2016-7200,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.89395,"The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka ""Scripting Engine Memory Corruption Vulnerability,"" a different vulnerability than CVE-2016-7201, CVE-2016-7202, CVE-2016-7203, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243.",2016-11-10,CISA,cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:*:*:x64:* CVE-2016-7201,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.90142,"The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka ""Scripting Engine Memory Corruption Vulnerability,"" a different vulnerability than CVE-2016-7200, CVE-2016-7202, CVE-2016-7203, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243.",2016-11-10,CISA,cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* CVE-2016-7255,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.89359,"The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka ""Win32k Elevation of Privilege Vulnerability.""",2016-11-10,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2016-7256,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.59042,"atmfd.dll in the Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka ""Open Type Font Remote Code Execution Vulnerability.""",2016-11-10,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2016-7262,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.84404,"Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, and Excel Viewer allow user-assisted remote attackers to execute arbitrary commands via a crafted cell that is mishandled upon a click, aka ""Microsoft Office Security Feature Bypass Vulnerability.""",2016-12-20,CISA,cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2013:sp1:*:*:-:*:*:*;cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*;cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel_viewer:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:* CVE-2016-7456,0.0,,0.82117,"VMware vSphere Data Protection (VDP) 5.5.x though 6.1.x has an SSH private key with a publicly known password, which makes it easier for remote attackers to obtain login access via an SSH session.",2016-12-29,Metasploit,cpe:2.3:a:vmware:vsphere_data_protection:5.5.10:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:5.5.11:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:5.5.5:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:5.5.6:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:5.5.7:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:5.5.8:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:5.5.9:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:5.8.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:5.8.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:5.8.2:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:5.8.3:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:5.8.4:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:6.1.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:6.1.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:6.1.2:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vsphere_data_protection:6.1.3:*:*:*:*:*:*:* CVE-2016-7547,0.0,,0.89182,A command execution flaw on the Trend Micro Threat Discovery Appliance 2.6.1062r1 exists with the timezone parameter in the admin_sys_time.cgi interface.,2017-04-12,Metasploit,cpe:2.3:a:trendmicro:threat_discovery_appliance:2.6.1062:r1:*:*:*:*:*:* CVE-2016-7552,0.0,,0.92979,"On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS.",2017-04-12,Metasploit/Nuclei,cpe:2.3:a:trendmicro:threat_discovery_appliance:2.6.1062:r1:*:*:*:*:*:* CVE-2016-7834,0.0,,0.39457,"SONY SNC-CH115, SNC-CH120, SNC-CH160, SNC-CH220, SNC-CH260, SNC-DH120, SNC-DH120T, SNC-DH160, SNC-DH220, SNC-DH220T, SNC-DH260, SNC-EB520, SNC-EM520, SNC-EM521, SNC-ZB550, SNC-ZM550, SNC-ZM551, SNC-EP550, SNC-EP580, SNC-ER550, SNC-ER550C, SNC-ER580, SNC-ER585, SNC-ER585H, SNC-ZP550, SNC-ZR550, SNC-EP520, SNC-EP521, SNC-ER520, SNC-ER521, SNC-ER521C network cameras with firmware before Ver.1.86.00 and SONY SNC-CX600, SNC-CX600W, SNC-EB600, SNC-EB600B, SNC-EB602R, SNC-EB630, SNC-EB630B, SNC-EB632R, SNC-EM600, SNC-EM601, SNC-EM602R, SNC-EM602RC, SNC-EM630, SNC-EM631, SNC-EM632R, SNC-EM632RC, SNC-VB600, SNC-VB600B, SNC-VB600B5, SNC-VB630, SNC-VB6305, SNC-VB6307, SNC-VB632D, SNC-VB635, SNC-VM600, SNC-VM600B, SNC-VM600B5, SNC-VM601, SNC-VM601B, SNC-VM602R, SNC-VM630, SNC-VM6305, SNC-VM6307, SNC-VM631, SNC-VM632R, SNC-WR600, SNC-WR602, SNC-WR602C, SNC-WR630, SNC-WR632, SNC-WR632C, SNC-XM631, SNC-XM632, SNC-XM636, SNC-XM637, SNC-VB600L, SNC-VM600L, SNC-XM631L, SNC-WR602CL network cameras with firmware before Ver.2.7.2 are prone to sensitive information disclosure. This may allow an attacker on the same local network segment to login to the device with administrative privileges and perform operations on the device.",2017-04-13,Nuclei,cpe:2.3:h:sony:snc-ch115:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-ch120:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-ch160:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-ch220:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-ch260:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-cx600:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-cx600w:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-dh120:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-dh120t:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-dh160:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-dh220:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-dh220t:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-dh260:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-eb520:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-eb600:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-eb600b:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-eb602r:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-eb630:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-eb630b:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-eb632r:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-em520:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-em521:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-em600:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-em601:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-em602r:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-em602rc:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-em630:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-em631:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-em632r:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-em632rc:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-ep520:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-ep521:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-ep550:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-ep580:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-er520:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-er521:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-er521c:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-er550:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-er550c:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-er580:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-er585:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-er585h:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vb600:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vb600b5:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vb600b:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vb600l:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vb6305:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vb6307:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vb630:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vb632d:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vb635:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vm600:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vm600b5:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vm600b:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vm600l:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vm601:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vm601b:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vm602r:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vm6305:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vm6307:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vm630:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vm631:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-vm632r:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-wr600:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-wr602:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-wr602c:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-wr602cl:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-wr630:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-wr632:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-wr632c:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-xm631:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-xm631l:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-xm632:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-xm636:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-xm637:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-zb550:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-zm550:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-zm551:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-zp550:-:*:*:*:*:*:*:*;cpe:2.3:h:sony:snc-zr550:-:*:*:*:*:*:*:*;cpe:2.3:o:sony:snc_series_firmware:*:*:*:*:*:*:*:* CVE-2016-7855,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.46889,"Use-after-free vulnerability in Adobe Flash Player before 23.0.0.205 on Windows and OS X and before 11.2.202.643 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in October 2016.",2016-11-01,CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:linux:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2016-7892,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.23358,"Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the TextField class. Successful exploitation could lead to arbitrary code execution.",2016-12-15,CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*;cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* CVE-2016-7976,0.0,,0.7492,The PS Interpreter in Ghostscript 9.18 and 9.20 allows remote attackers to execute arbitrary code via crafted userparams.,2017-08-07,Metasploit,cpe:2.3:a:artifex:ghostscript:9.18:*:*:*:*:*:*:*;cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:* CVE-2016-7981,0.0,,0.52223,Cross-site scripting (XSS) vulnerability in valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the var_url parameter in a valider_xml action.,2017-01-18,Nuclei,cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:* CVE-2016-8527,0.0,,0.56315,"Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to a reflected cross-site scripting (XSS). The vulnerability is present in the VisualRF component of AirWave. By exploiting this vulnerability, an attacker who can trick a logged-in AirWave administrative user into clicking a link could obtain sensitive information, such as session cookies or passwords. The vulnerability requires that an administrative users click on the malicious link while currently logged into AirWave in the same browser.",2018-08-06,Nuclei,cpe:2.3:a:hp:airwave:*:*:*:*:*:*:*:* CVE-2016-8562,7.5,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,0.14581,"A vulnerability has been identified in SIMATIC CP 1543-1 (All versions < V2.0.28), SIPLUS NET CP 1543-1 (All versions < V2.0.28). Under special conditions it was possible to write SNMP variables on port 161/udp which should be read-only and should only be configured with TIA-Portal. A write to these variables could reduce the availability or cause a denial-of-service.",2016-11-18,CISA,cpe:2.3:h:siemens:simatic_cp_1543-1:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:*:*:*:*:*:*:*:* CVE-2016-8581,0.0,,0.68151,A persistent XSS vulnerability exists in the User-Agent header of the login process of AlienVault OSSIM and USM before 5.3.2 that allows an attacker to steal session IDs of logged in users when the current sessions are viewed by an administrator.,2016-10-28,Metasploit,cpe:2.3:a:alienvault:open_source_security_information_and_event_management:*:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:unified_security_management:*:*:*:*:*:*:*:* CVE-2016-8582,0.0,,0.80548,A vulnerability exists in gauge.php of AlienVault OSSIM and USM before 5.3.2 that allows an attacker to execute an arbitrary SQL query and retrieve database information or read local system files via MySQL's LOAD_FILE.,2016-10-28,Metasploit,cpe:2.3:a:alienvault:open_source_security_information_and_event_management:*:*:*:*:*:*:*:*;cpe:2.3:a:alienvault:unified_security_management:*:*:*:*:*:*:*:* CVE-2016-8655,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.40468,"Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.",2016-12-08,Metasploit,cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* CVE-2016-8706,0.0,,0.68629,"An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.",2017-01-06,Nuclei,cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:* CVE-2016-8735,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93901,"Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.",2017-04-06,Nuclei/CISA,cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:-:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*;cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*;cpe:2.3:a:oracle:agile_engineering_data_management:6.1.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:agile_engineering_data_management:6.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:agile_engineering_data_management:6.2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:agile_plm:9.3.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_application_session_controller:3.7.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_application_session_controller:3.8.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_interactive_session_recorder:6.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_interactive_session_recorder:6.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_interactive_session_recorder:6.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:micros_relate_crm_software:10.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:micros_relate_crm_software:11.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.5.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.6.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.7.7:*:*:*:*:*:*:*;cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.8.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.8.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_convenience_and_fuel_pos_software:2.1.132:*:*:*:*:*:*:*;cpe:2.3:a:oracle:transportation_management:6.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:transportation_management:6.3.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:transportation_management:6.3.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:transportation_management:6.3.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:transportation_management:6.3.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:transportation_management:6.3.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:transportation_management:6.3.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:transportation_management:6.3.7:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* CVE-2016-8869,0.0,,0.93416,The register method in the UsersModelRegistration class in controllers/user.php in the Users component in Joomla! before 3.6.4 allows remote attackers to gain privileges by leveraging incorrect use of unfiltered data when registering on a site.,2016-11-04,Metasploit,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2016-8870,0.0,,0.91965,"The register method in the UsersModelRegistration class in controllers/user.php in the Users component in Joomla! before 3.6.4, when registration has been disabled, allows remote attackers to create user accounts by leveraging failure to check the Allow User Registration configuration setting.",2016-11-04,Metasploit,cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* CVE-2016-9079,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.84964,"A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerability affects Firefox < 50.0.2, Firefox ESR < 45.5.1, and Thunderbird < 45.5.1.",2018-06-11,Metasploit/CISA,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:a:torproject:tor:-:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2016-9299,0.0,,0.69026,"The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.",2017-01-12,Metasploit/Nuclei,cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*;cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*;cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:* CVE-2016-9361,0.0,,0.50809,"An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating.",2017-02-13,Metasploit,cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*;cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*;cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:* CVE-2016-9563,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,0.58435,"BC-BMT-BPM-DSK in SAP NetWeaver AS JAVA 7.5 allows remote authenticated users to conduct XML External Entity (XXE) attacks via the sap.com~tc~bpem~him~uwlconn~provider~web/bpemuwlconn URI, aka SAP Security Note 2296909.",2016-11-23,CISA,cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:* CVE-2016-9722,0.0,,0.31976,IBM QRadar 7.2 and 7.3 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 119737.,2018-01-10,Metasploit,cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.0:*:*:*:*:*:*:* CVE-2017-0001,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.14476,"The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka ""Windows GDI Elevation of Privilege Vulnerability."" This vulnerability is different from those described in CVE-2017-0005, CVE-2017-0025, and CVE-2017-0047.",2017-03-17,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2017-0005,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.09784,"The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka ""Windows GDI Elevation of Privilege Vulnerability."" This vulnerability is different from those described in CVE-2017-0001, CVE-2017-0025, and CVE-2017-0047.",2017-03-17,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2017-0022,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,0.32641,"Microsoft XML Core Services (MSXML) in Windows 10 Gold, 1511, and 1607; Windows 7 SP1; Windows 8.1; Windows RT 8.1; Windows Server 2008 SP2 and R2 SP1; Windows Server 2012 Gold and R2; Windows Server 2016; and Windows Vista SP2 improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site, aka ""Microsoft XML Information Disclosure Vulnerability.""",2017-03-17,CISA,cpe:2.3:a:microsoft:xml_core_services:3.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2017-0037,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92162,"Microsoft Internet Explorer 10 and 11 and Microsoft Edge have a type confusion issue in the Layout::MultiColumnBoxBuilder::HandleColumnBreakOnColumnSpanningElement function in mshtml.dll, which allows remote attackers to execute arbitrary code via vectors involving a crafted Cascading Style Sheets (CSS) token sequence and crafted JavaScript code that operates on a TH element.",2017-02-26,CISA,cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* CVE-2017-0059,4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N,0.81278,"Microsoft Internet Explorer 9 through 11 allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka ""Internet Explorer Information Disclosure Vulnerability."" This vulnerability is different from those described in CVE-2017-0008 and CVE-2017-0009.",2017-03-17,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2017-0101,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.6193,"The kernel-mode drivers in Transaction Manager in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka ""Windows Elevation of Privilege Vulnerability.""",2017-03-17,CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2017-0143,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.94022,"The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka ""Windows SMB Remote Code Execution Vulnerability."" This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.",2017-03-17,Metasploit/CISA,cpe:2.3:a:microsoft:server_message_block:1.0:*:*:*:*:*:*:*;cpe:2.3:a:philips:intellispace_portal:7.0:*:*:*:*:*:*:*;cpe:2.3:a:philips:intellispace_portal:8.0:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_p300:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_p500:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_sc2000:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_x700:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:syngo_sc2000:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:tissue_preparation_system:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:versant_kpcr_molecular_system:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:versant_kpcr_sample_prep:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:*;cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:*;cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:* CVE-2017-0144,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.94318,"The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka ""Windows SMB Remote Code Execution Vulnerability."" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.",2017-03-17,Metasploit/CISA,cpe:2.3:a:microsoft:server_message_block:1.0:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_p300:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_p500:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_sc2000:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_x700:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:syngo_sc2000:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:tissue_preparation_system:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:versant_kpcr_molecular_system:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:versant_kpcr_sample_prep:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:*;cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:*;cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:* CVE-2017-0145,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.93519,"The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka ""Windows SMB Remote Code Execution Vulnerability."" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0146, and CVE-2017-0148.",2017-03-17,Metasploit/CISA,cpe:2.3:a:microsoft:server_message_block:1.0:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_p300:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_p500:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_sc2000:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_x700:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:syngo_sc2000:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:tissue_preparation_system:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:versant_kpcr_molecular_system:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:versant_kpcr_sample_prep:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:*;cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:*;cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:* CVE-2017-0146,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.9373,"The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka ""Windows SMB Remote Code Execution Vulnerability."" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0148.",2017-03-17,Metasploit/CISA,cpe:2.3:a:microsoft:server_message_block:1.0:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_p300:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_p500:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_sc2000:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_x700:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:syngo_sc2000:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:tissue_preparation_system:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:versant_kpcr_molecular_system:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:versant_kpcr_sample_prep:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:*;cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:*;cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:* CVE-2017-0147,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.92418,"The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted packets, aka ""Windows SMB Information Disclosure Vulnerability.""",2017-03-17,Metasploit/CISA,cpe:2.3:h:siemens:acuson_p300:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_p500:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_sc2000:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_x700:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:syngo_sc2000:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:tissue_preparation_system:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:versant_kpcr_molecular_system:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:versant_kpcr_sample_prep:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:*;cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:*;cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:* CVE-2017-0148,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94167,"The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka ""Windows SMB Remote Code Execution Vulnerability."" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0146.",2017-03-17,Metasploit/CISA,cpe:2.3:a:microsoft:server_message_block:1.0:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_p300:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_p500:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_sc2000:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:acuson_x700:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:syngo_sc2000:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:tissue_preparation_system:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:versant_kpcr_molecular_system:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:versant_kpcr_sample_prep:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:*;cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:*;cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:*;cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:* CVE-2017-0149,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.29481,"Microsoft Internet Explorer 9 through 11 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka ""Internet Explorer Memory Corruption Vulnerability."" This vulnerability is different from those described in CVE-2017-0018 and CVE-2017-0037.",2017-03-17,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2017-0199,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.94366,"Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka ""Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API.""",2017-04-12,Metasploit/CISA,cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2016:-:*:*:*:*:*:*;cpe:2.3:a:philips:intellispace_portal:7.0:*:*:*:*:*:*:*;cpe:2.3:a:philips:intellispace_portal:8.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* CVE-2017-0210,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.20762,"An elevation of privilege vulnerability exists when Internet Explorer does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain, aka ""Internet Explorer Elevation of Privilege Vulnerability.""",2017-04-12,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* CVE-2017-0213,7.3,CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H,0.91167,"Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation privilege vulnerability when an attacker runs a specially crafted application, aka ""Windows COM Elevation of Privilege Vulnerability"". This CVE ID is unique from CVE-2017-0214.",2017-05-12,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* CVE-2017-0222,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.55657,"A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka ""Internet Explorer Memory Corruption Vulnerability."" This CVE ID is unique from CVE-2017-0226.",2017-05-12,CISA,cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* CVE-2017-0261,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.92068,"Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka ""Office Remote Code Execution Vulnerability"". This CVE ID is unique from CVE-2017-0262 and CVE-2017-0281.",2017-05-12,CISA,cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:* CVE-2017-0262,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.64739,"Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka ""Office Remote Code Execution Vulnerability"". This CVE ID is unique from CVE-2017-0261 and CVE-2017-0281.",2017-05-12,CISA,cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:* CVE-2017-0263,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.17937,"The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka ""Win32k Elevation of Privilege Vulnerability.""",2017-05-12,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* CVE-2017-0358,0.0,,0.10449,"Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.",2018-04-13,Metasploit,cpe:2.3:a:tuxera:ntfs-3g:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* CVE-2017-0372,0.0,,0.59378,"Parameters injection in the SyntaxHighlight extension of Mediawiki before 1.23.16, 1.27.3 and 1.28.2 might result in multiple vulnerabilities.",2018-04-13,Metasploit,cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.27.0:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.27.1:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.27.2:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.28.0:*:*:*:*:*:*:*;cpe:2.3:a:mediawiki:mediawiki:1.28.1:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2017-0929,0.0,,0.9251,DNN (aka DotNetNuke) before 9.2.0 suffers from a Server-Side Request Forgery (SSRF) vulnerability in the DnnImageHandler class. Attackers may be able to access information about internal network resources.,2018-07-03,Nuclei,cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:* CVE-2017-1000028,0.0,,0.9387,"Oracle, GlassFish Server Open Source Edition 4.1 is vulnerable to both authenticated and unauthenticated Directory Traversal vulnerability, that can be exploited by issuing a specially crafted HTTP GET request.",2017-07-17,Metasploit/Nuclei,cpe:2.3:a:oracle:glassfish_server:4.1:*:*:*:open_source:*:*:* CVE-2017-1000029,0.0,,0.73502,"Oracle, GlassFish Server Open Source Edition 3.0.1 (build 22) is vulnerable to Local File Inclusion vulnerability, that makes it possible to include arbitrary files on the server, this vulnerability can be exploited without any prior authentication.",2017-07-17,Nuclei,cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:open_source:*:*:* CVE-2017-1000083,0.0,,0.79825,"backend/comics/comics-document.c (aka the comic book backend) in GNOME Evince before 3.24.1 allows remote attackers to execute arbitrary commands via a .cbt file that is a TAR archive containing a filename beginning with a ""--"" command-line option substring, as demonstrated by a --checkpoint-action=exec=bash at the beginning of the filename.",2017-09-05,Metasploit,cpe:2.3:a:gnome:evince:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2017-1000112,7.0,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,0.83642,"Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 (""[IPv4/IPv6]: UFO Scatter-gather approach"") on Oct 18 2005.",2017-10-05,Metasploit,cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* CVE-2017-1000117,0.0,,0.70588,"A malicious third-party can give a crafted ""ssh://..."" URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running ""git clone --recurse-submodules"" to trigger the vulnerability.",2017-10-05,Metasploit,cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.10.0:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.10.0:rc0:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.10.0:rc1:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.10.0:rc2:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.10.1:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.10.2:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.10.3:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.11.0:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.11.0:rc0:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.11.0:rc1:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.11.0:rc2:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.11.0:rc3:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.11.1:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.11.2:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.12.0:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.12.0:rc0:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.12.0:rc1:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.12.0:rc2:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.12.1:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.12.2:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.12.3:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.13.0:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.13.0:rc0:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.13.0:rc1:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.13.0:rc2:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.13.1:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.13.2:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.13.3:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.13.4:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.14.0:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.14.0:rc0:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.14.0:rc1:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.8.0:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.8.0:rc0:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.8.0:rc1:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.8.0:rc2:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.8.0:rc3:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.8.1:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.8.2:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.8.3:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.8.4:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.8.5:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.9.0:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.9.0:rc0:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.9.0:rc1:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.9.0:rc2:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.9.1:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.9.2:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.9.3:*:*:*:*:*:*:*;cpe:2.3:a:git-scm:git:2.9.4:*:*:*:*:*:*:* CVE-2017-1000119,0.0,,0.74411,October CMS build 412 is vulnerable to PHP code execution in the file upload functionality resulting in site compromise and possibly other applications on the server.,2017-10-05,Metasploit,cpe:2.3:a:octobercms:october:1.0.412:*:*:*:*:*:*:* CVE-2017-1000163,0.0,,0.01793,"The Phoenix Framework versions 1.0.0 through 1.0.4, 1.1.0 through 1.1.6, 1.2.0, 1.2.2 and 1.3.0-rc.0 are vulnerable to unvalidated URL redirection, which may result in phishing or social engineering attacks.",2017-11-17,Nuclei,cpe:2.3:a:phoenixframework:phoenix:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:phoenixframework:phoenix:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:phoenixframework:phoenix:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:phoenixframework:phoenix:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:phoenixframework:phoenix:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:phoenixframework:phoenix:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:phoenixframework:phoenix:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:phoenixframework:phoenix:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:phoenixframework:phoenix:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:phoenixframework:phoenix:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:phoenixframework:phoenix:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:phoenixframework:phoenix:1.1.6:*:*:*:*:*:*:*;cpe:2.3:a:phoenixframework:phoenix:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:phoenixframework:phoenix:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:phoenixframework:phoenix:1.3.0-rc.0:*:*:*:*:*:*:* CVE-2017-1000170,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.90044,jqueryFileTree 2.1.5 and older Directory Traversal,2017-11-17,Nuclei,cpe:2.3:a:jqueryfiletree_project:jqueryfiletree:*:*:*:*:*:*:*:* CVE-2017-1000253,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.55565,"Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the ""gap"" between the stack and the binary.",2017-10-05,CISA,cpe:2.3:o:centos:centos:6.0:*:*:*:*:*:*:*;cpe:2.3:o:centos:centos:6.1:*:*:*:*:*:*:*;cpe:2.3:o:centos:centos:6.2:*:*:*:*:*:*:*;cpe:2.3:o:centos:centos:6.3:*:*:*:*:*:*:*;cpe:2.3:o:centos:centos:6.4:*:*:*:*:*:*:*;cpe:2.3:o:centos:centos:6.5:*:*:*:*:*:*:*;cpe:2.3:o:centos:centos:6.6:*:*:*:*:*:*:*;cpe:2.3:o:centos:centos:6.7:*:*:*:*:*:*:*;cpe:2.3:o:centos:centos:6.8:*:*:*:*:*:*:*;cpe:2.3:o:centos:centos:6.9:*:*:*:*:*:*:*;cpe:2.3:o:centos:centos:7.1406:*:*:*:*:*:*:*;cpe:2.3:o:centos:centos:7.1503:*:*:*:*:*:*:*;cpe:2.3:o:centos:centos:7.1511:*:*:*:*:*:*:*;cpe:2.3:o:centos:centos:7.1611:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.8:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.9:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.3:*:*:*:*:*:*:* CVE-2017-1000353,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94508,"Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.",2018-01-29,Metasploit/CISA,cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*;cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*;cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:* CVE-2017-1000364,0.0,,0.02114,"An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be ""jumped"" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).",2017-06-19,Metasploit,cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* CVE-2017-1000385,0.0,,0.83282,The Erlang otp TLS server answers with different TLS alerts to different error types in the RSA PKCS #1 1.5 padding. This allows an attacker to decrypt content or sign messages with the server's private key (this is a variation of the Bleichenbacher attack).,2017-12-12,Metasploit,cpe:2.3:a:erlang:erlang\/otp:18.3.4.7:*:*:*:*:*:*:*;cpe:2.3:a:erlang:erlang\/otp:19.3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:erlang:erlang\/otp:20.1.7:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2017-1000479,0.0,,0.18994,"pfSense versions 2.4.1 and lower are vulnerable to clickjacking attacks in the CSRF error page resulting in privileged execution of arbitrary code, because the error detection occurs before an X-Frame-Options header is set. This is fixed in 2.4.2-RELEASE. OPNsense, a 2015 fork of pfSense, was not vulnerable since version 16.1.16 released on June 06, 2016. The unprotected web form was removed from the code during an internal security audit under ""possibly insecure"" suspicions.",2018-01-03,Metasploit,cpe:2.3:a:netgate:pfsense:*:*:*:*:*:*:*:*;cpe:2.3:a:opnsense_project:opnsense:*:*:*:*:*:*:*:* CVE-2017-1000486,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94035,Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution,2018-01-03,Metasploit/Nuclei/CISA,cpe:2.3:a:primetek:primefaces:*:*:*:*:*:*:*:* CVE-2017-1001000,0.0,,0.80371,"The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.",2017-04-03,Metasploit,cpe:2.3:a:wordpress:wordpress:4.7.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:4.7.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:4.7:*:*:*:*:*:*:* CVE-2017-10075,0.0,,0.8913,"Vulnerability in the Oracle WebCenter Content component of Oracle Fusion Middleware (subcomponent: Content Server). Supported versions that are affected are 11.1.1.9.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Content. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Content, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Content accessible data as well as unauthorized update, insert or delete access to some of Oracle WebCenter Content accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).",2017-08-08,Nuclei,cpe:2.3:a:oracle:webcenter_content:11.1.1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:webcenter_content:12.2.1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:webcenter_content:12.2.1.2.0:*:*:*:*:*:*:* CVE-2017-10271,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.94439,"Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",2017-10-19,Metasploit/Nuclei/CISA,cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.2.0:*:*:*:*:*:*:* CVE-2017-1092,0.0,,0.80359,"IBM Informix Open Admin Tool 11.5, 11.7, and 12.1 could allow an unauthorized user to execute arbitrary code as system admin on Windows servers. IBM X-Force ID: 120390.",2017-05-22,Metasploit,cpe:2.3:a:ibm:informix_open_admin_tool:11.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:informix_open_admin_tool:11.7:*:*:*:*:*:*:*;cpe:2.3:a:ibm:informix_open_admin_tool:12.1:*:*:*:*:*:*:* CVE-2017-10974,0.0,,0.91231,Yaws 1.91 allows Unauthenticated Remote File Disclosure via HTTP Directory Traversal with /%5C../ to port 8080. NOTE: this CVE is only about use of an initial /%5C sequence to defeat traversal protection mechanisms; the initial /%5C sequence was apparently not discussed in earlier research on this product.,2017-07-07,Nuclei,cpe:2.3:a:yaws:yaws:1.91:*:*:*:*:*:*:* CVE-2017-11165,0.0,,0.92044,dataTaker DT80 dEX 1.50.012 allows remote attackers to obtain sensitive credential and configuration information via a direct request for the /services/getFile.cmd?userfile=config.xml URI.,2017-07-12,Nuclei,cpe:2.3:h:datataker:dt80_dex:-:*:*:*:*:*:*:*;cpe:2.3:o:datataker:dt80_dex_firmware:1.50.012:*:*:*:*:*:*:* CVE-2017-1129,0.0,,0.68501,"IBM Notes 8.5 and 9.0 is vulnerable to a denial of service. If a user is persuaded to click on a malicious link, it could cause the Notes client to hang and have to be restarted. IBM X-Force ID: 121370.",2017-09-05,Metasploit,cpe:2.3:a:ibm:expeditor:6.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:expeditor:6.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:expeditor:6.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.1.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.3.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:9.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:9.0.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:9.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:9.0.1.8:*:*:*:*:*:*:* CVE-2017-11292,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.1115,"Adobe Flash Player version 27.0.0.159 and earlier has a flawed bytecode verification procedure, which allows for an untrusted value to be used in the calculation of an array index. This can lead to type confusion, and successful exploitation could lead to arbitrary code execution.",2017-10-22,CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*;cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2017-1130,0.0,,0.6548,"IBM Notes 8.5 and 9.0 is vulnerable to a denial of service. If a user is persuaded to click on a malicious link, it would open up many file select dialog boxes which would cause the client hang and have to be restarted. IBM X-Force ID: 121371.",2017-09-05,Metasploit,cpe:2.3:a:ibm:inotes:8.5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.1.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:8.5.3.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:9.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:9.0.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:9.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:inotes:9.0.1.8:*:*:*:*:*:*:* CVE-2017-11317,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92235,"Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX before R1 2017 and R2 before R2 2017 SP2 uses weak RadAsyncUpload encryption, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.",2017-08-23,Metasploit/CISA,cpe:2.3:a:telerik:ui_for_asp.net_ajax:*:*:*:*:*:*:*:*;cpe:2.3:a:telerik:ui_for_asp.net_ajax:2017.2.503:*:*:*:*:*:*:*;cpe:2.3:a:telerik:ui_for_asp.net_ajax:2017.2.621:*:*:*:*:*:*:* CVE-2017-11357,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93419,"Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.",2017-08-23,CISA,cpe:2.3:a:telerik:ui_for_asp.net_ajax:*:*:*:*:*:*:*:* CVE-2017-11394,0.0,,0.78466,Proxy command injection vulnerability in Trend Micro OfficeScan 11 and XG (12) allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the T parameter within Proxy.php. Formerly ZDI-CAN-4544.,2017-08-03,Metasploit,cpe:2.3:a:trendmicro:officescan:11.0:sp1:*:*:*:*:*:*;cpe:2.3:a:trendmicro:officescan:12.0:*:*:*:*:*:*:* CVE-2017-11444,0.0,,0.78593,Subrion CMS before 4.1.5.10 has a SQL injection vulnerability in /front/search.php via the $_GET array.,2017-07-19,Nuclei,cpe:2.3:a:intelliants:subrion_cms:*:*:*:*:*:*:*:* CVE-2017-11467,0.0,,0.74861,"OrientDB through 2.2.22 does not enforce privilege requirements during ""where"" or ""fetchplan"" or ""order by"" use, which allows remote attackers to execute arbitrary OS commands via a crafted request.",2017-07-20,Metasploit,cpe:2.3:a:orientdb:orientdb:*:*:*:*:*:*:*:* CVE-2017-11512,0.0,,0.8678,The ManageEngine ServiceDesk 9.3.9328 is vulnerable to arbitrary file downloads due to improper restrictions of the pathname used in the name parameter for the download-snapshot URL. An unauthenticated remote attacker can use this vulnerability to download arbitrary files.,2017-11-08,Nuclei,cpe:2.3:a:manageengine:servicedesk:9.3.9328:*:*:*:*:*:*:* CVE-2017-11517,0.0,,0.3702,Stack-based buffer overflow in GCoreServer.exe in the server in Geutebrueck Gcore 1.3.8.42 and 1.4.2.37 allows remote attackers to execute arbitrary code via a long URI in a GET request.,2017-07-21,Metasploit,cpe:2.3:a:geutebrueck:gcore:1.3.8.42:*:*:*:*:*:*:*;cpe:2.3:a:geutebrueck:gcore:1.4.2.37:*:*:*:*:*:*:* CVE-2017-11586,0.0,,0.06568,"dayrui FineCms 5.0.9 has URL Redirector Abuse via the url parameter in a sync action, related to controllers/Weixin.php.",2017-07-24,Nuclei,cpe:2.3:a:finecms:finecms:*:*:*:*:*:*:*:* CVE-2017-11610,0.0,,0.93788,"The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.",2017-08-23,Metasploit/Nuclei,cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*;cpe:2.3:a:supervisord:supervisor:*:*:*:*:*:*:*:*;cpe:2.3:a:supervisord:supervisor:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:supervisord:supervisor:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:supervisord:supervisor:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:supervisord:supervisor:3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:supervisord:supervisor:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:supervisord:supervisor:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:supervisord:supervisor:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:supervisord:supervisor:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:supervisord:supervisor:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:supervisord:supervisor:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:supervisord:supervisor:3.3.2:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:* CVE-2017-11629,0.0,,0.00588,dayrui FineCms through 5.0.10 has Cross Site Scripting (XSS) in controllers/api.php via the function parameter in a c=api&m=data2 request.,2017-07-26,Nuclei,cpe:2.3:a:finecms:finecms:*:*:*:*:*:*:*:* CVE-2017-11774,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.82853,"Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka ""Microsoft Outlook Security Feature Bypass Vulnerability.""",2017-10-13,CISA,cpe:2.3:a:microsoft:outlook:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:-:*:*:*;cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:rt:*:*:*;cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:*:* CVE-2017-11826,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.89654,"Microsoft Office 2010, SharePoint Enterprise Server 2010, SharePoint Server 2010, Web Applications, Office Web Apps Server 2010 and 2013, Word Viewer, Word 2007, 2010, 2013 and 2016, Word Automation Services, and Office Online Server allow remote code execution when the software fails to properly handle objects in memory.",2017-10-13,CISA,cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_online_server:2016:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_apps_server:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2013:sp1:*:*:-:*:*:*;cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*;cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:* CVE-2017-11882,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.94384,"Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka ""Microsoft Office Memory Corruption Vulnerability"". This CVE ID is unique from CVE-2017-11884.",2017-11-15,Metasploit/CISA,cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:* CVE-2017-12138,0.0,,0.13119,XOOPS Core 2.5.8 has a stored URL redirect bypass vulnerability in /modules/profile/index.php because of the URL filter.,2017-08-02,Nuclei,cpe:2.3:a:xoops:xoops:2.5.8:*:*:*:*:*:*:* CVE-2017-12149,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94313,"In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.",2017-10-04,Metasploit/Nuclei/CISA,cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.2:*:*:*:*:*:*:* CVE-2017-12231,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.14049,"A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper translation of H.323 messages that use the Registration, Admission, and Status (RAS) protocol and are sent to an affected device via IPv4 packets. An attacker could exploit this vulnerability by sending a crafted H.323 RAS packet through an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are configured to use an application layer gateway with NAT (NAT ALG) for H.323 RAS messages. By default, a NAT ALG is enabled for H.323 RAS messages. Cisco Bug IDs: CSCvc57217.",2017-09-29,CISA,cpe:2.3:h:cisco:1100-4g\/6g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100_terminal_services_gateways:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8208:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8212:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8218:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-40:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-80:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-cl:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-esp100-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-esp200-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002_fixed_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9000:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9000v:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_900:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-fs-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-fs-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:-:*;cpe:2.3:h:cisco:asr_901s-2sg-f-ah:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901s-2sg-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901s-3sg-f-ah:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901s-3sg-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901s-4sg-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_902u:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_903:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_907:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_914:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-10sz-pd:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-10sz-pd_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-12cz-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-12cz-a_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-12cz-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-12cz-d_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-12sz-im:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-12sz-im_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-24sz-im:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-24sz-im_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-24sz-m:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-24sz-m_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-24tz-m:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-24tz-m_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-4sz-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-4sz-a_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-4sz-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-4sz-d_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920u-12sz-im:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9902:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9903:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9920:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uz-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uz-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fq:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9500h:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9600x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800_embedded_wireless_controller:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* CVE-2017-12232,6.5,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.02135,"A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.",2017-09-29,CISA,cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4g\/6g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4321\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4321\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4321\/k9_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4331\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4331\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4331\/k9_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4351\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4351\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4351\/k9_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:829_industrial_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:829_industrial_integrated_services_routers:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:829_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:860vae-w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:861_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:861w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:866vae_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:867_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:867vae_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:871_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:880-voice_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:880_3g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:881-cube_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:881_3g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:881_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:881w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:886_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:886va-cube_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:886va-w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:886va_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:886vag_3g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:887_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:887v_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:887va-cube_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:887va-w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:887va_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:887vag_3g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:887vam-w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:887vamg_3g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:888-cube_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:888_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:888e-cube_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:888e_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:888eg_3g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:888w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:891-24x_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:891_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:891w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:892_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:892f-cube_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:892w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-esp100-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-esp200-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000_:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* CVE-2017-12233,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.13006,"Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuz95334.",2017-09-29,CISA,cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4g\/6g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100_terminal_services_gateways:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1111-4pwe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1111-8pwb:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1111x-8p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1113-8plteeawe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1113-8pmwe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1113-8pwe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1116-4plteeawe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1116-4pwe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1117-4plteeawe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1117-4pmlteeawe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1117-4pmwe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1117-4pwe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1120:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie9300:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:esr-6300-con-k9:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:esr-6300-ncp-k9:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* CVE-2017-12234,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.13006,"Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc43709.",2017-09-29,CISA,cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4g\/6g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100_terminal_services_gateways:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1111-4pwe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1111-8pwb:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1111x-8p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1113-8plteeawe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1113-8pmwe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1113-8pwe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1116-4plteeawe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1116-4pwe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1117-4plteeawe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1117-4pmlteeawe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1117-4pmwe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1117-4pwe:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1120:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie9300:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:esr-6300-con-k9:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:esr-6300-ncp-k9:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* CVE-2017-12235,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.10011,"A vulnerability in the implementation of the PROFINET Discovery and Configuration Protocol (PN-DCP) for Cisco IOS 12.2 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper parsing of ingress PN-DCP Identify Request packets destined to an affected device. An attacker could exploit this vulnerability by sending a crafted PN-DCP Identify Request packet to an affected device and then continuing to send normal PN-DCP Identify Request packets to the device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are configured to process PROFINET messages. Beginning with Cisco IOS Software Release 12.2(52)SE, PROFINET is enabled by default on all the base switch module and expansion-unit Ethernet ports. Cisco Bug IDs: CSCuz47179.",2017-09-29,CISA,cpe:2.3:h:cisco:industrial_ethernet_2000_16ptc-g-e_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_16ptc-g-l_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_16ptc-g-nx_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_16t67-b_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_16t67p-g-e_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_16tc-g-e_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_16tc-g-l_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_16tc-g-n_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_16tc-g-x_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_16tc-l_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_24t67-b_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_4s-ts-g-b_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_4s-ts-g-l_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_4t-b_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_4t-g-b_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_4t-g-l_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_4t-l_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_4ts-b_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_4ts-g-b_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_4ts-g-l_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_4ts-l_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_8t67-b_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_8t67p-g-e_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_8tc-b_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_8tc-g-b_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_8tc-g-e_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_8tc-g-l_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_8tc-g-n_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_8tc-l_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:industrial_ethernet_2000_series_firmware:15.2\(5.4.32i\)e2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* CVE-2017-12237,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.11219,"A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.",2017-09-29,CISA,cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4g\/6g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4321\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4321\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4321\/k9_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4331\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4331\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4331\/k9_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4351\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4351\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4351\/k9_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8208:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8212:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8218:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-40:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-80:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-cl:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uz-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uz-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fq:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9400_supervisor_engine-1:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9500h:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9600x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie9300:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:cbr-8_converged_broadband_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:esr-6300-con-k9:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:esr-6300-ncp-k9:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:esr6300:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* CVE-2017-12238,6.5,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.00836,"A vulnerability in the Virtual Private LAN Service (VPLS) code of Cisco IOS 15.0 through 15.4 for Cisco Catalyst 6800 Series Switches could allow an unauthenticated, adjacent attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a denial of service (DoS) condition. The vulnerability is due to a memory management issue in the affected software. An attacker could exploit this vulnerability by creating a large number of VPLS-generated MAC entries in the MAC address table of an affected device. A successful exploit could allow the attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a DoS condition. This vulnerability affects Cisco Catalyst 6800 Series Switches that are running a vulnerable release of Cisco IOS Software and have a Cisco C6800-16P10G or C6800-16P10G-XL line card in use with Supervisor Engine 6T. To be vulnerable, the device must also be configured with VPLS and the C6800-16P10G or C6800-16P10G-XL line card needs to be the core-facing MPLS interfaces. Cisco Bug IDs: CSCva61927.",2017-09-29,CISA,cpe:2.3:h:cisco:c6800-16p10g-xl:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:c6800-16p10g:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6000:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\(1a\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\(1a\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\(1a\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\(1a\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\(2\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\(1a\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6500-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6500:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\(1a\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\(1a\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\(1a\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\(1a\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\(2\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\(1a\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6509-neb-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_6513:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* CVE-2017-12240,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.24938,"The DHCP relay subsystem of Cisco IOS 12.2 through 15.6 and Cisco IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code and gain full control of an affected system. The attacker could also cause an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a buffer overflow condition in the DHCP relay subsystem of the affected software. An attacker could exploit this vulnerability by sending a crafted DHCP Version 4 (DHCPv4) packet to an affected system. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a DoS condition. Cisco Bug IDs: CSCsm45390, CSCuw77959.",2017-09-29,CISA,cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8208:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8212:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8218:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-40:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-80:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-cl:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-esp100-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-esp200-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9000:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9000v:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_900:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-fs-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-fs-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901s-2sg-f-ah:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901s-2sg-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901s-3sg-f-ah:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901s-3sg-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901s-4sg-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_902u:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_903:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_907:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_914:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-10sz-pd:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-10sz-pd_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-10sz-pd_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-12cz-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-12cz-a_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-12cz-a_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-12cz-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-12cz-d_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-12cz-d_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-12sz-im:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-12sz-im_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-12sz-im_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-24sz-im:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-24sz-im_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-24sz-im_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-24sz-m:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-24sz-m_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-24sz-m_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-24tz-m:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-24tz-m_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-24tz-m_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-4sz-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-4sz-a_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-4sz-a_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-4sz-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-4sz-d_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920-4sz-d_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_920u-12sz-im:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9902:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9903:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9920:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uz-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uz-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fq:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* CVE-2017-12319,5.9,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H,0.01269,"A vulnerability in the Border Gateway Protocol (BGP) over an Ethernet Virtual Private Network (EVPN) for Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial of service (DoS) condition, or potentially corrupt the BGP routing table, which could result in network instability. The vulnerability exists due to changes in the implementation of the BGP MPLS-Based Ethernet VPN RFC (RFC 7432) draft between IOS XE software releases. When the BGP Inclusive Multicast Ethernet Tag Route or BGP EVPN MAC/IP Advertisement Route update packet is received, it could be possible that the IP address length field is miscalculated. An attacker could exploit this vulnerability by sending a crafted BGP packet to an affected device after the BGP session was established. An exploit could allow the attacker to cause the affected device to reload or corrupt the BGP routing table; either outcome would result in a DoS. The vulnerability may be triggered when the router receives a crafted BGP message from a peer on an existing BGP session. This vulnerability affects all releases of Cisco IOS XE Software prior to software release 16.3 that support BGP EVPN configurations. If the device is not configured for EVPN, it is not vulnerable. Cisco Bug IDs: CSCui67191, CSCvg52875.",2018-03-27,CISA,cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4g\/6g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4321\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4321\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4321\/k9_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4331\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4331\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4331\/k9_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4351\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4351\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4351\/k9_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8208:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8212:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8218:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-40:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-80:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-cl:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:9800-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-esp100-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-esp200-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_900:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-fs-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-fs-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901s-2sg-f-ah:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901s-2sg-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901s-3sg-f-ah:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901s-3sg-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_901s-4sg-f-d:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:asr_902u:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9400_supervisor_engine-1:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9500h:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9600x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:esr-6300-con-k9:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:esr-6300-ncp-k9:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:network_convergence_system_520:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* CVE-2017-12373,0.0,,0.61959,"A vulnerability in the TLS protocol implementation of legacy Cisco ASA 5500 Series (ASA 5505, 5510, 5520, 5540, and 5550) devices could allow an unauthenticated, remote attacker to access sensitive information, aka a Return of Bleichenbacher's Oracle Threat (ROBOT) attack. An attacker could iteratively query a server running a vulnerable TLS stack implementation to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions. Cisco Bug IDs: CSCvg97652.",2017-12-15,Metasploit,cpe:2.3:h:cisco:adaptive_security_appliance_5505:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:adaptive_security_appliance_5510:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:adaptive_security_appliance_5520:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:adaptive_security_appliance_5540:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:adaptive_security_appliance_5550:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_5505_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_5510_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_5520_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_5540_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_5550_firmware:-:*:*:*:*:*:*:* CVE-2017-12477,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.74852,"It was discovered that the bpserverd proprietary protocol in Unitrends Backup (UB) before 10.0.0, as invoked through xinetd, has an issue in which its authentication can be bypassed. A remote attacker could use this issue to execute arbitrary commands with root privilege on the target system.",2017-08-07,Metasploit,cpe:2.3:a:kaseya:unitrends_backup:*:*:*:*:*:*:*:* CVE-2017-12478,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.71756,It was discovered that the api/storage web interface in Unitrends Backup (UB) before 10.0.0 has an issue in which one of its input parameters was not validated. A remote attacker could use this flaw to bypass authentication and execute arbitrary commands with root privilege on the target system.,2017-08-07,Metasploit,cpe:2.3:a:kaseya:unitrends_backup:*:*:*:*:*:*:*:* CVE-2017-12542,0.0,,0.94232,A authentication bypass and execution of code vulnerability in HPE Integrated Lights-out 4 (iLO 4) version prior to 2.53 was found.,2018-02-15,Metasploit/Nuclei,cpe:2.3:h:hp:integrated_lights-out_4:-:*:*:*:*:*:*:*;cpe:2.3:o:hp:integrated_lights-out_4_firmware:*:*:*:*:*:*:*:* CVE-2017-12544,0.0,,0.72051,A cross-site scripting vulnerability in HPE System Management Homepage for Windows and Linux version prior to v7.6.1 was found.,2018-02-15,Nuclei,cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2017-12557,0.0,,0.86375,A Remote Code Execution vulnerability in HPE intelligent Management Center (iMC) PLAT version IMC Plat 7.3 E0504P2 and earlier was found.,2018-02-15,Metasploit,cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p2:*:*:*:*:*:* CVE-2017-12583,0.0,,0.03229,DokuWiki through 2017-02-19b has XSS in the at parameter (aka the DATE_AT variable) to doku.php.,2017-08-06,Nuclei,cpe:2.3:a:dokuwiki:dokuwiki:*:*:*:*:*:*:*:* CVE-2017-12611,0.0,,0.94295,"In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack.",2017-09-20,Nuclei,cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.20.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.24.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.31:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.32:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.33:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.3.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.5.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.5.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.5.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.5.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.5.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.5.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.5.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.5:beta1:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.5:beta2:*:*:*:*:*:*;cpe:2.3:a:apache:struts:2.5:beta3:*:*:*:*:*:* CVE-2017-12615,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9436,When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.,2017-09-19,Nuclei/CISA,cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*;cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*;cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*;cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_web_server_text-only_advisories:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.7_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2017-12617,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94372,"When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.",2017-10-04,Metasploit/Nuclei/CISA,cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*;cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*;cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*;cpe:2.3:a:oracle:agile_plm:9.3.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:agile_plm:9.3.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:agile_plm:9.3.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:endeca_information_discovery_integrator:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:endeca_information_discovery_integrator:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_for_mysql_database:12.1.0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fmw_platform:12.2.1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fmw_platform:12.2.1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:health_sciences_empirica_inspections:1.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:management_pack:11.2.1.0.13:*:*:*:*:goldengate:*:*;cpe:2.3:a:oracle:micros_lucas:2.9.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.5.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.6.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.8.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.8.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_advanced_inventory_planning:13.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_advanced_inventory_planning:13.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_advanced_inventory_planning:14.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_advanced_inventory_planning:15.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_back_office:14.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_back_office:14.1.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_central_office:14.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_central_office:14.1.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_convenience_and_fuel_pos_software:2.1.132:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_eftlink:1.1.124:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_eftlink:15.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_eftlink:16.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_insights:14.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_insights:14.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_insights:15.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_insights:16.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_invoice_matching:12.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_invoice_matching:13.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_invoice_matching:13.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_invoice_matching:13.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_invoice_matching:14.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_invoice_matching:14.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_invoice_matching:15.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_invoice_matching:16.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_broker:5.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_broker:5.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_broker:5.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_management_system:4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_management_system:4.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_management_system:4.7:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_management_system:5.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_point-of-service:14.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_point-of-service:14.1.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_price_management:12.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_price_management:13.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_price_management:13.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_price_management:13.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_price_management:14.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_price_management:14.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_price_management:15.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_price_management:16.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_returns_management:14.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_returns_management:14.1.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_returns_management:2.3.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_returns_management:2.4.9:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_store_inventory_management:12.0.12:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_store_inventory_management:13.0.7:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_store_inventory_management:13.1.9:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_store_inventory_management:13.2.9:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_store_inventory_management:14.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_store_inventory_management:14.1.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_store_inventory_management:15.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_store_inventory_management:16.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_xstore_point_of_service:6.0.11:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:transportation_management:6.3.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:transportation_management:6.3.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:transportation_management:6.3.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:transportation_management:6.3.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:transportation_management:6.3.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:transportation_management:6.3.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:transportation_management:6.3.7:*:*:*:*:*:*:*;cpe:2.3:a:oracle:tuxedo_system_and_applications_monitor:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:workload_manager:12.2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:redhat:fuse:1.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_web_server_text-only_advisories:-:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:netapp:element:-:*:*:*:*:vcenter_server:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2017-12629,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93891,"Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr.",2017-10-14,Nuclei,cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* CVE-2017-12635,0.0,,0.94098,"Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.",2017-11-14,Metasploit/Nuclei,cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:couchdb:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:couchdb:2.0.0:rc1:*:*:*:*:*:*;cpe:2.3:a:apache:couchdb:2.0.0:rc2:*:*:*:*:*:*;cpe:2.3:a:apache:couchdb:2.0.0:rc3:*:*:*:*:*:*;cpe:2.3:a:apache:couchdb:2.0.0:rc4:*:*:*:*:*:* CVE-2017-12636,0.0,,0.93483,"CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.",2017-11-14,Metasploit,cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:couchdb:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:couchdb:2.0.0:rc1:*:*:*:*:*:*;cpe:2.3:a:apache:couchdb:2.0.0:rc2:*:*:*:*:*:*;cpe:2.3:a:apache:couchdb:2.0.0:rc3:*:*:*:*:*:*;cpe:2.3:a:apache:couchdb:2.0.0:rc4:*:*:*:*:*:* CVE-2017-12637,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.93491,"Directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS in SAP NetWeaver Application Server Java 7.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the query string, as exploited in the wild in August 2017, aka SAP Security Note 2486657.",2017-08-07,Nuclei/CISA,cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:* CVE-2017-12794,0.0,,0.18768,"In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with ""DEBUG = True"" (which makes this page accessible) in your production settings.",2017-09-07,Nuclei,cpe:2.3:a:djangoproject:django:1.10.0:*:*:*:*:*:*:*;cpe:2.3:a:djangoproject:django:1.10.1:*:*:*:*:*:*:*;cpe:2.3:a:djangoproject:django:1.10.2:*:*:*:*:*:*:*;cpe:2.3:a:djangoproject:django:1.10.3:*:*:*:*:*:*:*;cpe:2.3:a:djangoproject:django:1.10.4:*:*:*:*:*:*:*;cpe:2.3:a:djangoproject:django:1.10.5:*:*:*:*:*:*:*;cpe:2.3:a:djangoproject:django:1.10.6:*:*:*:*:*:*:*;cpe:2.3:a:djangoproject:django:1.10.7:*:*:*:*:*:*:*;cpe:2.3:a:djangoproject:django:1.11.0:*:*:*:*:*:*:*;cpe:2.3:a:djangoproject:django:1.11.1:*:*:*:*:*:*:*;cpe:2.3:a:djangoproject:django:1.11.2:*:*:*:*:*:*:*;cpe:2.3:a:djangoproject:django:1.11.3:*:*:*:*:*:*:*;cpe:2.3:a:djangoproject:django:1.11.4:*:*:*:*:*:*:* CVE-2017-13067,0.0,,0.51069,QNAP has patched a remote code execution vulnerability affecting the QTS Media Library in all versions prior to QTS 4.2.6 build 20170905 and QTS 4.3.3.0299 build 20170901. This particular vulnerability allows a remote attacker to execute commands on a QNAP NAS using a transcoding service on port 9251. A remote user does not require any privileges to successfully execute an attack.,2017-09-14,Metasploit,cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:* CVE-2017-13098,0.0,,0.7563,"BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerability is referred to as ""ROBOT.""",2017-12-13,Metasploit,cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:* CVE-2017-13099,0.0,,0.70023,"wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as ""ROBOT.""",2017-12-13,Metasploit,cpe:2.3:a:arubanetworks:instant:*:*:*:*:*:*:*:*;cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*;cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*;cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:* CVE-2017-13156,0.0,,0.59668,"An elevation of privilege vulnerability in the Android system (art). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID A-64211847.",2017-12-06,Metasploit,cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*;cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*;cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*;cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*;cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*;cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*;cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:* CVE-2017-13696,0.0,,0.76925,"A buffer overflow vulnerability lies in the web server component of Dup Scout Enterprise 9.9.14, Disk Savvy Enterprise 9.9.14, Sync Breeze Enterprise 9.9.16, and Disk Pulse Enterprise 9.9.16 where an attacker can craft a malicious GET request and exploit the web server component. Successful exploitation of the software will allow an attacker to gain complete access to the system with NT AUTHORITY / SYSTEM level privileges. The vulnerability lies due to improper handling and sanitization of the incoming request.",2018-01-24,Metasploit,cpe:2.3:a:flexense:diskpulse:9.9.16:*:*:*:enterprise:*:*:*;cpe:2.3:a:flexense:disksavvy:9.9.14:*:*:*:enterprise:*:*:*;cpe:2.3:a:flexense:dupscout:9.9.14:*:*:*:enterprise:*:*:*;cpe:2.3:a:flexense:syncbreeze:9.9.16:*:*:*:enterprise:*:*:* CVE-2017-13861,0.0,,0.66435,"An issue was discovered in certain Apple products. iOS before 11.2 is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the ""IOSurface"" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.",2017-12-25,Metasploit,cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* CVE-2017-13872,0.0,,0.76664,"An issue was discovered in certain Apple products. macOS High Sierra before Security Update 2017-001 is affected. The issue involves the ""Directory Utility"" component. It allows attackers to obtain administrator access without a password via certain interactions involving entry of the root user name.",2017-11-29,Metasploit,cpe:2.3:o:apple:mac_os_x:10.13.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.13.1:*:*:*:*:*:*:* CVE-2017-14016,0.0,,0.19225,"A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. The application lacks proper validation of the length of user-supplied data prior to copying it to a stack-based buffer, which could allow an attacker to execute arbitrary code under the context of the process.",2017-11-06,Metasploit,cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:* CVE-2017-14117,0.0,,0.31907,"The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures an unauthenticated proxy service on WAN TCP port 49152, which allows remote attackers to establish arbitrary TCP connections to intranet hosts by sending \x2a\xce\x01 followed by other predictable values.",2017-09-03,Metasploit,cpe:2.3:h:commscope:arris_nvg589:-:*:*:*:*:*:*:*;cpe:2.3:h:commscope:arris_nvg599:-:*:*:*:*:*:*:*;cpe:2.3:o:att:u-verse_firmware:9.2.2h0d83:*:*:*:*:*:*:* CVE-2017-14135,0.0,,0.84699,enigma2-plugins/blob/master/webadmin/src/WebChilds/Script.py in the webadmin plugin for opendreambox 2.0.0 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the command parameter to the /script URI.,2017-09-04,Nuclei,cpe:2.3:a:dreambox:opendreambox:2.0:*:*:*:*:*:*:* CVE-2017-14143,0.0,,0.77447,"The getUserzoneCookie function in Kaltura before 13.2.0 uses a hardcoded cookie secret to validate cookie signatures, which allows remote attackers to bypass an intended protection mechanism and consequently conduct PHP object injection attacks and execute arbitrary PHP code via a crafted userzone cookie.",2017-09-19,Metasploit,cpe:2.3:a:kaltura:kaltura_server:*:*:*:*:*:*:*:* CVE-2017-14186,0.0,,0.04051,"A Cross-site Scripting (XSS) vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4 and below versions under SSL VPN web portal allows a remote user to inject arbitrary web script or HTML in the context of the victim's browser via the login redir parameter. An URL Redirection attack may also be feasible by injecting an external URL via the affected parameter.",2017-11-29,Nuclei,cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* CVE-2017-14524,0.0,,0.05987,Multiple open redirect vulnerabilities in OpenText Documentum Administrator 7.2.0180.0055 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a (1) URL in the startat parameter to xda/help/en/default.htm or (2) /%09/ (slash encoded horizontal tab slash) followed by a domain in the redirectUrl parameter to xda/component/virtuallinkconnect.,2017-09-28,Nuclei,cpe:2.3:a:opentext:documentum_administrator:7.2.0180.0055:*:*:*:*:*:*:*;cpe:2.3:a:opentext:documentum_webtop:6.8.0160.0073:*:*:*:*:*:*:* CVE-2017-14535,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.91276,trixbox 2.8.0.4 has OS command injection via shell metacharacters in the lang parameter to /maint/modules/home/index.php.,2018-02-16,Nuclei,cpe:2.3:a:netfortris:trixbox:2.8.0.4:*:*:*:*:*:*:* CVE-2017-14537,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,0.90749,trixbox 2.8.0.4 has path traversal via the xajaxargs array parameter to /maint/index.php?packages or the lang parameter to /maint/modules/home/index.php.,2018-02-16,Nuclei,cpe:2.3:a:netfortris:trixbox:2.8.0.4:*:*:*:*:*:*:* CVE-2017-14622,0.0,,0.00874,Multiple cross-site scripting (XSS) vulnerabilities in the 2kb Amazon Affiliates Store plugin before 2.1.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) page parameter or (2) kbAction parameter in the kbAmz page to wp-admin/admin.php.,2017-09-28,Nuclei,cpe:2.3:a:2kblater:2kb_amazon_affiliates_store:*:*:*:*:*:wordpress:*:* CVE-2017-14627,0.0,,0.50197,"Stack-based buffer overflows in CyberLink LabelPrint 2.5 allow remote attackers to execute arbitrary code via the (1) author (inside the INFORMATION tag), (2) name (inside the INFORMATION tag), (3) artist (inside the TRACK tag), or (4) default (inside the TEXT tag) parameter in an lpp project file.",2017-09-23,Metasploit,cpe:2.3:a:cyberlink:labelprint:2.5:*:*:*:*:*:*:* CVE-2017-14651,4.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N,0.09251,WSO2 Data Analytics Server 3.1.0 has XSS in carbon/resources/add_collection_ajaxprocessor.jsp via the collectionName or parentPath parameter.,2017-09-21,Nuclei,cpe:2.3:a:wso2:api_manager:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:app_manager:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:application_server:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:business_process_server:3.6.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:business_rules_server:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:complex_event_processor:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:dashboard_server:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:data_analytics_server:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:data_services_server:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:wso2:enterprise_integrator:6.1.1:*:*:*:*:*:*:*;cpe:2.3:a:wso2:enterprise_mobility_manager:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:governance_registry:5.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:iot_server:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:machine_learner:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:message_broker:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:storage_server:1.5.0:*:*:*:*:*:*:* CVE-2017-14706,0.0,,0.72371,"DenyAll WAF before 6.4.1 allows unauthenticated remote attackers to obtain authentication information by making a typeOf=debug request to /webservices/download/index.php, and then reading the iToken field in the reply. This affects DenyAll i-Suite LTS 5.5.0 through 5.5.12, i-Suite 5.6, Web Application Firewall 5.7, and Web Application Firewall 6.x before 6.4.1, with On Premises or AWS/Azure cloud deployments.",2017-09-22,Metasploit,cpe:2.3:a:denyall:i-suite:5.5.0:*:*:*:lts:*:*:*;cpe:2.3:a:denyall:i-suite:5.5.10:*:*:*:lts:*:*:*;cpe:2.3:a:denyall:i-suite:5.5.11:*:*:*:lts:*:*:*;cpe:2.3:a:denyall:i-suite:5.5.12:*:*:*:lts:*:*:*;cpe:2.3:a:denyall:i-suite:5.5.9:*:*:*:lts:*:*:*;cpe:2.3:a:denyall:i-suite:5.6.0:*:*:*:lts:*:*:*;cpe:2.3:a:denyall:web_application_firewall:5.7.0:*:*:*:*:*:*:*;cpe:2.3:a:denyall:web_application_firewall:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:denyall:web_application_firewall:6.1.0:*:*:*:*:*:*:*;cpe:2.3:a:denyall:web_application_firewall:6.2.0:*:*:*:*:*:*:*;cpe:2.3:a:denyall:web_application_firewall:6.3.0:*:*:*:*:*:*:*;cpe:2.3:a:denyall:web_application_firewall:6.4.0:*:*:*:*:*:*:* CVE-2017-14849,0.0,,0.90232,"Node.js 8.5.0 before 8.6.0 allows remote attackers to access unintended files, because a change to "".."" handling was incompatible with the pathname validation used by unspecified community modules.",2017-09-28,Nuclei,cpe:2.3:a:nodejs:node.js:8.5.0:*:*:*:*:*:*:* CVE-2017-14937,0.0,,0.05752,"The airbag detonation algorithm allows injury to passenger-car occupants via predictable Security Access (SA) data to the internal CAN bus (or the OBD connector). This affects the airbag control units (aka pyrotechnical control units or PCUs) of unspecified passenger vehicles manufactured in 2014 or later, when the ignition is on and the speed is less than 6 km/h. Specifically, there are only 256 possible key pairs, and authentication attempts have no rate limit. In addition, at least one manufacturer's interpretation of the ISO 26021 standard is that it must be possible to calculate the key directly (i.e., the other 255 key pairs must not be used). Exploitation would typically involve an attacker who has already gained access to the CAN bus, and sends a crafted Unified Diagnostic Service (UDS) message to detonate the pyrotechnical charges, resulting in the same passenger-injury risks as in any airbag deployment.",2017-10-20,Metasploit,cpe:2.3:h:pcu:pcu:2014:*:*:*:*:*:*:* CVE-2017-14942,0.0,,0.00986,"Intelbras WRN 150 devices allow remote attackers to read the configuration file, and consequently bypass authentication, via a direct request for cgi-bin/DownloadCfg/RouterCfm.cfg containing an admin:language=pt cookie.",2017-09-30,Nuclei,cpe:2.3:h:intelbras:wrn_150:-:*:*:*:*:*:*:*;cpe:2.3:o:intelbras:wrn_150_firmware:1.0.1:*:*:*:*:*:*:* CVE-2017-14980,0.0,,0.7554,Buffer overflow in Sync Breeze Enterprise 10.0.28 allows remote attackers to have unspecified impact via a long username parameter to /login.,2017-10-10,Metasploit,cpe:2.3:a:flexense:syncbreeze:10.0.28:*:*:*:enterprise:*:*:* CVE-2017-15222,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.81586,Buffer Overflow vulnerability in Ayukov NFTPD 2.0 and earlier allows remote attackers to execute arbitrary code.,2017-10-24,Metasploit,cpe:2.3:a:nftp_project:nftp:*:*:*:*:*:*:*:* CVE-2017-15287,0.0,,0.01901,"There is XSS in the BouquetEditor WebPlugin for Dream Multimedia Dreambox devices, as demonstrated by the ""Name des Bouquets"" field, or the file parameter to the /file URI.",2017-10-12,Nuclei,cpe:2.3:a:bouqueteditor_project:bouqueteditor:2.0.0:*:*:*:*:dreambox:*:* CVE-2017-15363,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.6672,"Directory traversal vulnerability in public/examples/resources/getsource.php in Luracast Restler through 3.0.0, as used in the restler extension before 1.7.1 for TYPO3, allows remote attackers to read arbitrary files via the file parameter.",2017-10-15,Nuclei,cpe:2.3:a:luracast:restler:*:*:*:*:*:-:*:*;cpe:2.3:a:luracast:restler:*:*:*:*:*:typo3:*:* CVE-2017-15647,0.0,,0.32685,"On FiberHome routers, Directory Traversal exists in /cgi-bin/webproc via the getpage parameter in conjunction with a crafted var:page value.",2017-10-19,Nuclei,cpe:2.3:o:fiberhome:routerfiberhome_firmware:*:*:*:*:*:*:*:* CVE-2017-15715,0.0,,0.94166,"In Apache httpd 2.4.0 to 2.4.29, the expression specified in could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.",2018-03-26,Nuclei,cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:* CVE-2017-15889,0.0,,0.6238,Command injection vulnerability in smart.cgi in Synology DiskStation Manager (DSM) before 5.2-5967-5 allows remote authenticated users to execute arbitrary commands via disk field.,2017-12-04,Metasploit,cpe:2.3:o:synology:diskstation_manager:*:*:*:*:*:*:*:* CVE-2017-15944,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93893,"Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface.",2017-12-11,Metasploit/Nuclei/CISA,cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* CVE-2017-16086,0.0,,0.57769,ua-parser is a port of Browserscope's user agent parser. ua-parser is vulnerable to a ReDoS (Regular Expression Denial of Service) attack when given a specially crafted UserAgent header.,2018-06-07,Metasploit,cpe:2.3:a:ua-parser_project:ua-parser:*:*:*:*:*:node.js:*:* CVE-2017-16249,0.0,,0.68818,"The Debut embedded http server contains a remotely exploitable denial of service where a single malformed HTTP POST request can cause the server to hang until eventually replying (~300 seconds) with an HTTP 500 error. While the server is hung, print jobs over the network are blocked and the web interface is inaccessible. An attacker can continuously send this malformed request to keep the device inaccessible to legitimate traffic.",2017-11-10,Metasploit,cpe:2.3:h:brother:dcp-j132w:-:*:*:*:*:*:*:*;cpe:2.3:o:brother:dcp-j132w_firmware:*:*:*:*:*:*:*:* CVE-2017-16524,0.0,,0.76721,"Web Viewer 1.0.0.193 on Samsung SRN-1670D devices suffers from an Unrestricted file upload vulnerability: 'network_ssl_upload.php' allows remote authenticated attackers to upload and execute arbitrary PHP code via a filename with a .php extension, which is then accessed via a direct request to the file in the upload/ directory. To authenticate for this attack, one can obtain web-interface credentials in cleartext by leveraging the existing Local File Read Vulnerability referenced as CVE-2015-8279, which allows remote attackers to read the web-interface credentials via a request for the cslog_export.php?path=/root/php_modules/lighttpd/sbin/userpw URI.",2017-11-06,Metasploit,cpe:2.3:a:hanwhasecurity:web_viewer:1.0.0.193:*:*:*:*:*:*:*;cpe:2.3:h:samsung:srn-1670d:-:*:*:*:*:*:*:* CVE-2017-16651,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.30531,"Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests.",2017-11-09,Metasploit/CISA,cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*;cpe:2.3:a:roundcube:webmail:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:roundcube:webmail:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:roundcube:webmail:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:roundcube:webmail:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:roundcube:webmail:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:roundcube:webmail:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:roundcube:webmail:1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:roundcube:webmail:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:roundcube:webmail:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:roundcube:webmail:1.3.2:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2017-16666,0.0,,0.80763,Xplico before 1.2.1 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the name of an uploaded PCAP file. NOTE: this issue can be exploited without authentication by leveraging the user registration feature.,2018-01-05,Metasploit,cpe:2.3:a:xplico:xplico:*:*:*:*:*:*:*:* CVE-2017-16709,0.0,,0.82422,Crestron Airmedia AM-100 devices with firmware before 1.6.0 and AM-101 devices with firmware before 2.7.0 allows remote authenticated administrators to execute arbitrary code via unspecified vectors.,2018-07-11,Metasploit,cpe:2.3:h:crestron:airmedia_am-100:-:*:*:*:*:*:*:*;cpe:2.3:h:crestron:airmedia_am-101:-:*:*:*:*:*:*:*;cpe:2.3:o:crestron:airmedia_am-100_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:crestron:airmedia_am-101_firmware:*:*:*:*:*:*:*:* CVE-2017-16806,0.0,,0.89839,The Process function in RemoteTaskServer/WebServer/HttpServer.cs in Ulterius before 1.9.5.0 allows HTTP server directory traversal.,2017-11-13,Metasploit/Nuclei,cpe:2.3:a:ulterius:ulterius_server:1.5.6.0:*:*:*:*:*:*:*;cpe:2.3:a:ulterius:ulterius_server:1.8.0.0:*:*:*:*:*:*:* CVE-2017-16877,0.0,,0.83198,"ZEIT Next.js before 2.4.1 has directory traversal under the /_next and /static request namespace, allowing attackers to obtain sensitive information.",2017-11-17,Nuclei,cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:* CVE-2017-16894,0.0,,0.88787,"In Laravel framework through 5.5.21, remote attackers can obtain sensitive information (such as externally usable passwords) via a direct request for the /.env URI. NOTE: this CVE is only about Laravel framework's writeNewEnvironmentFileWith function in src/Illuminate/Foundation/Console/KeyGenerateCommand.php, which uses file_put_contents without restricting the .env permissions. The .env filename is not used exclusively by Laravel framework.",2017-11-20,Metasploit/Nuclei,cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:* CVE-2017-16995,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.81517,The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.,2017-12-27,Metasploit,cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* CVE-2017-17043,0.0,,0.03568,"The Emag Marketplace Connector plugin 1.0.0 for WordPress has reflected XSS because the parameter ""post"" to /wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.php is not filtered correctly.",2017-11-28,Nuclei,cpe:2.3:a:zitec:emag_marketplace_connector:1.0.0:*:*:*:*:wordpress:*:* CVE-2017-17059,0.0,,0.00709,XSS exists in the amtyThumb amty-thumb-recent-post (aka amtyThumb posts or wp-thumb-post) plugin 8.1.3 for WordPress via the query string to amtyThumbPostsAdminPg.php.,2017-11-29,Nuclei,cpe:2.3:a:amtythumb_project:amtythumb:*:*:*:*:*:wordpress:*:* CVE-2017-17105,0.0,,0.91749,"Zivif PR115-204-P-RS V2.3.4.2103 and V4.7.4.2121 (and possibly in-between versions) web cameras are vulnerable to unauthenticated, blind remote command injection via CGI scripts used as part of the web interface, as demonstrated by a cgi-bin/iptest.cgi?cmd=iptest.cgi&-time=""1504225666237""&-url=$(reboot) request.",2017-12-19,Metasploit,cpe:2.3:h:zivif:pr115-204-p-rs:-:*:*:*:*:*:*:*;cpe:2.3:o:zivif:pr115-204-p-rs_firmware:2.3.4.2103:*:*:*:*:*:*:*;cpe:2.3:o:zivif:pr115-204-p-rs_firmware:4.7.4.2121:*:*:*:*:*:*:* CVE-2017-17382,0.0,,0.77766,"Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.5 before build 67.13, 11.0 before build 71.22, 11.1 before build 56.19, and 12.0 before build 53.22 might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.",2017-12-13,Metasploit,cpe:2.3:o:citrix:application_delivery_controller_firmware:10.5:*:*:*:*:*:*:*;cpe:2.3:o:citrix:application_delivery_controller_firmware:11.0:*:*:*:*:*:*:*;cpe:2.3:o:citrix:application_delivery_controller_firmware:11.1:*:*:*:*:*:*:*;cpe:2.3:o:citrix:application_delivery_controller_firmware:12.0:*:*:*:*:*:*:*;cpe:2.3:o:citrix:netscaler_gateway_firmware:10.5:*:*:*:*:*:*:*;cpe:2.3:o:citrix:netscaler_gateway_firmware:11.0:*:*:*:*:*:*:*;cpe:2.3:o:citrix:netscaler_gateway_firmware:11.1:*:*:*:*:*:*:*;cpe:2.3:o:citrix:netscaler_gateway_firmware:12.0:*:*:*:*:*:*:* CVE-2017-17411,0.0,,0.92161,This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.,2017-12-21,Metasploit,cpe:2.3:h:linksys:wvbr0:-:*:*:*:*:*:*:*;cpe:2.3:o:linksys:wvbr0_firmware:*:*:*:*:*:*:*:* CVE-2017-17427,0.0,,0.76595,"Radware Alteon devices with a firmware version between 31.0.0.0-31.0.3.0 are vulnerable to an adaptive-chosen ciphertext attack (""Bleichenbacher attack""). This allows an attacker to decrypt observed traffic that has been encrypted with the RSA cipher and to perform other private key operations.",2017-12-13,Metasploit,cpe:2.3:h:radware:alteon:-:*:*:*:*:*:*:*;cpe:2.3:o:radware:alteon_firmware:*:*:*:*:*:*:*:* CVE-2017-17428,0.0,,0.79073,"Cavium Nitrox SSL, Nitrox V SSL, and TurboSSL software development kits (SDKs) allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.",2018-03-05,Metasploit,cpe:2.3:a:cavium:nitrox_ssl_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:cavium:nitrox_v_ssl_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:cavium:octeon_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:cavium:octeon_ssl_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:cavium:turbossl_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_conect_im:7.24.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings:t31:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings:t32:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ace30_application_control_engine_module:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ace_4710_application_control_engine:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:adaptive_security_appliance_5505:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:adaptive_security_appliance_5510:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:adaptive_security_appliance_5520:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:adaptive_security_appliance_5540:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:adaptive_security_appliance_5550:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ace30_application_control_engine_module_firmware:3.0\(0\)a5\(2.0\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ace30_application_control_engine_module_firmware:3.0\(0\)a5\(3.0\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ace30_application_control_engine_module_firmware:3.0\(0\)a5\(3.5\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ace4710_application_control_engine_firmware:3.0\(0\)a5\(2.0\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ace4710_application_control_engine_firmware:3.0\(0\)a5\(3.0\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ace4710_application_control_engine_firmware:3.0\(0\)a5\(3.5\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_5505_firmware:9.1\(7.16\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_5510_firmware:9.1\(7.16\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_5520_firmware:9.1\(7.16\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_5540_firmware:9.1\(7.16\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:adaptive_security_appliance_5550_firmware:9.1\(7.16\):*:*:*:*:*:*:* CVE-2017-17451,0.0,,0.16393,The WP Mailster plugin before 1.5.5 for WordPress has XSS in the unsubscribe handler via the mes parameter to view/subscription/unsubscribe2.php.,2017-12-07,Nuclei,cpe:2.3:a:wpmailster:wp_mailster:*:*:*:*:*:wordpress:*:* CVE-2017-17560,0.0,,0.83376,"An issue was discovered on Western Digital MyCloud PR4100 2.30.172 devices. The web administration component, /web/jquery/uploader/multi_uploadify.php, provides multipart upload functionality that is accessible without authentication and can be used to place a file anywhere on the device's file system. This allows an attacker the ability to upload a PHP shell onto the device and obtain arbitrary code execution as root.",2017-12-12,Metasploit,cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*;cpe:2.3:o:westerndigital:my_cloud_pr4100_firmware:2.30.172:*:*:*:*:*:*:* CVE-2017-17562,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9403,"Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0.",2017-12-12,Metasploit/Nuclei/CISA,cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:integrated_lights_out_manager:3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:integrated_lights_out_manager:4.0:*:*:*:*:*:*:* CVE-2017-17692,0.0,,0.61074,Samsung Internet Browser 5.4.02.3 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that redirects to a child tab and rewrites the innerHTML property.,2017-12-21,Metasploit,cpe:2.3:a:samsung:internet_browser:5.4.02.3:*:*:*:*:*:*:* CVE-2017-17731,0.0,,0.84878,DedeCMS through 5.7 has SQL Injection via the $_FILES superglobal to plus/recommend.php.,2017-12-18,Nuclei,cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:* CVE-2017-17736,0.0,,0.90931,Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 allows remote attackers to obtain Global Administrator access by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard.,2018-03-23,Nuclei,cpe:2.3:a:kentico:kentico_cms:*:*:*:*:*:*:*:* CVE-2017-17932,0.0,,0.77388,A buffer overflow vulnerability exists in MediaServer.exe in ALLPlayer ALLMediaServer 0.95 and earlier that could allow remote attackers to execute arbitrary code and/or cause denial of service on the victim machine/computer via a long string to TCP port 888.,2017-12-28,Metasploit,cpe:2.3:a:allmediaserver:allmediaserver:*:*:*:*:*:*:*:* CVE-2017-17968,0.0,,0.54586,A buffer overflow vulnerability in NetTransport.exe in NetTransport Download Manager 2.96L and earlier could allow remote HTTP servers to execute arbitrary code on NAS devices via a long HTTP response.,2017-12-29,Metasploit,cpe:2.3:a:xi-soft:nettransport_download_manager:*:*:*:*:*:*:*:* CVE-2017-18024,0.0,,0.05807,"AvantFAX 3.3.3 has XSS via an arbitrary parameter name to the default URI, as demonstrated by a parameter whose name contains a SCRIPT element and whose value is 1.",2018-01-10,Nuclei,cpe:2.3:a:avantfax:avantfax:3.3.3:*:*:*:*:*:*:* CVE-2017-18044,0.0,,0.82647,"A Command Injection issue was discovered in ContentStore/Base/CVDataPipe.dll in Commvault before v11 SP6. A certain message parsing function inside the Commvault service does not properly validate the input of an incoming string before passing it to CreateProcess. As a result, a specially crafted message can inject commands that will be executed on the target operating system. Exploitation of this vulnerability does not require authentication and can lead to SYSTEM level privilege on any system running the cvd daemon. This is a different vulnerability than CVE-2017-3195.",2018-01-19,Metasploit,cpe:2.3:a:commvault:commvault:*:*:*:*:*:*:*:*;cpe:2.3:a:commvault:commvault:11.0:sp1:*:*:*:*:*:*;cpe:2.3:a:commvault:commvault:11.0:sp2:*:*:*:*:*:*;cpe:2.3:a:commvault:commvault:11.0:sp3:*:*:*:*:*:*;cpe:2.3:a:commvault:commvault:11.0:sp4:*:*:*:*:*:*;cpe:2.3:a:commvault:commvault:11.0:sp5:*:*:*:*:*:* CVE-2017-18047,0.0,,0.70618,Buffer Overflow in the FTP client in LabF nfsAxe 3.7 allows remote FTP servers to execute arbitrary code via a long reply.,2018-01-22,Metasploit,cpe:2.3:a:labf:nfsaxe:3.7:*:*:*:*:*:*:* CVE-2017-18048,0.0,,0.77014,"Monstra CMS 3.0.4 allows users to upload arbitrary files, which leads to remote command execution on the server, for example because .php (lowercase) is blocked but .PHP (uppercase) is not.",2018-01-23,Metasploit,cpe:2.3:a:monstra:monstra:3.0.4:*:*:*:*:*:*:* CVE-2017-18349,0.0,,0.90631,"parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java.",2018-10-23,Nuclei,cpe:2.3:a:alibaba:fastjson:*:*:*:*:*:*:*:*;cpe:2.3:a:pippo:pippo:1.11.0:*:*:*:*:*:*:* CVE-2017-18357,0.0,,0.58448,"Shopware before 5.3.4 has a PHP Object Instantiation issue via the sort parameter to the loadPreviewAction() method of the Shopware_Controllers_Backend_ProductStream controller, with resultant XXE via instantiation of a SimpleXMLElement object.",2019-01-15,Metasploit,cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:* CVE-2017-18362,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.51248,"ConnectWise ManagedITSync integration through 2017 for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database. In February 2019, attackers have actively exploited this in the wild to download and execute ransomware payloads on all endpoints managed by the VSA server. If the ManagedIT.asmx page is available via the Kaseya VSA web interface, anyone with access to the page is able to run arbitrary SQL queries, both read and write, without authentication.",2019-02-05,CISA,cpe:2.3:a:connectwise:manageditsync:*:*:*:*:*:kaseya_vsa:*:* CVE-2017-18368,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9375,"The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter.",2019-05-02,Metasploit/CISA,cpe:2.3:h:billion:5200w-t:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:p660hn-t1a_v1:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:p660hn-t1a_v2:-:*:*:*:*:*:*:*;cpe:2.3:o:billion:5200w-t_firmware:7.3.8.0:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:p660hn-t1a_v1_firmware:7.3.15.0:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:p660hn-t1a_v2_firmware:7.3.15.0:*:*:*:*:*:*:* CVE-2017-18369,0.0,,0.87538,"The Billion 5200W-T 1.02b.rc5.dt49 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the adv_remotelog.asp page and can be exploited through the syslogServerAddr parameter.",2019-05-02,Metasploit,cpe:2.3:h:billion:5200w-t:-:*:*:*:*:*:*:*;cpe:2.3:o:billion:5200w-t_firmware:1.02b:rc5.dt49:*:*:*:*:*:* CVE-2017-18370,0.0,,0.75173,"The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is only accessible by an authenticated user. The vulnerability is in the logSet.asp page and can be exploited through the ServerIP parameter. Authentication can be achieved by exploiting CVE-2017-18371.",2019-05-02,Metasploit,cpe:2.3:h:billion:5200w-t:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:p660hn-t1a_v1:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:p660hn-t1a_v2:-:*:*:*:*:*:*:*;cpe:2.3:o:billion:5200w-t_firmware:7.3.8.0:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:p660hn-t1a_v1_firmware:7.3.37.6:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:p660hn-t1a_v2_firmware:7.3.37.6:*:*:*:*:*:*:* CVE-2017-18371,0.0,,0.69044,"The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has three user accounts with default passwords, including two hardcoded service accounts: one with the username true and password true, and another with the username supervisor and password zyad1234. These accounts can be used to login to the web interface, exploit authenticated command injections, and change router settings for malicious purposes.",2019-05-02,Metasploit,cpe:2.3:h:billion:5200w-t:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:p660hn-t1a_v1:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:p660hn-t1a_v2:-:*:*:*:*:*:*:*;cpe:2.3:o:billion:5200w-t_firmware:7.3.8.0:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:p660hn-t1a_v1_firmware:7.3.37.6:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:p660hn-t1a_v2_firmware:7.3.37.6:*:*:*:*:*:*:* CVE-2017-18372,0.0,,0.72978,"The Billion 5200W-T TCLinux Fw $7.3.8.0 v008 130603 router distributed by TrueOnline has a command injection vulnerability in the Time Setting function, which is only accessible by an authenticated user. The vulnerability is in the tools_time.asp page and can be exploited through the uiViewSNTPServer parameter. Authentication can be achieved by exploiting CVE-2017-18373.",2019-05-02,Metasploit,cpe:2.3:h:billion:5200w-t:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:p660hn-t1a_v1:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:p660hn-t1a_v2:-:*:*:*:*:*:*:*;cpe:2.3:o:billion:5200w-t_firmware:7.3.8.0:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:p660hn-t1a_v1_firmware:7.3.15.0:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:p660hn-t1a_v2_firmware:7.3.15.0:*:*:*:*:*:*:* CVE-2017-18487,0.0,,0.0048,The adsense-plugin (aka Google AdSense) plugin before 1.44 for WordPress has multiple XSS issues.,2019-08-13,Nuclei,cpe:2.3:a:google_adsense_project:google_adsense:*:*:*:*:*:wordpress:*:* CVE-2017-18490,0.0,,0.00104,The contact-form-multi plugin before 1.2.1 for WordPress has multiple XSS issues.,2019-08-13,Nuclei,cpe:2.3:a:bestwebsoft:contact_form_multi:*:*:*:*:*:wordpress:*:* CVE-2017-18491,0.0,,0.00104,The contact-form-plugin plugin before 4.0.6 for WordPress has multiple XSS issues.,2019-08-13,Nuclei,cpe:2.3:a:bestwebsoft:contact_form:*:*:*:*:*:wordpress:*:* CVE-2017-18492,0.0,,0.00104,The contact-form-to-db plugin before 1.5.7 for WordPress has multiple XSS issues.,2019-08-13,Nuclei,cpe:2.3:a:bestwebsoft:contact_form_to_db:*:*:*:*:*:wordpress:*:* CVE-2017-18493,0.0,,0.00104,The custom-admin-page plugin before 0.1.2 for WordPress has multiple XSS issues.,2019-08-13,Nuclei,cpe:2.3:a:bestwebsoft:custom_admin_page:*:*:*:*:*:wordpress:*:* CVE-2017-18494,0.0,,0.00104,The custom-search-plugin plugin before 1.36 for WordPress has multiple XSS issues.,2019-08-13,Nuclei,cpe:2.3:a:bestwebsoft:custom_search:*:*:*:*:*:wordpress:*:* CVE-2017-18496,0.0,,0.00104,The htaccess plugin before 1.7.6 for WordPress has multiple XSS issues.,2019-08-13,Nuclei,cpe:2.3:a:bestwebsoft:htaccess:*:*:*:*:*:wordpress:*:* CVE-2017-18500,0.0,,0.00385,The social-buttons-pack plugin before 1.1.1 for WordPress has multiple XSS issues.,2019-08-12,Nuclei,cpe:2.3:a:bestwebsoft:social_buttons_pack:*:*:*:*:*:wordpress:*:* CVE-2017-18501,0.0,,0.00385,The social-login-bws plugin before 0.2 for WordPress has multiple XSS issues.,2019-08-12,Nuclei,cpe:2.3:a:bestwebsoft:social_login:*:*:*:*:*:wordpress:*:* CVE-2017-18502,0.0,,0.00314,The subscriber plugin before 1.3.5 for WordPress has multiple XSS issues.,2019-08-12,Nuclei,cpe:2.3:a:bestwebsoft:subscriber:*:*:*:*:*:wordpress:*:* CVE-2017-18505,0.0,,0.02615,The twitter-plugin plugin before 2.55 for WordPress has XSS.,2019-08-12,Nuclei,cpe:2.3:a:bestwebsoft:twitter_button:*:*:*:*:*:wordpress:*:* CVE-2017-18516,0.0,,0.00059,The bws-linkedin plugin before 1.0.5 for WordPress has multiple XSS issues.,2019-08-21,Nuclei,cpe:2.3:a:bestwebsoft:linkedin:*:*:*:*:*:wordpress:*:* CVE-2017-18517,0.0,,0.00059,The bws-pinterest plugin before 1.0.5 for WordPress has multiple XSS issues.,2019-08-20,Nuclei,cpe:2.3:a:bestwebsoft:pinterest:*:*:*:*:*:wordpress:*:* CVE-2017-18518,0.0,,0.00059,The bws-smtp plugin before 1.1.0 for WordPress has multiple XSS issues.,2019-08-20,Nuclei,cpe:2.3:a:bestwebsoft:smtp:*:*:*:*:*:wordpress:*:* CVE-2017-18527,0.0,,0.00059,The pagination plugin before 1.0.7 for WordPress has multiple XSS issues.,2019-08-20,Nuclei,cpe:2.3:a:bestwebsoft:pagination:*:*:*:*:*:wordpress:*:* CVE-2017-18528,0.0,,0.00056,The pdf-print plugin before 1.9.4 for WordPress has multiple XSS issues.,2019-08-20,Nuclei,cpe:2.3:a:bestwebsoft:pdf_\&_print:*:*:*:*:*:wordpress:*:* CVE-2017-18529,0.0,,0.00059,The promobar plugin before 1.1.1 for WordPress has multiple XSS issues.,2019-08-20,Nuclei,cpe:2.3:a:bestwebsoft:promobar:*:*:*:*:*:wordpress:*:* CVE-2017-18530,0.0,,0.00098,The rating-bws plugin before 0.2 for WordPress has multiple XSS issues.,2019-08-20,Nuclei,cpe:2.3:a:bestwebsoft:rating:*:*:*:*:*:wordpress:*:* CVE-2017-18532,0.0,,0.00098,The realty plugin before 1.1.0 for WordPress has multiple XSS issues.,2019-08-20,Nuclei,cpe:2.3:a:bestwebsoft:realty:*:*:*:*:*:wordpress:*:* CVE-2017-18536,0.0,,0.05223,The stop-user-enumeration plugin before 1.3.8 for WordPress has XSS.,2019-08-21,Nuclei,cpe:2.3:a:fullworks:stop_user_enumeration:*:*:*:*:*:wordpress:*:* CVE-2017-18537,0.0,,0.00059,The visitors-online plugin before 1.0.0 for WordPress has multiple XSS issues.,2019-08-21,Nuclei,cpe:2.3:a:bestwebsoft:visitors_online:*:*:*:*:*:wordpress:*:* CVE-2017-18542,0.0,,0.00089,The zendesk-help-center plugin before 1.0.5 for WordPress has multiple XSS issues.,2019-08-16,Nuclei,cpe:2.3:a:bestwebsoft:zendesk_help_center:*:*:*:*:*:wordpress:*:* CVE-2017-18556,0.0,,0.00098,The bws-google-analytics plugin before 1.7.1 for WordPress has multiple XSS issues.,2019-08-21,Nuclei,cpe:2.3:a:bestwebsoft:google_analytics:*:*:*:*:*:wordpress:*:* CVE-2017-18557,0.0,,0.00098,The bws-google-maps plugin before 1.3.6 for WordPress has multiple XSS issues.,2019-08-21,Nuclei,cpe:2.3:a:bestwebsoft:google_maps:*:*:*:*:*:wordpress:*:* CVE-2017-18558,0.0,,0.00097,The bws-testimonials plugin before 0.1.9 for WordPress has multiple XSS issues.,2019-08-21,Nuclei,cpe:2.3:a:bestwebsoft:testimonials:*:*:*:*:*:wordpress:*:* CVE-2017-18562,0.0,,0.00097,The error-log-viewer plugin before 1.0.6 for WordPress has multiple XSS issues.,2019-08-21,Nuclei,cpe:2.3:a:bestwebsoft:error_log_viewer:*:*:*:*:*:wordpress:*:* CVE-2017-18564,0.0,,0.00097,The sender plugin before 1.2.1 for WordPress has multiple XSS issues.,2019-08-21,Nuclei,cpe:2.3:a:bestwebsoft:sender:*:*:*:*:*:wordpress:*:* CVE-2017-18565,0.0,,0.00097,The updater plugin before 1.35 for WordPress has multiple XSS issues.,2019-08-21,Nuclei,cpe:2.3:a:bestwebsoft:updater:*:*:*:*:*:wordpress:*:* CVE-2017-18566,0.0,,0.00097,The user-role plugin before 1.5.6 for WordPress has multiple XSS issues.,2019-08-20,Nuclei,cpe:2.3:a:bestwebsoft:user_role:*:*:*:*:*:wordpress:*:* CVE-2017-18590,0.0,,0.00075,The timesheet plugin before 0.1.5 for WordPress has multiple XSS issues.,2019-08-27,Nuclei,cpe:2.3:a:bestwebsoft:timesheet:*:*:*:*:*:wordpress:*:* CVE-2017-18598,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.02107,The Qards plugin through 2017-10-11 for WordPress has XSS via a remote document specified in the url parameter to html2canvasproxy.php.,2019-09-10,Nuclei,cpe:2.3:a:designmodo:qards:*:*:*:*:*:wordpress:*:* CVE-2017-18638,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.90804,"send_email in graphite-web/webapp/graphite/composer/views.py in Graphite through 1.1.5 is vulnerable to SSRF. The vulnerable SSRF endpoint can be used by an attacker to have the Graphite web server request any resource. The response to this SSRF request is encoded into an image file and then sent to an e-mail address that can be supplied by the attacker. Thus, an attacker can exfiltrate any information.",2019-10-11,Nuclei,cpe:2.3:a:graphite_project:graphite:*:*:*:*:*:*:*:* CVE-2017-2741,0.0,,0.86529,"A potential security vulnerability has been identified with HP PageWide Printers, HP OfficeJet Pro Printers, with firmware before 1708D. This vulnerability could potentially be exploited to execute arbitrary code.",2018-01-23,Metasploit,cpe:2.3:h:hp:d3q15a:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q15b:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q15d:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q16a:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q16b:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q16c:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q16d:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q17a:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q17c:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q17d:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q19a:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q19d:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q20a:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q20b:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q20c:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q20d:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q21a:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q21c:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d3q21d:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d9l20a:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d9l21a:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d9l63a:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:d9l64a:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:j3p68a:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:j6u55a:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:j6u55b:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:j6u55c:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:j6u55d:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:j6u57b:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:j9v80a:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:j9v80b:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:j9v82a:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:j9v82b:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:j9v82c:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:j9v82d:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:k9z76a:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:k9z76d:-:*:*:*:*:*:*:*;cpe:2.3:h:hp:t0g70a:-:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q15a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q15b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q15d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q16a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q16b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q16c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q16d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q17a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q17c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q17d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q19a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q19d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q20a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q20b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q20c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q20d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q21a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q21c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d3q21d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d9l20a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d9l21a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d9l63a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:d9l64a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:j3p68a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:j6u55a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:j6u55b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:j6u55c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:j6u55d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:j6u57b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:j9v80a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:j9v80b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:j9v82a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:j9v82b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:j9v82c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:j9v82d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:k9z76a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:k9z76d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:hp:t0g70a_firmware:*:*:*:*:*:*:*:* CVE-2017-3066,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93265,"Adobe ColdFusion 2016 Update 3 and earlier, ColdFusion 11 update 11 and earlier, ColdFusion 10 Update 22 and earlier have a Java deserialization vulnerability in the Apache BlazeDS library. Successful exploitation could lead to arbitrary code execution.",2017-04-27,CISA,cpe:2.3:a:adobe:coldfusion:10.0:-:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update10:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update11:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update12:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update13:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update14:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update15:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update16:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update17:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update18:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update19:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update1:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update20:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update21:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update22:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update2:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update3:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update4:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update5:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update6:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update7:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update8:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:10.0:update9:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:-:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update10:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update11:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update1:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update2:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update3:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update4:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update5:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update6:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update7:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update8:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update9:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:update1:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:update2:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:update3:*:*:*:*:*:* CVE-2017-3131,0.0,,0.11481,"A Cross-Site Scripting vulnerability in Fortinet FortiOS versions 5.4.0 through 5.4.4 and 5.6.0 allows attackers to execute unauthorized code or commands via the filter input in ""Applications"" under FortiView.",2017-09-12,Nuclei,cpe:2.3:o:fortinet:fortios:5.4.0:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.4.1:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.4.2:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.4.3:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.4.4:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:5.6.0:*:*:*:*:*:*:* CVE-2017-3132,0.0,,0.08784,A Cross-Site Scripting vulnerability in Fortinet FortiOS versions 5.6.0 and earlier allows attackers to Execute unauthorized code or commands via the action input during the activation of a FortiToken.,2017-09-12,Nuclei,cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* CVE-2017-3133,0.0,,0.0869,A Cross-Site Scripting vulnerability in Fortinet FortiOS versions 5.6.0 and earlier allows attackers to execute unauthorized code or commands via the Replacement Message HTML for SSL-VPN.,2017-09-12,Nuclei,cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* CVE-2017-3248,0.0,,0.90825,"Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.0 and 12.2.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS v3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).",2017-01-27,Metasploit,cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.1.0:*:*:*:*:*:*:* CVE-2017-3506,7.4,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N,0.94338,"Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1 and 12.2.1.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data as well as unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).",2017-04-24,Nuclei/CISA,cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.2.0:*:*:*:*:*:*:* CVE-2017-3528,0.0,,0.43239,"Vulnerability in the Oracle Applications Framework component of Oracle E-Business Suite (subcomponent: Popup windows (lists of values, datepicker, etc.)). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily ""exploitable"" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).",2017-04-24,Nuclei,cpe:2.3:a:oracle:applications_framework:12.1.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:applications_framework:12.2.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:applications_framework:12.2.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:applications_framework:12.2.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:applications_framework:12.2.6:*:*:*:*:*:*:* CVE-2017-3622,0.0,,0.19606,"Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Common Desktop Environment (CDE)). The supported version that is affected is 10. Easily ""exploitable"" vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. Note: CVE-2017-3622 is assigned for the ""Extremeparr"". CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).",2017-04-24,Metasploit,cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:* CVE-2017-3629,0.0,,0.28064,"Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).",2017-06-22,Metasploit,cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:* CVE-2017-3630,0.0,,0.08971,"Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data as well as unauthorized read access to a subset of Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).",2017-06-22,Metasploit,cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:* CVE-2017-3631,0.0,,0.08971,"Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data as well as unauthorized read access to a subset of Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).",2017-06-22,Metasploit,cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:* CVE-2017-3823,0.0,,0.79238,"An issue was discovered in the Cisco WebEx Extension before 1.0.7 on Google Chrome, the ActiveTouch General Plugin Container before 106 on Mozilla Firefox, the GpcContainer Class ActiveX control plugin before 10031.6.2017.0126 on Internet Explorer, and the Download Manager ActiveX control plugin before 2.1.0.10 on Internet Explorer. A vulnerability in these Cisco WebEx browser extensions could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server and Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center) when they are running on Microsoft Windows. The vulnerability is a design defect in an application programing interface (API) response parser within the extension. An attacker that can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser.",2017-02-01,Metasploit,cpe:2.3:a:cisco:activetouch_general_plugin_container:105:*:*:*:*:firefox:*:*;cpe:2.3:a:cisco:download_manager:2.1.0.9:*:*:*:*:internet_explorer:*:*;cpe:2.3:a:cisco:gpccontainer_class:*:*:*:*:*:internet_explorer:*:*;cpe:2.3:a:cisco:webex:*:*:*:*:*:chrome:*:*;cpe:2.3:a:cisco:webex_meeting_center:2.6_base:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meeting_center:2.6_mr1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meeting_center:2.6_mr1:p1:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meeting_center:2.6_mr2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meeting_center:2.6_mr2:p1:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meeting_center:2.6_mr3:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meeting_center:2.6_mr3:p1:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meeting_center:2.7_base:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meeting_center:2.7_mr1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meeting_center:2.7_mr1:p1:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meeting_center:2.7_mr2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meeting_center:t29_base:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meeting_center:t30_base:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meeting_center:t31_base:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.0_base:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.0_mr2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.0_mr3:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.0_mr4:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.0_mr5:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.0_mr6:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.0_mr7:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.0_mr8:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.0_mr8:p1:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.0_mr9:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.0_mr9:p1:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.0_mr9:p2:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.0_mr9:p3:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.5_base:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.5_mr1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.5_mr2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.5_mr2:p1:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.5_mr3:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.5_mr4:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.5_mr5:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.5_mr5:p1:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.5_mr6:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.5_mr6:p1:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.5_mr6:p2:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.5_mr6:p3:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.6_base:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.6_mr1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.6_mr1:p1:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.6_mr2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.6_mr2:p1:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.6_mr3:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.6_mr3:p1:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.7_base:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.7_mr1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.7_mr1:p1:*:*:*:*:*:*;cpe:2.3:a:cisco:webex_meetings_server:2.7_mr2:*:*:*:*:*:*:* CVE-2017-3881,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93968,"A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.",2017-03-17,Metasploit/Nuclei/CISA,cpe:2.3:h:cisco:catalyst_2350-48td-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2350-48td-sd:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2360-48td-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2918-24tc-c:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2918-24tt-c:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2918-48tc-c:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2918-48tt-c:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2928-24tc-c:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-24-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-24lc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-24lt-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-24pc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-24pc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-24tc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-24tc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-24tt-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-48pst-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-48pst-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-48tc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-48tc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-48tt-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-48tt-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-8tc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-8tc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-plus_24lc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-plus_24lc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-plus_24pc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-plus_24pc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-plus_24tc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-plus_24tc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-plus_48pst-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-plus_48pst-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-plus_48tc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960-plus_48tc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960c-12pc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960c-8pc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960c-8tc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960c-8tc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960cg-8tc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960cpd-8pt-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960cpd-8tt-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960g-24tc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960g-48tc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960g-8tc-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960l-16ps-ll:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960l-16ts-ll:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960l-24ps-ll:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960l-24ts-ll:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960l-48ps-ll:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960l-48ts-ll:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960l-8ps-ll:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960l-8ts-ll:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960pd-8tt-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-24pd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-24ps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-24td-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-24ts-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-24ts-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-48fpd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-48fps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-48lpd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-48lps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-48td-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-48ts-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-48ts-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-f24ps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-f24ts-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-f24ts-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-f48fps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-f48lps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-f48ts-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960s-f48ts-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-24pd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-24ps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-24td-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-24ts-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-48fpd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-48fps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-48lpd-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-48lps-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-48td-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2960xr-48ts-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2970g-24t:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2970g-24ts:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_2975:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3550_12g:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3550_12t:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3550_24_dc_smi:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3550_24_emi:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3550_24_fx_smi:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3550_24_pwr:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3550_24_smi:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3550_48_emi:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3550_48_smi:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560-12pc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560-24ps:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560-24ts:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560-48ps:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560-48ts:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560-8pc:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560c-12pc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560c-8pc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560cg-8pc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560cg-8tc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560cpd-8pt-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560cx-12pc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560cx-12pd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560cx-12tc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560cx-8pc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560cx-8pt-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560cx-8tc-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560cx-8xpd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560e-12d-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560e-12d-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560e-12sd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560e-12sd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560e-24pd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560e-24pd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560e-24td-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560e-24td-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560e-48pd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560e-48pd-ef:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560e-48pd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560e-48pd-sf:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560e-48td-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560e-48td-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560g-24ps:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560g-24ts:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560g-48ps:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560g-48ts:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560v2-24dc:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560v2-24ps:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560v2-24ts:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560v2-48ps:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560v2-48ts:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-24p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-24p-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-24p-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-24t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-24t-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-24t-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-24u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-24u-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-24u-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-48p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-48p-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-48p-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-48pf-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-48pf-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-48pf-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-48t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-48t-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-48t-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-48u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-48u-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3560x-48u-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750-24fs:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750-24ps:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750-24ts:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750-48ps:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750-48ts:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750_metro_24-ac:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750_metro_24-dc:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750e-24pd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750e-24pd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750e-24td-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750e-24td-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750e-48pd-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750e-48pd-ef:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750e-48pd-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750e-48pd-sf:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750e-48td-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750e-48td-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750g-12s-sd:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750g-12s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750g-16td:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750g-24ps:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750g-24t:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750g-24ts-1u:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750g-24ts:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750g-48ps:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750g-48ts:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750v2-24fs:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750v2-24ps:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750v2-24ts:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750v2-48ps:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750v2-48ts:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-12s-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-12s-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-24p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-24p-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-24p-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-24s-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-24s-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-24t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-24t-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-24t-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-24u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-24u-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-24u-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-48p-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-48p-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-48p-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-48pf-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-48pf-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-48pf-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-48t-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-48t-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-48t-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-48u-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-48u-l:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_3750x-48u-s:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_i:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_iv:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_v:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6l-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus-ts:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_iv:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v-10ge:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4500_supervisor_ii-plus-10ge:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4500e_supervisor_engine_8-e:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4900m:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4928_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4948:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4948_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4948e-f_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_4948e_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_blade_switch_3020:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_blade_switch_3030:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_blade_switch_3032:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_blade_switch_3040:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_blade_switch_3120:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_blade_switch_3120x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_blade_switch_3130:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_c2928-24lt-c:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_c2928-48tc-c:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_switch_module_3012:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_switch_module_3110:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:catalyst_switch_module_3110x:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:embedded_service_2020_24tc_con:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:embedded_service_2020_24tc_con_b:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp_b:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:embedded_service_2020_con:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:embedded_service_2020_con_b:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:embedded_service_2020_ncp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:embedded_service_2020_ncp_b:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:enhanced_layer_2\/3_etherswitch_service_module:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:enhanced_layer_2_etherswitch_service_module:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:gigabit_ethernet_switch_module_\(cgesm\):-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-3010-16s-8pc_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-3010-24tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-4000-16gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-4000-16t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-4000-4gc4gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-4000-4gs8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-4000-4s8p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-4000-4t4p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-4000-4tc4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-4000-8gs4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-4000-8gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-4000-8gt8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-4000-8s4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-4000-8t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-4010-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-4010-4s24p_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-5000-12s12p-10g_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie-5000-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-16ptc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-16t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-16t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-16tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-16tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-16tc-g-x_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-16tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-16tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-24t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-4s-ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-4t-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-4t_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-4ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-4ts_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-8t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-8t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-8tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-8tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-8tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_2000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_3000-4tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:ie_3000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:me_4924-10ge:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:rf_gateway_10:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sm-x_layer_2\/3_etherswitch_service_module:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* CVE-2017-4011,0.0,,0.1089,Embedding Script (XSS) in HTTP Headers vulnerability in the server in McAfee Network Data Loss Prevention (NDLP) 9.3.x allows remote attackers to get session/cookie information via modification of the HTTP request.,2017-05-17,Nuclei,cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:* CVE-2017-4915,0.0,,0.11558,VMware Workstation Pro/Player contains an insecure library loading vulnerability via ALSA sound driver configuration files. Successful exploitation of this issue may allow unprivileged host users to escalate their privileges to root in a Linux host machine.,2017-05-22,Metasploit,cpe:2.3:a:vmware:workstation_player:12.0.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:workstation_pro:12.0.0:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* CVE-2017-5030,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.63052,"Incorrect handling of complex species in V8 in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac and 57.0.2987.108 for Android allowed a remote attacker to execute arbitrary code via a crafted HTML page.",2017-04-24,CISA,cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2017-5070,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.76556,"Type confusion in V8 in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.",2017-10-27,CISA,cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2017-5146,0.0,,0.64606,"An issue was discovered in Carlo Gavazzi VMU-C EM prior to firmware Version A11_U05, and VMU-C PV prior to firmware Version A17. Sensitive information is stored in clear-text.",2017-02-13,Metasploit,cpe:2.3:h:carlosgavazzi:vmu-c_em:-:*:*:*:*:*:*:*;cpe:2.3:h:carlosgavazzi:vmu-c_pv:-:*:*:*:*:*:*:*;cpe:2.3:o:carlosgavazzi:vmu-c_em_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:carlosgavazzi:vmu-c_pv_firmware:-:*:*:*:*:*:*:* CVE-2017-5162,0.0,,0.60061,An issue was discovered in BINOM3 Universal Multifunctional Electric Power Quality Meter. Lack of authentication for remote service gives access to application set up and configuration.,2017-02-13,Metasploit,cpe:2.3:h:binom3:universal_multifunctional_electric_power_quality_meter:-:*:*:*:*:*:*:*;cpe:2.3:o:binom3:universal_multifunctional_electric_power_quality_meter_firmware:-:*:*:*:*:*:*:* CVE-2017-5254,0.0,,0.67592,"In version 3.5 and prior of Cambium Networks ePMP firmware, the non-administrative users 'installer' and 'home' have the capability of changing passwords for other accounts, including admin, after disabling a client-side protection mechanism.",2017-12-20,Metasploit,cpe:2.3:h:cambiumnetworks:epmp_1000:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:epmp_2000:-:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:epmp_1000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:epmp_2000_firmware:*:*:*:*:*:*:*:* CVE-2017-5255,0.0,,0.71417,"In version 3.5 and prior of Cambium Networks ePMP firmware, a lack of input sanitation for certain parameters on the web management console allows any authenticated user (including the otherwise low-privilege readonly user) to inject shell meta-characters as part of a specially-crafted POST request to the get_chart function and run OS-level commands, effectively as root.",2017-12-20,Metasploit,cpe:2.3:h:cambiumnetworks:epmp_1000:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:epmp_2000:-:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:epmp_1000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:epmp_2000_firmware:*:*:*:*:*:*:*:* CVE-2017-5259,0.0,,0.59538,"In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, an undocumented, root-privilege administration web shell is available using the HTTP path https:///adm/syscmd.asp.",2017-12-20,Metasploit,cpe:2.3:h:cambiumnetworks:cnpilot_e400:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_e410:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_e600:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_r190n:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_r190v:-:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_e400_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_e410_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_e600_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_r190n_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_r190v_firmware:*:*:*:*:*:*:*:* CVE-2017-5260,0.0,,0.33387,"In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, although the option to access the configuration file is not available in the normal web administrative console for the 'user' account, the configuration file is accessible via direct object reference (DRO) at http:///goform/down_cfg_file by this otherwise low privilege 'user' account.",2017-12-20,Metasploit,cpe:2.3:h:cambiumnetworks:cnpilot_e400:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_e410:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_e600:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_r190n:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_r190v:-:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_e400_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_e410_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_e600_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_r190n_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_r190v_firmware:*:*:*:*:*:*:*:* CVE-2017-5261,0.0,,0.24144,"In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, the 'ping' and 'traceroute' functions of the web administrative console expose a file path traversal vulnerability, accessible to all authenticated users.",2017-12-20,Metasploit,cpe:2.3:h:cambiumnetworks:cnpilot_e400:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_e410:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_e600:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_r190n:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_r190v:-:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_e400_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_e410_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_e600_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_r190n_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_r190v_firmware:*:*:*:*:*:*:*:* CVE-2017-5262,0.0,,0.07842,"In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, the SNMP read-only (RO) community string has access to sensitive information by OID reference.",2017-12-20,Metasploit,cpe:2.3:h:cambiumnetworks:cnpilot_e400:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_e410:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_e600:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_r190n:-:*:*:*:*:*:*:*;cpe:2.3:h:cambiumnetworks:cnpilot_r190v:-:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_e400_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_e410_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_e600_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_r190n_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cambiumnetworks:cnpilot_r190v_firmware:*:*:*:*:*:*:*:* CVE-2017-5521,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93866,"An issue was discovered on NETGEAR R8500, R8300, R7000, R6400, R7300, R7100LG, R6300v2, WNDR3400v3, WNR3500Lv2, R6250, R6700, R6900, and R8000 devices. They are prone to password disclosure via simple crafted requests to the web management server. The bug is exploitable remotely if the remote management option is set, and can also be exploited given access to the router over LAN or WLAN. When trying to access the web panel, a user is asked to authenticate; if the authentication is canceled and password recovery is not enabled, the user is redirected to a page that exposes a password recovery token. If a user supplies the correct token to the page /passwordrecovered.cgi?id=TOKEN (and password recovery is not enabled), they will receive the admin password for the router. If password recovery is set the exploit will fail, as it will ask the user for the recovery questions that were previously set when enabling that feature. This is persistent (even after disabling the recovery option, the exploit will fail) because the router will ask for the security questions.",2017-01-17,Metasploit/Nuclei/CISA,cpe:2.3:h:netgear:ac1450:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:d6300:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:d6300b:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:dgn2200bv4:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r6200:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:r6300:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:vegn2610:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wndr3700v3:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wndr4000:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wndr4500:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wnr1000v3:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:ac1450_firmware:1.0.0.34_10.0.16:*:*:*:*:*:*:*;cpe:2.3:o:netgear:d6220_firmware:1.0.0.12:*:*:*:*:*:*:*;cpe:2.3:o:netgear:d6300_firmware:1.0.0.96:*:*:*:*:*:*:*;cpe:2.3:o:netgear:d6300b_firmware:1.0.0.40:*:*:*:*:*:*:*;cpe:2.3:o:netgear:d6400_firmware:1.0.0.44:*:*:*:*:*:*:*;cpe:2.3:o:netgear:dgn2200bv4_firmware:1.0.0.68:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r6200_firmware:1.0.1.56_1.0.43:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r6300_firmware:1.0.2.78_1.0.58:*:*:*:*:*:*:*;cpe:2.3:o:netgear:vegn2610_firmware:1.0.0.36:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wndr3700v3_firmware:1.0.0.40_1.0.32:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wndr4000_firmware:1.0.2.4_9.1.86:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wndr4500_firmware:1.0.1.44_1.0.73:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr1000v3_firmware:1.0.2.68_60.0.93:*:*:*:*:*:*:* CVE-2017-5631,0.0,,0.2527,"An issue was discovered in KMCIS CaseAware. Reflected cross site scripting is present in the user parameter (i.e., ""usr"") that is transmitted in the login.php query string.",2017-05-01,Nuclei,cpe:2.3:a:kmc_information_systems:caseaware:-:*:*:*:*:*:*:* CVE-2017-5638,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94267,"The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.",2017-03-11,Metasploit/Nuclei/CISA,cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*;cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:server_automation:10.0.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:server_automation:10.1.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:server_automation:10.2.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:server_automation:10.5.0:*:*:*:*:*:*:*;cpe:2.3:a:hp:server_automation:9.1.0:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.2.0:*:*:*:*:*:*:*;cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*;cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*;cpe:2.3:h:lenovo:storage_v5030:-:*:*:*:*:*:*:*;cpe:2.3:o:ibm:storwize_v3500_firmware:7.7.1.6:*:*:*:*:*:*:*;cpe:2.3:o:ibm:storwize_v3500_firmware:7.8.1.0:*:*:*:*:*:*:*;cpe:2.3:o:ibm:storwize_v5000_firmware:7.7.1.6:*:*:*:*:*:*:*;cpe:2.3:o:ibm:storwize_v5000_firmware:7.8.1.0:*:*:*:*:*:*:*;cpe:2.3:o:ibm:storwize_v7000_firmware:7.7.1.6:*:*:*:*:*:*:*;cpe:2.3:o:ibm:storwize_v7000_firmware:7.8.1.0:*:*:*:*:*:*:*;cpe:2.3:o:lenovo:storage_v5030_firmware:7.7.1.6:*:*:*:*:*:*:*;cpe:2.3:o:lenovo:storage_v5030_firmware:7.8.1.0:*:*:*:*:*:*:* CVE-2017-5645,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94013,"In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.",2017-04-17,Nuclei,cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_api_services:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:service_level_manager:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*;cpe:2.3:a:oracle:api_gateway:11.1.2.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:autovue_vuelink_integration:21.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:autovue_vuelink_integration:21.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bi_publisher:11.1.1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bi_publisher:11.1.1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bi_publisher:12.2.1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_interactive_session_recorder:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_messaging_server:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_network_integrity:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_online_mediation_controller:6.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_pricing_design_center:11.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_pricing_design_center:12.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_service_broker:6.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:configuration_manager:12.1.2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:configuration_manager:12.1.2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_data_quality:12.2.1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_base_platform:12.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_for_fusion_middleware:12.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_for_fusion_middleware:13.2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_for_mysql_database:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_for_oracle_database:12.1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_for_oracle_database:13.2.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_for_peoplesoft:13.1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_for_peoplesoft:13.2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_behavior_detection_platform:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_behavior_detection_platform:6.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_lending_and_leasing:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_lending_and_leasing:12.5.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:8.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:8.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_profitability_management:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_profitability_management:6.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_regulatory_reporting_with_agilereporter:8.0.9.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:flexcube_investor_servicing:12.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:flexcube_investor_servicing:12.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:flexcube_investor_servicing:12.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:flexcube_investor_servicing:12.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:flexcube_investor_servicing:14.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:goldengate:12.3.2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:identity_analytics:11.1.1.5.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:identity_management_suite:11.1.2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:identity_management_suite:12.2.1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:identity_manager_connector:9.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:in-memory_performance-driven_planning:12.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:in-memory_performance-driven_planning:12.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_calculation_engine:10.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_calculation_engine:10.2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_policy_administration:10.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_policy_administration:10.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_policy_administration:10.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_policy_administration:11.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_rules_palette:10.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_rules_palette:10.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_rules_palette:10.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_rules_palette:11.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_rules_palette:11.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:4.0.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jdeveloper:11.1.1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jdeveloper:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:peoplesoft_enterprise_fin_install:9.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation:10.4.7:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation:12.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation:12.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation:12.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation:12.2.10:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation:12.2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation:12.2.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation:12.2.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation:12.2.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation:12.2.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation:12.2.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation:12.2.7:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation:12.2.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation:12.2.9:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation_connector_for_siebel:10.4.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation_for_mobile_devices:10.4.7:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation_for_mobile_devices:12.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation_for_mobile_devices:12.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation_for_mobile_devices:12.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation_for_mobile_devices:12.2.10:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation_for_mobile_devices:12.2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation_for_mobile_devices:12.2.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation_for_mobile_devices:12.2.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation_for_mobile_devices:12.2.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation_for_mobile_devices:12.2.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation_for_mobile_devices:12.2.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation_for_mobile_devices:12.2.7:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation_for_mobile_devices:12.2.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:policy_automation_for_mobile_devices:12.2.9:*:*:*:*:*:*:*;cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:rapid_planning:12.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:rapid_planning:12.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_advanced_inventory_planning:14.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_advanced_inventory_planning:15.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_clearance_optimization_engine:14.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_extract_transform_and_load:13.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_extract_transform_and_load:13.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_extract_transform_and_load:13.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_extract_transform_and_load:19.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:14.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:14.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:15.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:16.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_open_commerce_platform:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_open_commerce_platform:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_open_commerce_platform:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_service_backbone:14.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:siebel_ui_framework:18.7:*:*:*:*:*:*:*;cpe:2.3:a:oracle:siebel_ui_framework:18.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:siebel_ui_framework:18.9:*:*:*:*:*:*:*;cpe:2.3:a:oracle:soa_suite:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:soa_suite:12.2.1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:soa_suite:12.2.2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:tape_library_acsls:8.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:timesten_in-memory_database:11.2.2.8.49:*:*:*:*:*:*:*;cpe:2.3:a:oracle:utilities_advanced_spatial_and_operational_analytics:2.7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:utilities_work_and_asset_management:1.9.1.2.12:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:fuse:1.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2017-5689,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94303,"An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).",2017-05-02,Metasploit/Nuclei/CISA,cpe:2.3:h:hpe:proliant_ml10_gen9_server:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_field_pg_m3:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc547d:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_pcs_7_ipc427e:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_pcs_7_ipc477d:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_pcs_7_ipc547d:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_pcs_7_ipc547e:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_pcs_7_ipc547g:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_pcs_7_ipc627c:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_pcs_7_ipc647c:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_pcs_7_ipc647d:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_pcs_7_ipc677c:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_pcs_7_ipc847c:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simatic_pcs_7_ipc847d:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:simotion_p320-4_s:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:sinumerik_pcu_50.5-p:-:*:*:*:*:*:*:*;cpe:2.3:o:hpe:proliant_ml10_gen9_server_firmware:5.0:*:*:*:*:*:*:*;cpe:2.3:o:intel:active_management_technology_firmware:10.0:*:*:*:*:*:*:*;cpe:2.3:o:intel:active_management_technology_firmware:11.0:*:*:*:*:*:*:*;cpe:2.3:o:intel:active_management_technology_firmware:11.5:*:*:*:*:*:*:*;cpe:2.3:o:intel:active_management_technology_firmware:11.6:*:*:*:*:*:*:*;cpe:2.3:o:intel:active_management_technology_firmware:6.0:*:*:*:*:*:*:*;cpe:2.3:o:intel:active_management_technology_firmware:6.1:*:*:*:*:*:*:*;cpe:2.3:o:intel:active_management_technology_firmware:6.2:*:*:*:*:*:*:*;cpe:2.3:o:intel:active_management_technology_firmware:7.0:*:*:*:*:*:*:*;cpe:2.3:o:intel:active_management_technology_firmware:7.1:*:*:*:*:*:*:*;cpe:2.3:o:intel:active_management_technology_firmware:8.0:*:*:*:*:*:*:*;cpe:2.3:o:intel:active_management_technology_firmware:8.1:*:*:*:*:*:*:*;cpe:2.3:o:intel:active_management_technology_firmware:9.0:*:*:*:*:*:*:*;cpe:2.3:o:intel:active_management_technology_firmware:9.1:*:*:*:*:*:*:*;cpe:2.3:o:intel:active_management_technology_firmware:9.5:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_field_pg_m3_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc427d_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:-:*:*:*;cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:pro:*:*:*;cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc547d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_pcs_7_ipc427e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_pcs_7_ipc427e_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_pcs_7_ipc477d_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_pcs_7_ipc547d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_pcs_7_ipc547e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_pcs_7_ipc547g_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_pcs_7_ipc627c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_pcs_7_ipc647c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_pcs_7_ipc647d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_pcs_7_ipc677c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_pcs_7_ipc847c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simatic_pcs_7_ipc847d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:simotion_p320-4_s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:sinumerik_pcu50.5-p_firmware:*:*:*:*:*:*:*:* CVE-2017-5816,0.0,,0.9022,A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 was found.,2018-02-15,Metasploit,cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:7.3:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:7.3:e0503p02:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:* CVE-2017-5817,0.0,,0.83249,A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 was found.,2018-02-15,Metasploit,cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:7.3:*:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:7.3:e0503p02:*:*:*:*:*:*;cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:* CVE-2017-5868,0.0,,0.05514,"CRLF injection vulnerability in the web interface in OpenVPN Access Server 2.1.4 allows remote attackers to inject arbitrary HTTP headers and consequently conduct session fixation attacks and possibly HTTP response splitting attacks via ""%0A"" characters in the PATH_INFO to __session_start__/.",2017-05-26,Nuclei,cpe:2.3:a:openvpn:openvpn_access_server:2.1.4:*:*:*:*:*:*:* CVE-2017-5871,0.0,,0.02676,Odoo Version <= 8.0-20160726 and Version 9 is affected by: CWE-601: Open redirection. The impact is: obtain sensitive information (remote).,2019-05-22,Nuclei,cpe:2.3:a:odoo:odoo:10.0:*:*:*:*:*:*:*;cpe:2.3:a:odoo:odoo:8.0:*:*:*:*:*:*:*;cpe:2.3:a:odoo:odoo:8.0:20160726:*:*:*:*:*:*;cpe:2.3:a:odoo:odoo:9.0:*:*:*:*:*:*:* CVE-2017-5930,2.7,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N,0.39864,"The AliasHandler component in PostfixAdmin before 3.0.2 allows remote authenticated domain admins to delete protected aliases via the delete parameter to delete.php, involving a missing permission check.",2017-03-20,Metasploit,cpe:2.3:a:postfixadmin_project:postfixadmin:*:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:* CVE-2017-5982,0.0,,0.8642,"Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.",2017-02-28,Metasploit/Nuclei,cpe:2.3:a:kodi:kodi:17.1:*:*:*:*:*:*:* CVE-2017-6048,0.0,,0.45622,"A Command Injection issue was discovered in Satel Iberia SenNet Data Logger and Electricity Meters: SenNet Optimal DataLogger V5.37c-1.43c and prior, SenNet Solar Datalogger V5.03-1.56a and prior, and SenNet Multitask Meter V5.21a-1.18b and prior. Successful exploitation of this vulnerability could result in the attacker breaking out of the jailed shell and gaining full access to the system.",2017-05-19,Metasploit,cpe:2.3:a:satel-iberia:sennet_multitask_meter:*:*:*:*:*:*:*:*;cpe:2.3:a:satel-iberia:sennet_optimal_datalogger:*:*:*:*:*:*:*:*;cpe:2.3:a:satel-iberia:sennet_solar_datalogger:*:*:*:*:*:*:*:* CVE-2017-6077,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.87653,ping.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ping_IPAddr field of an HTTP POST request.,2017-02-22,CISA,cpe:2.3:h:netgear:dgn2200:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:dgn2200_firmware:*:*:*:*:*:*:*:* CVE-2017-6090,0.0,,0.83926,"Unrestricted file upload vulnerability in clients/editclient.php in PhpCollab 2.5.1 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in logos_clients/.",2017-10-03,Metasploit/Nuclei,cpe:2.3:a:phpcollab:phpcollab:*:*:*:*:*:*:*:* CVE-2017-6168,0.0,,0.68107,"On BIG-IP versions 11.6.0-11.6.2 (fixed in 11.6.2 HF1), 12.0.0-12.1.2 HF1 (fixed in 12.1.2 HF2), or 13.0.0-13.0.0 HF2 (fixed in 13.0.0 HF3) a virtual server configured with a Client SSL profile may be vulnerable to an Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) against RSA, which when exploited, may result in plaintext recovery of encrypted messages and/or a Man-in-the-middle (MiTM) attack, despite the attacker not having gained access to the server's private key itself, aka a ROBOT attack.",2017-11-17,Metasploit,cpe:2.3:a:f5:big-ip_afm:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_afm:13.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_analytics:13.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_apm:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_apm:13.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_asm:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_asm:13.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_link_controller:13.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_ltm:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_ltm:13.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_pem:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:big-ip_pem:13.0.0:*:*:*:*:*:*:*;cpe:2.3:a:f5:websafe:*:*:*:*:*:*:*:*;cpe:2.3:a:f5:websafe:11.6.2:*:*:*:*:*:*:*;cpe:2.3:a:f5:websafe:13.0.0:*:*:*:*:*:*:* CVE-2017-6187,0.0,,0.69378,Buffer overflow in the built-in web server in DiskSavvy Enterprise 9.4.18 allows remote attackers to execute arbitrary code via a long URI in a GET request.,2017-02-22,Metasploit,cpe:2.3:a:disksavvy:disksavvy_enterprise:9.4.18:*:*:*:*:*:*:* CVE-2017-6316,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.88432,"Citrix NetScaler SD-WAN devices through v9.1.2.26.561201 allow remote attackers to execute arbitrary shell commands as root via a CGISESSID cookie. On CloudBridge (the former name of NetScaler SD-WAN) devices, the cookie name was CAKEPHP rather than CGISESSID.",2017-07-20,CISA,cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:* CVE-2017-6326,0.0,,0.70462,"The Symantec Messaging Gateway can encounter an issue of remote code execution, which describes a situation whereby an individual may obtain the ability to execute commands remotely on a target machine or in a target process.",2017-06-26,Metasploit,cpe:2.3:a:symantec:messaging_gateway:*:*:*:*:*:*:*:* CVE-2017-6327,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.85196,"The Symantec Messaging Gateway before 10.6.3-267 can encounter an issue of remote code execution, which describes a situation whereby an individual may obtain the ability to execute commands remotely on a target machine or in a target process. In this type of occurrence, after gaining access to the system, the attacker may attempt to elevate their privileges.",2017-08-11,CISA,cpe:2.3:a:symantec:message_gateway:*:*:*:*:*:*:*:* CVE-2017-6334,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.91073,"dnslookup.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the host_name field of an HTTP POST request, a different vulnerability than CVE-2017-6077.",2017-03-06,Metasploit/CISA,cpe:2.3:h:netgear:dgn2200v1:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:dgn2200v2:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:dgn2200v3:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:dgn2200v4:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:dgn2200_series_firmware:*:*:*:*:*:*:*:* CVE-2017-6398,0.0,,0.6462,"An issue was discovered in Trend Micro InterScan Messaging Security (Virtual Appliance) 9.1-1600. An authenticated user can execute a terminal command in the context of the web server user (which is root). Besides, the default installation of IMSVA comes with default administrator credentials. The saveCert.imss endpoint takes several user inputs and performs blacklisting. After that, it uses them as arguments to a predefined operating-system command without proper sanitization. However, because of an improper blacklisting rule, it's possible to inject arbitrary commands into it.",2017-03-14,Metasploit,cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:9.1-1600:*:*:*:*:*:*:* CVE-2017-6416,0.0,,0.64638,"An issue was discovered in SysGauge 1.5.18. A buffer overflow vulnerability in SMTP connection verification leads to arbitrary code execution. The attack vector is a crafted SMTP daemon that sends a long 220 (aka ""Service ready"") string.",2017-03-06,Metasploit,cpe:2.3:a:flexense:sysgauge:1.5.18:*:*:*:*:*:*:* CVE-2017-6510,0.0,,0.59811,Easy File Sharing FTP Server version 3.6 is vulnerable to a directory traversal vulnerability which allows an attacker to list and download any file from any folder outside the FTP root Directory.,2017-03-16,Metasploit,cpe:2.3:a:efssoft:easy_file_sharing_ftp_server:*:*:*:*:*:*:*:* CVE-2017-6516,0.0,,0.21359,A Local Privilege Escalation Vulnerability in MagniComp's Sysinfo before 10-H64 for Linux and UNIX platforms could allow a local attacker to gain elevated privileges. Parts of SysInfo require setuid-to-root access in order to access restricted system files and make restricted kernel calls. This access could be exploited by a local attacker to gain a root shell prompt using the right combination of environment variables and command line arguments.,2017-03-14,Metasploit,cpe:2.3:a:magnicomp:sysinfo:*:*:*:*:*:*:*:* CVE-2017-6526,0.0,,0.8373,An issue was discovered in dnaTools dnaLIMS 4-2015s13. dnaLIMS is vulnerable to unauthenticated command execution through an improperly protected administrative web shell (cgi-bin/dna/sysAdmin.cgi POST requests).,2017-03-09,Metasploit,cpe:2.3:a:dnatools:dnalims:4-2015s13:*:*:*:*:*:*:* CVE-2017-6527,0.0,,0.75905,An issue was discovered in dnaTools dnaLIMS 4-2015s13. dnaLIMS is vulnerable to a NUL-terminated directory traversal attack allowing an unauthenticated attacker to access system files readable by the web server user (by using the viewAppletFsa.cgi seqID parameter).,2017-03-09,Metasploit,cpe:2.3:a:dnatools:dnalims:4-2015s13:*:*:*:*:*:*:* CVE-2017-6553,0.0,,0.74037,Buffer Overflow in Quest One Identity Privilege Manager for Unix before 6.0.0.061 allows remote attackers to obtain full access to the policy server via an ACT_ALERT_EVENT request that causes memory corruption in the pmmasterd daemon.,2017-04-29,Metasploit,cpe:2.3:a:quest:privilege_manager_for_unix:*:*:*:*:*:*:*:* CVE-2017-6627,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.10886,"A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 through 3.18 could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle without closing them. An attacker could exploit this vulnerability by sending UDP packets with a destination port of 0 to an affected device. A successful exploit could allow the attacker to cause UDP packets to be held in the input interfaces queue, resulting in a DoS condition. The input interface queue will stop holding UDP packets when it receives 250 packets. Cisco Bug IDs: CSCup10024, CSCva55744, CSCva95506.",2017-09-07,CISA,cpe:2.3:o:cisco:ios:15.1\(2\)gc1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(2\)gc2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(2\)gc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(4\)gc1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(4\)gc2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(4\)gc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(1\)gc1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(1\)gc2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(1\)gc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)gc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)gc1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)gc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3r\)gca:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)gc1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)gc2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)gc3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)gc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)t3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)t4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(2\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(2\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(2\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m2.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m6a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m7:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.3vs:*:*:*:*:*:*:* CVE-2017-6663,6.5,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.01688,"A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in a denial of service (DoS) condition. More Information: CSCvd88936. Known Affected Releases: Denali-16.2.1 Denali-16.3.1.",2017-08-07,CISA,cpe:2.3:o:cisco:ios:15.2\(3\)e1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)e2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)e3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)e4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)e5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3a\)e1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3a\)e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3m\)e2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3m\)e3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3m\)e6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3m\)e8:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)e1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)e2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)e3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(5\)e1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(5\)e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(5a\)e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(5b\)e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)s10:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)s1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)s1a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)s2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)s3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)s4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)s5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)s6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)s7:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)s8:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)s8a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)s9:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)s1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)s2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)s3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)s4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(2\)s1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(2\)s2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(2\)s3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(2\)s4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(2\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)s1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)s2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)s3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)s4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)s5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)s5a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)s6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)s6a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)s6b:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)s7:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)s7a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)s8:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(1\)s1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(1\)s2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(1\)s3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(1\)s4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(1\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(2\)s1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(2\)s2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(2\)s3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(2\)s4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(2\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)s0a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)s1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)s1a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)s2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)s2a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)s2b:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)s3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)s3a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)s4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)s4a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)s4b:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)s4d:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)s5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)sn:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(1\)s1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(1\)s1a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(1\)s2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(1\)s3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(1\)s4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(1\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(1\)t0a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(1\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(1\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(1\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)s0a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)s1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)s2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)s3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)s4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)sn:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)sp1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)sp1b:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)sp1c:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)sp2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)sp2a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)sp3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)sp:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)t3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(3\)m0a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(3\)m1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(3\)m1b:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(3\)m2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(3\)m2a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(3\)m3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(3\)m:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.7\(3\)m:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.8.0ex:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:* CVE-2017-6736,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.84465,"The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. There are workarounds that address these vulnerabilities.",2017-07-17,CISA,cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* CVE-2017-6737,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.21614,"A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device.  The vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system. Only traffic directed to the affected system can be used to exploit this vulnerability.",2017-07-17,CISA,cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* CVE-2017-6738,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.21614,"The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. There are workarounds that address these vulnerabilities.",2017-07-17,CISA,cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* CVE-2017-6739,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.21614,"A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device.  The vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system. Only traffic directed to the affected system can be used to exploit this vulnerability.",2017-07-17,CISA,cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* CVE-2017-6740,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.14309,"The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. There are workarounds that address these vulnerabilities.",2017-07-17,CISA,cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* CVE-2017-6742,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.04809,"A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device.  The vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system. Only traffic directed to the affected system can be used to exploit this vulnerability.",2017-07-17,CISA,cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* CVE-2017-6743,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.22769,"The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. There are workarounds that address these vulnerabilities.",2017-07-17,CISA,cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* CVE-2017-6744,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.12165,"The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. There are workarounds that address these vulnerabilities.",2017-07-17,CISA,cpe:2.3:o:cisco:ios:12.2\(33\)sxi1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(33\)sxi:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)se1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)se2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)se3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)se4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)se5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)se:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sg1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sg2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sg3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sg4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sg5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sg6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sg7:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sg8:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sq1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sq2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sq3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sq4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sq5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sq6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sq7:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(50\)sq:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(52\)ex1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(52\)ex:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(52\)ey1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(52\)ey1b:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(52\)ey1c:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(52\)ey2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(52\)ey2a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(52\)ey3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(52\)ey3a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(52\)ey4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(52\)ey:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(52\)se1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(52\)se:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(52\)sg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(52\)xo:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)ex:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)ey:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)ez:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)se1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)se2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)se:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)sg10:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)sg11:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)sg1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)sg2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)sg3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)sg4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)sg5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)sg6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)sg7:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)sg8:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)sg9:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(53\)sg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(54\)se:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(54\)sg1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(54\)sg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(54\)wo:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(54\)xo:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)ex1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)ex2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)ex3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)ex:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)ey:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)ez:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)se10:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)se11:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)se1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)se2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)se3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)se4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)se5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)se6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)se7:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)se8:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)se9:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(55\)se:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(58\)ex:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(58\)ey1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(58\)ey2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(58\)ey:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(58\)ez:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(58\)se1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(58\)se2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(58\)se:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(60\)ez10:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(60\)ez11:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(60\)ez1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(60\)ez2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(60\)ez3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(60\)ez4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(60\)ez5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(60\)ez6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(60\)ez7:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(60\)ez8:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(60\)ez9:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2\(60\)ez:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(1\)ex:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(1\)ey1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(1\)ey2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(1\)ey:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(1\)se1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(1\)se2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(1\)se3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(1\)se:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(1\)xo1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(1\)xo:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ea1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)eb:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ec:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ed1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ed:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)eh:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ej1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ej:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ek1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ek:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ex10:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ex1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ex2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ex3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ex4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ex5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ex8:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ex:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ey1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ey2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ey3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ey:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)ez:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)se10:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)se10a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)se1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)se2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)se3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)se4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)se5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)se6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)se7:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)se9:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)se:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sg10:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sg11:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sg1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sg2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sg3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sg4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sg5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sg6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sg7:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sg8:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sg9:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sqd1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sqd2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sqd3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sqd5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sqd6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)sqd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2\)xo:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2a\)ex5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.0\(2a\)se9:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(1\)sg1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(1\)sg2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(1\)sg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(2\)sg1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(2\)sg2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(2\)sg3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(2\)sg4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(2\)sg5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(2\)sg6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(2\)sg7:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(2\)sg8:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.1\(2\)sg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(1\)e1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(1\)e2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(1\)e3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(1\)e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(1\)ey:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(1\)sy0a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(1\)sy1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(1\)sy1a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(1\)sy2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(1\)sy3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(1\)sy4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(1\)sy:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)e1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)e2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)e3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)e4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)e5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)e5a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)ea1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)ea2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)ea3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)eb1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)eb2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)eb:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)gc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)sy1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)sy2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)sy:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)t3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)t4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(2a\)e1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)e1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)e2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)e3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)ea:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)gc1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)gc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)t3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)t4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3a\)e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3m\)e2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(3m\)e3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)e1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)e2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)e3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)e4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)ea1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)ea3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)ea4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)ea:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)ec1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)gc1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)gc2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)gc3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)gc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)m10:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)m11:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)m1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)m2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)m3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)m4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)m5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)m6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)m6a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)m7:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)m8:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)m9:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4\)m:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4m\)e1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4m\)e3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(4p\)e1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(5\)e1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(5\)e2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(5\)e2a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(5\)e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(5\)ea:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(5\)ex:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(5a\)e1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(5a\)e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(5b\)e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.2\(5c\)e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(1\)sy2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(1\)sy:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(1\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(1\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(1\)t3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(1\)t4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(1\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(2\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(2\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(2\)t3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(2\)t4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(2\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)m1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)m2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)m3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)m4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)m5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)m6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)m7:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)m9:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.3\(3\)m:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)cg1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)cg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)sy1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)sy2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)sy:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)t3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)t4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(1\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(2\)cg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(2\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(2\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(2\)t3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(2\)t4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(2\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m6a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m7:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.4\(3\)m:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(1\)sy:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(1\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(1\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(1\)t3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(1\)t4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(1\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(2\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(2\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(2\)t3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(2\)t4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(2\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)m0a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)m1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)m2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)m3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)m4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)m4a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)m5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.5\(3\)m6:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(1\)t0a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(1\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(1\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(1\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(2\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(3\)m0a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(3\)m1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(3\)m1b:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(3\)m2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(3\)m2a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(3\)m3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:15.6\(3\)m:*:*:*:*:*:*:* CVE-2017-6862,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.5566,"NETGEAR WNR2000v3 devices before 1.1.2.14, WNR2000v4 devices before 1.0.0.66, and WNR2000v5 devices before 1.0.0.42 allow authentication bypass and remote code execution via a buffer overflow that uses a parameter in the administration webapp. The NETGEAR ID is PSV-2016-0261.",2017-05-26,CISA,cpe:2.3:h:netgear:wnr2000v3:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wnr2000v4:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:wnr2000v5:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr2000v3_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr2000v4_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netgear:wnr2000v5_firmware:*:*:*:*:*:*:*:* CVE-2017-6884,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.91113,"A command injection vulnerability was discovered on the Zyxel EMG2926 home router with firmware V1.00(AAQT.4)b8. The vulnerability is located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute arbitrary commands on the router, such as the ping_ip parameter to the expert/maintenance/diagnostic/nslookup URI.",2017-04-06,CISA,cpe:2.3:h:zyxel:emg2926:-:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:emg2926_firmware:v1.00\(aaqt.4\)b8:*:*:*:*:*:*:* CVE-2017-7230,0.0,,0.65643,A buffer overflow vulnerability in Disk Sorter Enterprise 9.5.12 and earlier allows remote attackers to execute arbitrary code via a GET request.,2017-03-22,Metasploit,cpe:2.3:a:disksorter:disk_sorter:*:*:*:*:enterprise:*:*:* CVE-2017-7269,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94374,"Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with ""If: copy to any extension.,2018-03-13,Metasploit,cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.5:*:*:*:*:*:*:* CVE-2018-1000115,0.0,,0.79854,"Memcached version 1.5.5 contains an Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability in the UDP support of the memcached server that can result in denial of service via network flood (traffic amplification of 1:50,000 has been reported by reliable sources). This attack appear to be exploitable via network connectivity to port 11211 UDP. This vulnerability appears to have been fixed in 1.5.6 due to the disabling of the UDP protocol by default.",2018-03-05,Metasploit,cpe:2.3:a:memcached:memcached:1.5.5:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2018-1000129,0.0,,0.72147,An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser.,2018-03-14,Nuclei,cpe:2.3:a:jolokia:jolokia:1.3.7:*:*:*:*:*:*:* CVE-2018-1000130,0.0,,0.91023,A JNDI Injection vulnerability exists in Jolokia agent version 1.3.7 in the proxy mode that allows a remote attacker to run arbitrary Java code on the server.,2018-03-14,Nuclei,cpe:2.3:a:jolokia:webarchive_agent:1.3.7:*:*:*:*:*:*:* CVE-2018-1000226,0.0,,0.61011,"Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Incorrect Access Control vulnerability in XMLRPC API (/cobbler_api) that can result in Privilege escalation, data manipulation or exfiltration, LDAP credential harvesting. This attack appear to be exploitable via ""network connectivity"". Taking advantage of improper validation of security tokens in API endpoints. Please note this is a different issue than CVE-2018-10931.",2018-08-20,Nuclei,cpe:2.3:a:cobblerd:cobbler:*:*:*:*:*:*:*:* CVE-2018-1000533,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92352,klaussilveira GitList version <= 0.6 contains a Passing incorrectly sanitized input to system function vulnerability in `searchTree` function that can result in Execute any code as PHP user. This attack appear to be exploitable via Send POST request using search form. This vulnerability appears to have been fixed in 0.7 after commit 87b8c26b023c3fc37f0796b14bb13710f397b322.,2018-06-26,Metasploit/Nuclei,cpe:2.3:a:gitlist:gitlist:*:*:*:*:*:*:*:* CVE-2018-1000600,0.0,,0.94112,"A exposure of sensitive information vulnerability exists in Jenkins GitHub Plugin 1.29.1 and earlier in GitHubTokenCredentialsCreator.java that allows attackers to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.",2018-06-26,Nuclei,cpe:2.3:a:jenkins:github:*:*:*:*:*:jenkins:*:* CVE-2018-1000671,0.0,,0.00883,"sympa version 6.2.16 and later contains a CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability in The ""referer"" parameter of the wwsympa.fcgi login action. that can result in Open redirection and reflected XSS via data URIs. This attack appear to be exploitable via Victim's browser must follow a URL supplied by the attacker. This vulnerability appears to have been fixed in none available.",2018-09-06,Nuclei,cpe:2.3:a:sympa:sympa:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* CVE-2018-1000856,0.0,,0.0104,DomainMOD version 4.09.03 and above. Also verified in the latest version 4.11.01 contains a Cross Site Scripting (XSS) vulnerability in Segment Name field in the segments page that can result in Arbitrary script can be executed on all users browsers who visit the affected page. This attack appear to be exploitable via Victim must visit the vulnerable page. This vulnerability appears to have been fixed in No fix yet.,2018-12-20,Nuclei,cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* CVE-2018-1000861,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94485,"A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.",2018-12-10,Metasploit/Nuclei/CISA,cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*;cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*;cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* CVE-2018-10093,0.0,,0.67728,AudioCodes IP phone 420HD devices using firmware version 2.2.12.126 allow Remote Code Execution.,2019-03-21,Nuclei,cpe:2.3:h:audiocodes:420hd_ip_phone:-:*:*:*:*:*:*:*;cpe:2.3:o:audiocodes:420hd_ip_phone_firmware:2.2.12.126:*:*:*:*:*:*:* CVE-2018-10094,0.0,,0.74413,SQL injection vulnerability in Dolibarr before 7.0.2 allows remote attackers to execute arbitrary SQL commands via vectors involving integer parameters without quotes.,2018-05-22,Metasploit,cpe:2.3:a:dolibarr:dolibarr:*:*:*:*:*:*:*:* CVE-2018-10095,0.0,,0.58066,Cross-site scripting (XSS) vulnerability in Dolibarr before 7.0.2 allows remote attackers to inject arbitrary web script or HTML via the foruserlogin parameter to adherents/cartes/carte.php.,2018-05-22,Nuclei,cpe:2.3:a:dolibarr:dolibarr:*:*:*:*:*:*:*:* CVE-2018-10141,0.0,,0.44152,GlobalProtect Portal Login page in Palo Alto Networks PAN-OS before 8.1.4 allows an unauthenticated attacker to inject arbitrary JavaScript or HTML.,2018-10-12,Nuclei,cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* CVE-2018-10201,0.0,,0.83024,"An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\ or ..../ or ....\ as a directory-traversal pattern to TCP port 8667.",2018-04-20,Nuclei,cpe:2.3:a:ncomputing:vspace_pro:10:*:*:*:*:*:*:*;cpe:2.3:a:ncomputing:vspace_pro:11:*:*:*:*:*:*:* CVE-2018-10230,0.0,,0.05194,"Zend Debugger in Zend Server before 9.1.3 has XSS, aka ZSR-2455.",2018-04-19,Nuclei,cpe:2.3:a:zend:zend_server:*:*:*:*:*:*:*:* CVE-2018-10383,0.0,,0.05855,Lantronix SecureLinx Spider (SLS) 2.2+ devices have XSS in the auth.asp login page.,2019-05-02,Nuclei,cpe:2.3:h:lantronix:securelinx_spider:-:*:*:*:*:*:*:*;cpe:2.3:o:lantronix:securelinx_spider_firmware:*:*:*:*:*:*:*:* CVE-2018-10561,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92017,"An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending ""?images"" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device.",2018-05-04,CISA,cpe:2.3:h:dasannetworks:gpon_router:-:*:*:*:*:*:*:*;cpe:2.3:o:dasannetworks:gpon_router_firmware:-:*:*:*:*:*:*:* CVE-2018-10562,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94028,"An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.",2018-05-04,Nuclei/CISA,cpe:2.3:h:dasannetworks:gpon_router:-:*:*:*:*:*:*:*;cpe:2.3:o:dasannetworks:gpon_router_firmware:-:*:*:*:*:*:*:* CVE-2018-10583,0.0,,0.72646,"An information disclosure vulnerability occurs when LibreOffice 6.0.3 and Apache OpenOffice Writer 4.1.5 automatically process and initiate an SMB connection embedded in a malicious file, as demonstrated by xlink:href=file://192.168.0.2/test.jpg within an office:document-content element in a .odt XML document.",2018-05-01,Metasploit,cpe:2.3:a:apache:openoffice:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:libreoffice:libreoffice:6.0.3:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2018-10594,0.0,,0.78809,"Delta Industrial Automation COMMGR from Delta Electronics versions 1.08 and prior with accompanying PLC Simulators (DVPSimulator EH2, EH3, ES2, SE, SS2 and AHSIM_5x0, AHSIM_5x1) utilize a fixed-length stack buffer where an unverified length value can be read from the network packets via a specific network port, causing the buffer to be overwritten. This may allow remote code execution, cause the application to crash, or result in a denial-of-service condition in the application server.",2018-06-26,Metasploit,cpe:2.3:a:deltaww:commgr:*:*:*:*:*:*:*:*;cpe:2.3:h:deltaww:dvpsimulator_ahsim_5x0:-:*:*:*:*:*:*:*;cpe:2.3:h:deltaww:dvpsimulator_ahsim_5x1:-:*:*:*:*:*:*:*;cpe:2.3:h:deltaww:dvpsimulator_eh2:-:*:*:*:*:*:*:*;cpe:2.3:h:deltaww:dvpsimulator_es2:-:*:*:*:*:*:*:*;cpe:2.3:h:deltaww:dvpsimulator_h3:-:*:*:*:*:*:*:*;cpe:2.3:h:deltaww:dvpsimulator_se:-:*:*:*:*:*:*:*;cpe:2.3:h:deltaww:dvpsimulator_ss2:-:*:*:*:*:*:*:* CVE-2018-10660,0.0,,0.90022,An issue was discovered in multiple models of Axis IP Cameras. There is Shell Command Injection.,2018-06-26,Metasploit,cpe:2.3:h:axis:a1001:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:a8004-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:a8105-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:a9161:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:a9188-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:a9188:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:c1004-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:c2005:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:c3003-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:c8033:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_bullet_le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_c360:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_cube_l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_cube_lw:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_dome_v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_dome_wv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_eye_l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_eye_lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_recorder_4ch:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_recorder_8ch:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:d201-s_xpt_q6055:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:d2050-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:f34_main_unit:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:f41_main_unit:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:f44_dual_audio_input:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:f44_main_unit:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:fa54_main_unit:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1004-w:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1013:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1014:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1025:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1033-w:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1034-w:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1045-lw:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1054:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1065-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1065-lw:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1103:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1104:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1113-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1113:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1114-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1114:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1124-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1124:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1125-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1125:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1143-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1144-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1145-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1145:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m2014-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m2025-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m2026-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m2026-le_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3004-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3005-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3006-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3007-p:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3007-pv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3014:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3015:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3016:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3024-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3025-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3026-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3027-pve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3037-pve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3044-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3044-wv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3045-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3045-wv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3046-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3046-v_1.8mm:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3047-p:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3048-p:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3104-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3104-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3105-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3105-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3106-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3106-l_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3106-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3106-lve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3113-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3113-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3114-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3114-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3203-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3203:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3204-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3204:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5013-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5013:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5014-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5014:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5054:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5055:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5065:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5525-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m7010:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m7011:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m7014:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m7016:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1125-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1125-zl:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1126-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1126-zl:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1204:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1214-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1214:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1224-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1244:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1245:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1254:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1264:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1265:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1275:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1280:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1290:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1325-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1343-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1343:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1344-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1344:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1346-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1346:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1347-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1347:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1353-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1353:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1354-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1354:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1355-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1355:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1357-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1357:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1364-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1364:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1365-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1365-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1365:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1365_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1367-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1367:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1368-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1405-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1405-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1405-le_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1425-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1425-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1425-le_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1427-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1427-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1428-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1435-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1435-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1447-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1448-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3114-i:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3114-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3115-i:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3115-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3125-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3214-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3214-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3215-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3215-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-lv_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-lve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-v_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-ve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-lv_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-lve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-v_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-ve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3227-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3227-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3228-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3228-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3301-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3301:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3304-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3304:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3314-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3314-zl:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3315-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3315-zl:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3343-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3343-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3343:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3344-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3344-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3344:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3346-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3346-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3346:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3353:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3354:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3363-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3363-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3364-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3364-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3364-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3364-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3365-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3365-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3367-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3367-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3374-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3374-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3375-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3375-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3375-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3375-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3384-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3384-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3705-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3706-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3707-pe:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3904-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3904-r_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3905-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3905-r_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3905-re:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3915-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3915-r_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5414-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5415-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5512-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5512:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5514-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5514:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5515-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5515:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5522-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5522:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5532-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5532:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5534-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5534:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5544:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5624-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5624-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5635-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5635-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5635-ze:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p7210:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p7214:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p7216:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p7224_blade:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p8513:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p8514:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p8524:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1602-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1602:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1604-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1604:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1605-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1614-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1614:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1615-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1615-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1615:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1615_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1635-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1635-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1635:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1645:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1647:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1659:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1755-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1755:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1765-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1765-le_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1775-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1775:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1910-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1910:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1921-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1921:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1922-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1922:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1931-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1931-e_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1932-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1932-e_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1941-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1941-e_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1942-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1942-e_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q2901-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q2901-e_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3504-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3504-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3505-sve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3505-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3505-v_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3505-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3505-ve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3515-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3515-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3517-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3517-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3615-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3617-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3708-pve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3709-pve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6000-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6000-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6032-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6032-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6032:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6034-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6034-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6034:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6035-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6035-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6035:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6042-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6042-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6042-s:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6042:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6044-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6044-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6044-s:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6044:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-c_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-s:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-s_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6052-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6052:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6054-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6054-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6054:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6054_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6055-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6055-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6055-s:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6055:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6114-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6115-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6124-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6125-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6128-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6155-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7401:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7404:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7406_blade:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7411:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7414_blade:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7424-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7424-r_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7436_blade:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8414-lvs:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8631-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8632-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8641-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8642-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8655-zle:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8665-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8665-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8675-ze:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8685-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8685-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8721-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8722-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8741-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8741-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8742-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8742-e_zoom:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8742-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8742-le_zoom:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:v5914:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:v5915:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xf40-q1765:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xf40-q2901:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xf60-q2901:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xp40-q1765:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xp40-q1942:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xp60-q1765:-:*:*:*:*:*:*:*;cpe:2.3:o:axis:a1001_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:a8004-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:a8105-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:a9161_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:a9188-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:a9188_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:c1004-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:c2005_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:c3003-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:c8033_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_bullet_le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_c360_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_cube_l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_cube_lw_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_dome_v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_dome_wv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_eye_l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_eye_lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_recorder_4ch_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_recorder_8ch_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:d201-s_xpt_q6055_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:d2050-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:f34_main_unit_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:f41_main_unit_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:f44_dual_audio_input_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:f44_main_unit_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:fa54_main_unit_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1004-w_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1013_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1014_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1025_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1033-w_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1034-w_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1045-lw_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1054_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1065-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1065-lw_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1103_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1104_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1113-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1113_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1114-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1114_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1124-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1124_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1125-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1125_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1143-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1144-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1145-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1145_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m2014-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m2025-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m2026-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m2026-le_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3004-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3005-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3006-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3007-p_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3007-pv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3014_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3015_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3016_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3024-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3025-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3026-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3027-pve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3037-pve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3044-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3044-wv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3045-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3045-wv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3046-v_1.8mm_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3046-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3047-p_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3048-p_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3104-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3104-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3105-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3105-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3106-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3106-l_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3106-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3106-lve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3113-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3113-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3114-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3114-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3203-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3203_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3204-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3204_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5013-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5013_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5014-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5014_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5054_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5055_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5065_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5525-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m7010_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m7011_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m7014_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m7016_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1125-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1125-zl_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1126-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1126-zl_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1204_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1214-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1214_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1224-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1244_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1245_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1254_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1264_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1265_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1275_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1280_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1290_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1325-z_firmware:7.10.1.1:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1343-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1343_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1344-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1344_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1346-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1346_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1347-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1347_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1353-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1353_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1354-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1354_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1355-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1355_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1357-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1357_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1364-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1364_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1365-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1365-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1365_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1365_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1367-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1367_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1368-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1405-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1405-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1405-le_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1425-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1425-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1425-le_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1427-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1427-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1428-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1435-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1435-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1447-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1448-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3114-i_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3114-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3115-i_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3115-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3125-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3214-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3214-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3215-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3215-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-lv_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-lve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-v_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-ve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-lv_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-lve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-v_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-ve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3227-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3227-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3228-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3228-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3301-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3301_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3304-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3304_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3314-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3314-zl_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3315-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3315-zl_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3343-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3343-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3343_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3344-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3344-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3344_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3346-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3346-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3346_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3353_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3354_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3363-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3363-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3364-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3364-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3364-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3364-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3365-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3365-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3367-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3367-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3374-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3374-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3375-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3375-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3375-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3375-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3384-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3384-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3705-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3706-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3707-pe_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3904-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3904-r_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3905-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3905-r_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3905-re_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3915-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3915-r_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5414-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5415-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5512-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5512_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5514-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5514_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5515-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5515_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5522-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5522_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5532-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5532_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5534-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5534_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5544_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5624-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5624-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5635-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5635-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5635-ze_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p7210_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p7214_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p7216_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p7224_blade_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p8513_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p8514_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p8524_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1602-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1602_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1604-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1604_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1605-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1614-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1614_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1615-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1615-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1615_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1615_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1635-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1635-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1635_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1645_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1647_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1659_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1755-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1755_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1765-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1765-le_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1775-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1775_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1910-e_firmware:5.51.5:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1910_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1921-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1921_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1922-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1922_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1931-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1931-e_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1932-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1932-e_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1941-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1941-e_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1942-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1942-e_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q2901-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q2901-e_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3504-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3504-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3505-sve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3505-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3505-v_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3505-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3505-ve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3515-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3515-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3517-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3517-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3615-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3617-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3708-pve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3709-pve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6000-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6000-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6032-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6032-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6032_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6034-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6034-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6034_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6035-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6035-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6035_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6042-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6042-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6042-s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6042_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6044-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6044-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6044-s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6044_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-c_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-s_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6052-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6052_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6054-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6054-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6054_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6054_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6055-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6055-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6055-s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6055_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6114-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6115-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6124-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6125-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6128-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6155-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7401_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7404_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7406_blade_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7411_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7414_blade_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7424-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7424-r_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7436_blade_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8414-lvs_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8631-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8632-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8641-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8642-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8655-zle_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8665-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8665-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8675-ze_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8685-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8685-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8721-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8722-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8741-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8741-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8742-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8742-e_zoom_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8742-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8742-le_zoom_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:v5914_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:v5915_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xf40-q1765_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xf40-q2901_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xf60-q2901_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xp40-q1765_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xp40-q1942_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xp60-q1765_firmware:*:*:*:*:*:*:*:* CVE-2018-10661,0.0,,0.90019,An issue was discovered in multiple models of Axis IP Cameras. There is a bypass of access control.,2018-06-26,Metasploit,cpe:2.3:h:axis:a1001:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:a8004-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:a8105-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:a9161:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:a9188-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:a9188:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:c1004-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:c2005:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:c3003-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:c8033:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_bullet_le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_c360:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_cube_l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_cube_lw:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_dome_v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_dome_wv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_eye_l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_eye_lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_recorder_4ch:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_recorder_8ch:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:d201-s_xpt_q6055:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:d2050-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:f34_main_unit:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:f41_main_unit:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:f44_dual_audio_input:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:f44_main_unit:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:fa54_main_unit:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1004-w:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1013:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1014:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1025:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1033-w:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1034-w:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1045-lw:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1054:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1065-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1065-lw:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1103:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1104:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1113-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1113:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1114-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1114:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1124-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1124:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1125-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1125:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1143-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1144-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1145-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1145:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m2014-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m2025-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m2026-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m2026-le_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3004-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3005-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3006-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3007-p:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3007-pv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3014:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3015:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3016:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3024-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3025-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3026-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3027-pve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3037-pve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3044-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3044-wv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3045-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3045-wv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3046-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3046-v_1.8mm:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3047-p:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3048-p:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3104-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3104-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3105-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3105-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3106-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3106-l_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3106-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3106-lve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3113-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3113-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3114-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3114-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3203-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3203:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3204-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3204:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5013-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5013:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5014-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5014:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5054:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5055:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5065:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5525-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m7010:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m7011:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m7014:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m7016:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1125-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1125-zl:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1126-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1126-zl:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1204:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1214-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1214:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1224-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1244:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1245:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1254:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1264:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1265:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1275:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1280:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1290:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1325-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1343-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1343:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1344-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1344:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1346-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1346:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1347-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1347:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1353-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1353:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1354-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1354:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1355-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1355:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1357-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1357:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1364-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1364:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1365-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1365-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1365:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1365_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1367-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1367:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1368-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1405-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1405-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1405-le_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1425-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1425-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1425-le_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1427-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1427-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1428-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1435-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1435-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1447-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1448-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3114-i:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3114-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3115-i:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3115-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3125-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3214-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3214-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3215-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3215-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-lv_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-lve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-v_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-ve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-lv_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-lve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-v_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-ve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3227-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3227-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3228-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3228-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3301-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3301:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3304-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3304:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3314-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3314-zl:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3315-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3315-zl:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3343-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3343-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3343:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3344-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3344-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3344:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3346-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3346-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3346:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3353:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3354:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3363-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3363-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3364-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3364-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3364-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3364-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3365-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3365-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3367-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3367-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3374-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3374-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3375-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3375-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3375-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3375-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3384-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3384-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3705-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3706-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3707-pe:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3904-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3904-r_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3905-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3905-r_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3905-re:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3915-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3915-r_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5414-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5415-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5512-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5512:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5514-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5514:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5515-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5515:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5522-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5522:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5532-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5532:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5534-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5534:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5544:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5624-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5624-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5635-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5635-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5635-ze:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p7210:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p7214:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p7216:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p7224_blade:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p8513:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p8514:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p8524:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1602-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1602:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1604-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1604:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1605-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1614-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1614:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1615-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1615-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1615:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1615_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1635-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1635-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1635:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1645:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1647:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1659:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1755-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1755:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1765-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1765-le_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1775-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1775:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1910-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1910:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1921-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1921:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1922-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1922:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1931-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1931-e_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1932-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1932-e_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1941-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1941-e_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1942-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1942-e_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q2901-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q2901-e_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3504-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3504-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3505-sve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3505-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3505-v_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3505-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3505-ve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3515-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3515-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3517-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3517-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3615-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3617-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3708-pve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3709-pve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6000-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6000-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6032-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6032-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6032:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6034-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6034-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6034:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6035-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6035-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6035:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6042-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6042-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6042-s:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6042:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6044-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6044-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6044-s:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6044:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-c_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-s:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-s_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6052-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6052:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6054-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6054-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6054:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6054_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6055-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6055-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6055-s:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6055:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6114-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6115-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6124-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6125-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6128-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6155-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7401:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7404:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7406_blade:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7411:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7414_blade:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7424-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7424-r_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7436_blade:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8414-lvs:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8631-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8632-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8641-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8642-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8655-zle:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8665-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8665-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8675-ze:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8685-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8685-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8721-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8722-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8741-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8741-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8742-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8742-e_zoom:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8742-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8742-le_zoom:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:v5914:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:v5915:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xf40-q1765:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xf40-q2901:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xf60-q2901:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xp40-q1765:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xp40-q1942:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xp60-q1765:-:*:*:*:*:*:*:*;cpe:2.3:o:axis:a1001_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:a8004-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:a8105-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:a9161_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:a9188-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:a9188_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:c1004-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:c2005_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:c3003-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:c8033_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_bullet_le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_c360_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_cube_l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_cube_lw_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_dome_v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_dome_wv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_eye_l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_eye_lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_recorder_4ch_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_recorder_8ch_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:d201-s_xpt_q6055_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:d2050-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:f34_main_unit_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:f41_main_unit_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:f44_dual_audio_input_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:f44_main_unit_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:fa54_main_unit_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1004-w_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1013_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1014_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1025_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1033-w_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1034-w_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1045-lw_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1054_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1065-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1065-lw_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1103_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1104_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1113-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1113_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1114-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1114_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1124-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1124_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1125-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1125_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1143-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1144-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1145-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1145_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m2014-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m2025-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m2026-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m2026-le_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3004-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3005-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3006-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3007-p_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3007-pv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3014_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3015_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3016_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3024-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3025-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3026-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3027-pve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3037-pve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3044-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3044-wv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3045-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3045-wv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3046-v_1.8mm_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3046-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3047-p_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3048-p_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3104-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3104-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3105-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3105-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3106-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3106-l_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3106-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3106-lve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3113-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3113-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3114-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3114-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3203-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3203_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3204-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3204_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5013-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5013_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5014-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5014_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5054_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5055_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5065_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5525-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m7010_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m7011_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m7014_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m7016_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1125-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1125-zl_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1126-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1126-zl_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1204_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1214-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1214_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1224-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1244_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1245_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1254_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1264_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1265_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1275_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1280_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1290_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1325-z_firmware:7.10.1.1:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1343-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1343_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1344-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1344_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1346-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1346_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1347-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1347_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1353-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1353_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1354-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1354_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1355-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1355_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1357-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1357_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1364-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1364_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1365-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1365-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1365_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1365_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1367-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1367_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1368-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1405-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1405-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1405-le_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1425-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1425-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1425-le_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1427-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1427-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1428-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1435-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1435-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1447-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1448-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3114-i_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3114-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3115-i_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3115-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3125-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3214-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3214-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3215-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3215-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-lv_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-lve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-v_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-ve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-lv_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-lve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-v_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-ve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3227-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3227-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3228-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3228-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3301-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3301_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3304-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3304_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3314-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3314-zl_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3315-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3315-zl_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3343-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3343-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3343_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3344-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3344-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3344_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3346-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3346-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3346_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3353_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3354_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3363-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3363-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3364-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3364-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3364-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3364-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3365-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3365-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3367-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3367-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3374-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3374-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3375-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3375-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3375-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3375-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3384-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3384-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3705-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3706-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3707-pe_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3904-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3904-r_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3905-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3905-r_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3905-re_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3915-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3915-r_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5414-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5415-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5512-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5512_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5514-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5514_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5515-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5515_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5522-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5522_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5532-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5532_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5534-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5534_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5544_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5624-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5624-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5635-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5635-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5635-ze_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p7210_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p7214_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p7216_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p7224_blade_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p8513_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p8514_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p8524_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1602-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1602_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1604-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1604_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1605-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1614-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1614_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1615-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1615-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1615_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1615_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1635-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1635-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1635_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1645_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1647_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1659_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1755-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1755_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1765-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1765-le_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1775-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1775_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1910-e_firmware:5.51.5:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1910_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1921-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1921_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1922-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1922_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1931-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1931-e_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1932-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1932-e_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1941-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1941-e_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1942-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1942-e_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q2901-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q2901-e_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3504-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3504-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3505-sve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3505-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3505-v_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3505-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3505-ve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3515-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3515-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3517-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3517-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3615-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3617-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3708-pve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3709-pve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6000-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6000-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6032-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6032-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6032_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6034-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6034-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6034_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6035-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6035-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6035_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6042-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6042-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6042-s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6042_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6044-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6044-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6044-s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6044_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-c_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-s_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6052-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6052_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6054-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6054-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6054_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6054_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6055-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6055-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6055-s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6055_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6114-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6115-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6124-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6125-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6128-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6155-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7401_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7404_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7406_blade_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7411_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7414_blade_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7424-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7424-r_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7436_blade_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8414-lvs_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8631-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8632-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8641-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8642-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8655-zle_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8665-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8665-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8675-ze_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8685-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8685-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8721-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8722-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8741-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8741-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8742-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8742-e_zoom_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8742-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8742-le_zoom_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:v5914_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:v5915_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xf40-q1765_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xf40-q2901_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xf60-q2901_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xp40-q1765_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xp40-q1942_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xp60-q1765_firmware:*:*:*:*:*:*:*:* CVE-2018-10662,0.0,,0.88615,An issue was discovered in multiple models of Axis IP Cameras. There is an Exposed Insecure Interface.,2018-06-26,Metasploit,cpe:2.3:h:axis:a1001:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:a8004-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:a8105-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:a9161:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:a9188-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:a9188:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:c1004-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:c2005:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:c3003-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:c8033:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_bullet_le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_c360:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_cube_l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_cube_lw:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_dome_v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_dome_wv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_eye_l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_eye_lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_recorder_4ch:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:companion_recorder_8ch:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:d201-s_xpt_q6055:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:d2050-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:f34_main_unit:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:f41_main_unit:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:f44_dual_audio_input:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:f44_main_unit:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:fa54_main_unit:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1004-w:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1013:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1014:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1025:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1033-w:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1034-w:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1045-lw:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1054:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1065-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1065-lw:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1103:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1104:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1113-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1113:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1114-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1114:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1124-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1124:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1125-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1125:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1143-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1144-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1145-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m1145:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m2014-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m2025-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m2026-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m2026-le_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3004-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3005-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3006-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3007-p:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3007-pv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3014:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3015:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3016:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3024-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3025-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3026-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3027-pve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3037-pve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3044-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3044-wv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3045-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3045-wv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3046-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3046-v_1.8mm:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3047-p:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3048-p:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3104-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3104-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3105-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3105-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3106-l:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3106-l_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3106-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3106-lve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3113-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3113-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3114-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3114-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3203-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3203:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3204-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m3204:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5013-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5013:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5014-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5014:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5054:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5055:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5065:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m5525-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m7010:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m7011:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m7014:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:m7016:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1125-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1125-zl:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1126-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1126-zl:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1204:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1214-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1214:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1224-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1244:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1245:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1254:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1264:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1265:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1275:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1280:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1290:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1325-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1343-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1343:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1344-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1344:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1346-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1346:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1347-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1347:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1353-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1353:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1354-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1354:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1355-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1355:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1357-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1357:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1364-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1364:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1365-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1365-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1365:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1365_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1367-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1367:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1368-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1405-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1405-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1405-le_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1425-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1425-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1425-le_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1427-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1427-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1428-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1435-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1435-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1447-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p1448-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3114-i:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3114-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3115-i:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3115-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3125-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3214-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3214-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3215-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3215-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-lv_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-lve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-v_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3224-ve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-lv_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-lve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-v_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3225-ve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3227-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3227-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3228-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3228-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3301-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3301:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3304-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3304:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3314-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3314-zl:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3315-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3315-zl:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3343-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3343-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3343:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3344-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3344-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3344:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3346-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3346-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3346:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3353:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3354:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3363-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3363-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3364-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3364-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3364-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3364-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3365-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3365-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3367-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3367-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3374-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3374-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3375-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3375-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3375-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3375-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3384-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3384-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3705-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3706-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3707-pe:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3904-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3904-r_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3905-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3905-r_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3905-re:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3915-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p3915-r_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5414-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5415-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5512-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5512:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5514-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5514:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5515-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5515:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5522-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5522:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5532-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5532:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5534-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5534:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5544:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5624-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5624-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5635-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5635-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p5635-ze:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p7210:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p7214:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p7216:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p7224_blade:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p8513:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p8514:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:p8524:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1602-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1602:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1604-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1604:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1605-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1614-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1614:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1615-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1615-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1615:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1615_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1635-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1635-z:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1635:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1645:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1647:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1659:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1755-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1755:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1765-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1765-le_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1775-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1775:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1910-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1910:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1921-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1921:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1922-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1922:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1931-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1931-e_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1932-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1932-e_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1941-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1941-e_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1942-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q1942-e_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q2901-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q2901-e_pt_mount:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3504-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3504-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3505-sve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3505-v:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3505-v_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3505-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3505-ve_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3515-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3515-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3517-lv:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3517-lve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3615-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3617-ve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3708-pve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q3709-pve:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6000-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6000-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6032-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6032-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6032:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6034-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6034-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6034:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6035-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6035-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6035:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6042-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6042-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6042-s:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6042:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6044-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6044-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6044-s:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6044:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-c_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-s:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045-s_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6045_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6052-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6052:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6054-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6054-e_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6054:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6054_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6055-c:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6055-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6055-s:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6055:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6114-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6115-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6124-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6125-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6128-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q6155-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7401:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7404:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7406_blade:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7411:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7414_blade:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7424-r:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7424-r_mk_ii:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q7436_blade:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8414-lvs:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8631-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8632-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8641-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8642-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8655-zle:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8665-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8665-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8675-ze:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8685-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8685-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8721-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8722-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8741-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8741-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8742-e:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8742-e_zoom:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8742-le:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:q8742-le_zoom:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:v5914:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:v5915:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xf40-q1765:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xf40-q2901:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xf60-q2901:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xp40-q1765:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xp40-q1942:-:*:*:*:*:*:*:*;cpe:2.3:h:axis:xp60-q1765:-:*:*:*:*:*:*:*;cpe:2.3:o:axis:a1001_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:a8004-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:a8105-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:a9161_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:a9188-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:a9188_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:c1004-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:c2005_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:c3003-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:c8033_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_bullet_le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_c360_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_cube_l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_cube_lw_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_dome_v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_dome_wv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_eye_l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_eye_lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_recorder_4ch_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:companion_recorder_8ch_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:d201-s_xpt_q6055_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:d2050-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:f34_main_unit_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:f41_main_unit_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:f44_dual_audio_input_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:f44_main_unit_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:fa54_main_unit_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1004-w_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1013_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1014_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1025_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1033-w_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1034-w_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1045-lw_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1054_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1065-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1065-lw_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1103_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1104_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1113-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1113_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1114-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1114_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1124-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1124_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1125-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1125_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1143-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1144-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1145-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m1145_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m2014-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m2025-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m2026-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m2026-le_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3004-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3005-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3006-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3007-p_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3007-pv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3014_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3015_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3016_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3024-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3025-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3026-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3027-pve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3037-pve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3044-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3044-wv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3045-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3045-wv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3046-v_1.8mm_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3046-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3047-p_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3048-p_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3104-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3104-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3105-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3105-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3106-l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3106-l_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3106-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3106-lve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3113-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3113-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3114-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3114-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3203-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3203_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3204-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m3204_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5013-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5013_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5014-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5014_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5054_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5055_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5065_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m5525-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m7010_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m7011_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m7014_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:m7016_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1125-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1125-zl_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1126-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1126-zl_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1204_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1214-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1214_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1224-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1244_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1245_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1254_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1264_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1265_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1275_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1280_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1290_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1325-z_firmware:7.10.1.1:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1343-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1343_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1344-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1344_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1346-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1346_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1347-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1347_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1353-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1353_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1354-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1354_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1355-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1355_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1357-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1357_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1364-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1364_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1365-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1365-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1365_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1365_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1367-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1367_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1368-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1405-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1405-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1405-le_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1425-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1425-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1425-le_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1427-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1427-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1428-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1435-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1435-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1447-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p1448-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3114-i_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3114-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3115-i_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3115-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3125-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3214-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3214-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3215-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3215-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-lv_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-lve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-v_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3224-ve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-lv_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-lve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-v_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3225-ve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3227-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3227-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3228-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3228-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3301-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3301_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3304-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3304_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3314-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3314-zl_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3315-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3315-zl_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3343-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3343-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3343_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3344-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3344-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3344_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3346-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3346-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3346_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3353_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3354_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3363-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3363-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3364-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3364-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3364-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3364-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3365-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3365-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3367-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3367-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3374-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3374-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3375-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3375-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3375-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3375-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3384-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3384-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3705-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3706-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3707-pe_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3904-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3904-r_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3905-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3905-r_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3905-re_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3915-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p3915-r_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5414-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5415-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5512-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5512_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5514-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5514_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5515-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5515_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5522-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5522_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5532-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5532_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5534-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5534_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5544_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5624-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5624-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5635-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5635-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p5635-ze_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p7210_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p7214_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p7216_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p7224_blade_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p8513_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p8514_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:p8524_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1602-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1602_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1604-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1604_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1605-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1614-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1614_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1615-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1615-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1615_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1615_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1635-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1635-z_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1635_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1645_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1647_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1659_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1755-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1755_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1765-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1765-le_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1775-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1775_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1910-e_firmware:5.51.5:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1910_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1921-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1921_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1922-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1922_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1931-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1931-e_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1932-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1932-e_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1941-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1941-e_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1942-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q1942-e_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q2901-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q2901-e_pt_mount_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3504-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3504-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3505-sve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3505-v_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3505-v_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3505-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3505-ve_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3515-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3515-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3517-lv_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3517-lve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3615-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3617-ve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3708-pve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q3709-pve_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6000-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6000-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6032-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6032-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6032_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6034-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6034-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6034_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6035-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6035-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6035_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6042-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6042-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6042-s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6042_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6044-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6044-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6044-s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6044_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-c_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045-s_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6045_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6052-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6052_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6054-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6054-e_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6054_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6054_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6055-c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6055-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6055-s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6055_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6114-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6115-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6124-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6125-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6128-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q6155-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7401_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7404_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7406_blade_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7411_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7414_blade_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7424-r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7424-r_mk_ii_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q7436_blade_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8414-lvs_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8631-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8632-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8641-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8642-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8655-zle_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8665-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8665-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8675-ze_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8685-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8685-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8721-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8722-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8741-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8741-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8742-e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8742-e_zoom_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8742-le_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:q8742-le_zoom_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:v5914_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:v5915_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xf40-q1765_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xf40-q2901_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xf60-q2901_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xp40-q1765_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xp40-q1942_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:axis:xp60-q1765_firmware:*:*:*:*:*:*:*:* CVE-2018-10735,0.0,,0.86568,A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/commandline.php cname parameter.,2018-05-16,Nuclei,cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:* CVE-2018-10736,0.0,,0.83567,A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/info.php key1 parameter.,2018-05-16,Nuclei,cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:* CVE-2018-10737,0.0,,0.83567,A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/logbook.php txtSearch parameter.,2018-05-16,Nuclei,cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:* CVE-2018-10738,0.0,,0.83567,A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/menuaccess.php chbKey1 parameter.,2018-05-16,Nuclei,cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:* CVE-2018-10822,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.79024,"Directory traversal vulnerability in the web interface on D-Link DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices allows remote attackers to read arbitrary files via a /.. or // after ""GET /uir"" in an HTTP request. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-6190.",2018-10-17,Nuclei,cpe:2.3:h:dlink:dir-140l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-640l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dwr-111:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dwr-116:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dwr-512:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dwr-712:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dwr-921:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-140l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-640l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dwr-111_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dwr-116_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dwr-512_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dwr-712_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dwr-912_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dwr-921_firmware:*:*:*:*:*:*:*:* CVE-2018-10823,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.92761,"An issue was discovered on D-Link DWR-116 through 1.06, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices. An authenticated attacker may execute arbitrary code by injecting the shell command into the chkisg.htm page Sip parameter. This allows for full control over the device internals.",2018-10-17,Nuclei,cpe:2.3:h:dlink:dwr-111:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dwr-116:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dwr-512:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dwr-921:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dwr-111_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dwr-116_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dwr-512_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dwr-912_firmware:*:*:*:*:*:*:*:* CVE-2018-10900,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.13051,"Network Manager VPNC plugin (aka networkmanager-vpnc) before version 1.2.6 is vulnerable to a privilege escalation attack. A new line character can be used to inject a Password helper parameter into the configuration data passed to VPNC, allowing an attacker to execute arbitrary commands as root.",2018-07-26,Metasploit,cpe:2.3:a:gnome:network_manager_vpnc:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2018-10933,0.0,,0.78329,"A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.",2018-10-17,Metasploit,cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*;cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*;cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* CVE-2018-10942,0.0,,0.83334,modules/attributewizardpro/file_upload.php in the Attribute Wizard addon 1.6.9 for PrestaShop 1.4.0.1 through 1.6.1.18 allows remote attackers to execute arbitrary code by uploading a .phtml file.,2018-05-10,Nuclei,cpe:2.3:a:attribute_wizard_project:attribute_wizard:1.6.9:*:*:*:*:prestashop:*:*;cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:* CVE-2018-10956,0.0,,0.8909,IPConfigure Orchid Core VMS 2.0.5 allows Directory Traversal.,2018-06-25,Nuclei,cpe:2.3:a:ipconfigure:orchid_core_vms:2.0.5:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2018-1111,0.0,,0.89375,"DHCP packages in Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier are vulnerable to a command injection flaw in the NetworkManager integration script included in the DHCP client. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.",2018-05-17,Metasploit,cpe:2.3:a:redhat:enterprise_virtualization:4.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:enterprise_virtualization:4.2:*:*:*:*:*:*:*;cpe:2.3:a:redhat:enterprise_virtualization_host:4.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2018-11133,0.0,,0.00342,The 'fmt' parameter of the '/common/run_cross_report.php' script in the the Quest KACE System Management Appliance 8.0.318 is vulnerable to cross-site scripting.,2018-05-31,Nuclei,cpe:2.3:a:quest:kace_system_management_appliance:8.0.318:*:*:*:*:*:*:* CVE-2018-11138,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.88079,The '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by anonymous users and can be abused to execute arbitrary commands on the system.,2018-05-31,Metasploit/CISA,cpe:2.3:a:quest:kace_system_management_appliance:8.0.318:*:*:*:*:*:*:* CVE-2018-11222,0.0,,0.05768,Local File Inclusion (LFI) in Artica Pandora FMS through version 7.23 allows an attacker to call any php file via the /pandora_console/ajax.php ajax endpoint.,2018-06-16,Nuclei,cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:* CVE-2018-11227,0.0,,0.05577,Monstra CMS 3.0.4 and earlier has XSS via index.php.,2019-07-03,Nuclei,cpe:2.3:a:monstra:monstra_cms:*:*:*:*:*:*:*:* CVE-2018-11231,0.0,,0.82033,"In the Divido plugin for OpenCart, there is SQL injection. Attackers can use SQL injection to get some confidential information.",2018-05-23,Nuclei,cpe:2.3:a:divido:divido:-:*:*:*:*:opencart:*:* CVE-2018-11409,0.0,,0.9178,"Splunk through 7.0.1 allows information disclosure by appending __raw/services/server/info/server-info?output_mode=json to a query, as demonstrated by discovering a license key.",2018-06-08,Metasploit/Nuclei,cpe:2.3:a:splunk:splunk:*:*:*:*:*:*:*:* CVE-2018-11473,0.0,,0.01086,"Monstra CMS 3.0.4 has XSS in the registration Form (i.e., the login parameter to users/registration).",2018-05-25,Nuclei,cpe:2.3:a:monstra:monstra:3.0.4:*:*:*:*:*:*:* CVE-2018-11479,0.0,,0.28652,"The VPN component in Windscribe 1.81 uses the OpenVPN client for connections. Also, it creates a WindScribeService.exe system process that establishes a \\.\pipe\WindscribeService named pipe endpoint that allows the Windscribe VPN process to connect and execute an OpenVPN process or other processes (like taskkill, etc.). There is no validation of the program name before constructing the lpCommandLine argument for a CreateProcess call. An attacker can run any malicious process with SYSTEM privileges through this named pipe.",2018-05-25,Metasploit,cpe:2.3:a:windscribe:windscribe:1.81:*:*:*:*:*:*:* CVE-2018-11511,0.0,,0.14451,The tree list functionality in the photo gallery application in ASUSTOR ADM 3.1.0.RFQ3 has a SQL injection vulnerability that affects the 'album_id' or 'scope' parameter via a photo-gallery/api/album/tree_lists/ URI.,2018-08-16,Nuclei,cpe:2.3:a:asustor:asustor_data_master:3.1.0:*:*:*:*:*:*:* CVE-2018-11529,0.0,,0.74516,VideoLAN VLC media player 2.2.x is prone to a use after free vulnerability which an attacker can leverage to execute arbitrary code via crafted MKV files. Failed exploit attempts will likely result in denial of service conditions.,2018-07-11,Metasploit,cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2018-11646,0.0,,0.75346,"webkitFaviconDatabaseSetIconForPageURL and webkitFaviconDatabaseSetIconURLForPageURL in UIProcess/API/glib/WebKitFaviconDatabase.cpp in WebKit, as used in WebKitGTK+ through 2.21.3, mishandle an unset pageURL, leading to an application crash.",2018-06-01,Metasploit,cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:* CVE-2018-11686,0.0,,0.90323,The Publish Service in FlexPaper (later renamed FlowPaper) 2.3.6 allows remote code execution via setup.php and change_config.php.,2019-07-03,Nuclei,cpe:2.3:a:flowpaper:flexpaper:*:*:*:*:*:*:*:* CVE-2018-11709,0.0,,0.07799,wpforo_get_request_uri in wpf-includes/functions.php in the wpForo Forum plugin before 1.4.12 for WordPress allows Unauthenticated Reflected Cross-Site Scripting (XSS) via the URI.,2018-06-04,Nuclei,cpe:2.3:a:gvectors:wpforo_forum:*:*:*:*:*:wordpress:*:* CVE-2018-11759,0.0,,0.94169,"The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.",2018-10-31,Nuclei,cpe:2.3:a:apache:tomcat_jk_connector:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2018-11770,4.2,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N,0.87702,"From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secret for authenticating requests to submit jobs via spark-submit. However, the REST API does not use this or any other authentication mechanism, and this is not adequately documented. In this case, a user would be able to run a driver program without authenticating, but not launch executors, using the REST API. This REST API is also used by Mesos, when set up to run in cluster mode (i.e., when also running MesosClusterDispatcher), for job submission. Future versions of Spark will improve documentation on these points, and prohibit setting 'spark.authenticate.secret' when running the REST APIs, to make this clear. Future versions will also disable the REST API by default in the standalone master by changing the default value of 'spark.master.rest.enabled' to 'false'.",2018-08-13,Metasploit,cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:* CVE-2018-11776,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94431,"Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace.",2018-08-22,Metasploit/Nuclei/CISA,cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*;cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*;cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* CVE-2018-11784,0.0,,0.82624,"When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.",2018-10-04,Nuclei,cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*;cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_application_session_controller:3.7.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_application_session_controller:3.8.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_broker:5.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_broker:5.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2018-12031,0.0,,0.80134,Local file inclusion in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file via server/node_upgrade_srv.js directory traversal with the firmware parameter in a downloadFirmware action.,2018-06-07,Nuclei,cpe:2.3:a:eaton:intelligent_power_manager:1.6:*:*:*:*:*:*:* CVE-2018-12054,0.0,,0.70831,"Arbitrary File Read exists in PHP Scripts Mall Schools Alert Management Script via the f parameter in img.php, aka absolute path traversal.",2018-06-08,Nuclei,cpe:2.3:a:schools_alert_management_script_project:schools_alert_management_script:-:*:*:*:*:*:*:* CVE-2018-1207,0.0,,0.9379,"Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain CGI injection vulnerability which could be used to execute remote code. A remote unauthenticated attacker may potentially be able to use CGI variables to execute remote code.",2018-03-23,Nuclei,cpe:2.3:a:dell:emc_idrac7:*:*:*:*:*:*:*:*;cpe:2.3:a:dell:emc_idrac8:*:*:*:*:*:*:*:* CVE-2018-12095,0.0,,0.18458,A Reflected Cross-Site Scripting web vulnerability has been discovered in the OEcms v3.1 web-application. The vulnerability is located in the mod parameter of info.php.,2018-06-11,Nuclei,cpe:2.3:a:oecms_project:oecms:3.1:*:*:*:*:*:*:* CVE-2018-1217,0.0,,0.66782,"Avamar Installation Manager in Dell EMC Avamar Server 7.3.1, 7.4.1, and 7.5.0, and Dell EMC Integrated Data Protection Appliance 2.0 and 2.1, is affected by a missing access control check vulnerability which could potentially allow a remote unauthenticated attacker to read or change the Local Download Service (LDLS) credentials. The LDLS credentials are used to connect to Dell EMC Online Support. If the LDLS configuration was changed to an invalid configuration, then Avamar Installation Manager may not be able to connect to Dell EMC Online Support web site successfully. The remote unauthenticated attacker can also read and use the credentials to login to Dell EMC Online Support, impersonating the AVI service actions using those credentials.",2018-04-09,Nuclei,cpe:2.3:a:dell:emc_avamar:7.3.1:*:*:*:*:*:*:*;cpe:2.3:a:dell:emc_avamar:7.4.1:*:*:*:*:*:*:*;cpe:2.3:a:dell:emc_avamar:7.5.0:*:*:*:*:*:*:*;cpe:2.3:a:dell:emc_integrated_data_protection_appliance:2.0:*:*:*:*:*:*:*;cpe:2.3:a:dell:emc_integrated_data_protection_appliance:2.1:*:*:*:*:*:*:* CVE-2018-12296,0.0,,0.6508,Insufficient access control in /api/external/7.0/system.System.get_infos in Seagate NAS OS version 4.3.15.1 allows attackers to obtain information about the NAS without authentication via empty POST requests.,2019-05-13,Nuclei,cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:* CVE-2018-12300,0.0,,0.13495,Arbitrary Redirect in echo-server.html in Seagate NAS OS version 4.3.15.1 allows attackers to disclose information in the Referer header via the 'state' URL parameter.,2019-05-13,Nuclei,cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:* CVE-2018-12455,0.0,,0.4527,"Intelbras NPLUG 1.0.0.14 wireless repeater devices have a critical vulnerability that allows an attacker to authenticate in the web interface just by using ""admin:"" as the name of a cookie.",2018-10-10,Nuclei,cpe:2.3:h:intelbras:nplug:-:*:*:*:*:*:*:*;cpe:2.3:o:intelbras:nplug_firmware:1.0.0.14:*:*:*:*:*:*:* CVE-2018-12464,0.0,,0.73188,A SQL injection vulnerability in the web administration and quarantine components of Micro Focus Secure Messaging Gateway allows an unauthenticated remote attacker to execute arbitrary SQL statements against the database. This can be exploited to create an administrative account and used in conjunction with CVE-2018-12465 to achieve unauthenticated remote code execution. Affects Micro Focus Secure Messaging Gateway versions prior to 471. It does not affect previous versions of the product that use the GWAVA product name (i.e. GWAVA 6.5).,2018-06-29,Metasploit,cpe:2.3:a:microfocus:secure_messaging_gateway:*:*:*:*:*:*:*:* CVE-2018-12465,0.0,,0.82245,An OS command injection vulnerability in the web administration component of Micro Focus Secure Messaging Gateway (SMG) allows a remote attacker authenticated as a privileged user to execute arbitrary OS commands on the SMG server. This can be exploited in conjunction with CVE-2018-12464 to achieve unauthenticated remote code execution. Affects Micro Focus Secure Messaging Gateway versions prior to 471. It does not affect previous versions of the product that used GWAVA product name (i.e. GWAVA 6.5).,2018-06-29,Metasploit,cpe:2.3:a:microfocus:secure_messaging_gateway:*:*:*:*:*:*:*:* CVE-2018-12613,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.94137,"An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the ""$cfg['AllowArbitraryServer'] = true"" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the ""$cfg['ServerDefault'] = 0"" case (which bypasses the login requirement and runs the vulnerable code without any authentication).",2018-06-21,Metasploit/Nuclei,cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:* CVE-2018-12634,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.90224,CirCarLife Scada before 4.3 allows remote attackers to obtain sensitive information via a direct request for the html/log or services/system/info.html URI.,2018-06-22,Nuclei,cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:* CVE-2018-12675,0.0,,0.0733,The SV3C HD Camera (L-SERIES V2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B) does not perform origin checks on URLs that the camera's web interface redirects a user to. This can be leveraged to send a user to an unexpected endpoint.,2018-10-19,Nuclei,cpe:2.3:h:sv3c:sv-b01poe-1080p-l:-:*:*:*:*:*:*:*;cpe:2.3:h:sv3c:sv-b11vpoe-1080p-l:-:*:*:*:*:*:*:*;cpe:2.3:h:sv3c:sv-d02poe-1080p-l:-:*:*:*:*:*:*:*;cpe:2.3:o:sv3c:h.264_poe_ip_camera_firmware:v2.3.4.2103-s50-ntd-b20170508b:*:*:*:*:*:*:*;cpe:2.3:o:sv3c:h.264_poe_ip_camera_firmware:v2.3.4.2103-s50-ntd-b20170823b:*:*:*:*:*:*:* CVE-2018-1271,5.9,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,0.90926,"Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.",2018-04-06,Nuclei,cpe:2.3:a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:application_testing_suite:13.1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:big_data_discovery:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_converged_application_server:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_services_gatekeeper:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:goldengate_for_big_data:12.2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:goldengate_for_big_data:12.3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:goldengate_for_big_data:12.3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:health_sciences_information_manager:3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:healthcare_master_person_index:3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:healthcare_master_person_index:4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_calculation_engine:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_calculation_engine:10.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_calculation_engine:10.2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_calculation_engine:10.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_rules_palette:10.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_rules_palette:10.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_rules_palette:10.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_rules_palette:11.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:insurance_rules_palette:11.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:primavera_gateway:15.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:primavera_gateway:16.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:primavera_gateway:17.12:*:*:*:*:*:*:*;cpe:2.3:a:oracle:rapid_planning:12.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:rapid_planning:12.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_back_office:14.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_back_office:14.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_central_office:14.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_central_office:14.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_customer_insights:15.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_customer_insights:16.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:14.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:14.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:14.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:14.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:14.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:14.1.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:14.1.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:15.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:15.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:15.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:16.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:16.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_integration_bus:16.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_open_commerce_platform:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_open_commerce_platform:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_open_commerce_platform:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_broker:5.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_order_broker:5.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_point-of-sale:14.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_point-of-sale:14.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_predictive_application_server:14.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_predictive_application_server:14.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_predictive_application_server:15.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_predictive_application_server:16.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_returns_management:14.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:service_architecture_leveraging_tuxedo:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:service_architecture_leveraging_tuxedo:12.2.2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:tape_library_acsls:8.4:*:*:*:*:*:*:*;cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* CVE-2018-1273,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94191,"Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.",2018-04-11,Nuclei/CISA,cpe:2.3:a:apache:ignite:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:ignite:1.0.0:-:*:*:*:*:*:*;cpe:2.3:a:apache:ignite:1.0.0:rc3:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0:*:*:*:*:*:*:*;cpe:2.3:a:pivotal_software:spring_data_commons:*:*:*:*:*:*:*:*;cpe:2.3:a:pivotal_software:spring_data_rest:*:*:*:*:*:*:*:* CVE-2018-12909,0.0,,0.87459,"Webgrind 1.5 relies on user input to display a file, which lets anyone view files from the local filesystem (that the webserver user has access to) via an index.php?op=fileviewer&file= URI. NOTE: the vendor indicates that the product is not intended for a ""publicly accessible environment.",2018-06-27,Nuclei,cpe:2.3:a:webgrind_project:webgrind:1.5.0:*:*:*:*:*:*:* CVE-2018-12998,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.72996,"A reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter 'operation' to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet.",2018-06-29,Nuclei,cpe:2.3:a:zohocorp:firewall_analyzer:-:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:-:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:-:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_opmanager:-:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_oputils:-:*:*:*:*:*:*:* CVE-2018-1335,0.0,,0.93168,"From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.",2018-04-25,Metasploit/Nuclei,cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:* CVE-2018-13374,4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,0.0355,"A Improper Access Control in Fortinet FortiOS 6.0.2, 5.6.7 and before, FortiADC 6.1.0, 6.0.0 to 6.0.1, 5.4.0 to 5.4.4 allows attacker to obtain the LDAP server login credentials configured in FortiGate via pointing a LDAP server connectivity test request to a rogue LDAP server instead of the configured one.",2019-01-22,CISA,cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*;cpe:2.3:a:fortinet:fortiadc:6.1.0:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* CVE-2018-13379,9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,0.94473,"An Improper Limitation of a Pathname to a Restricted Directory (""Path Traversal"") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.",2019-06-04,Metasploit/Nuclei/CISA,cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*;cpe:2.3:a:fortinet:fortiproxy:2.0.0:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* CVE-2018-13380,4.7,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N,0.37928,"A Cross-site Scripting (XSS) vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4.0 to 5.4.12, 5.2 and below and Fortinet FortiProxy 2.0.0, 1.2.8 and below under SSL VPN web portal allows attacker to execute unauthorized malicious script code via the error or message handling parameters.",2019-06-04,Nuclei,cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*;cpe:2.3:a:fortinet:fortiproxy:2.0.0:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* CVE-2018-13382,9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,0.87792,"An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests",2019-06-04,CISA,cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*;cpe:2.3:a:fortinet:fortiproxy:2.0.0:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* CVE-2018-13383,4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L,0.01116,"A heap buffer overflow in Fortinet FortiOS 6.0.0 through 6.0.4, 5.6.0 through 5.6.10, 5.4.0 through 5.4.12, 5.2.14 and earlier and FortiProxy 2.0.0, 1.2.8 and earlier in the SSL VPN web portal may cause the SSL VPN web service termination for logged in users due to a failure to properly handle javascript href data when proxying webpages.",2019-05-29,CISA,cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*;cpe:2.3:a:fortinet:fortiproxy:2.0.0:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* CVE-2018-13980,5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,0.11342,"The websites that were built from Zeta Producer Desktop CMS before 14.2.1 are vulnerable to unauthenticated file disclosure if the plugin ""filebrowser"" is installed, because of assets/php/filebrowser/filebrowser.main.php?file=../ directory traversal.",2018-07-16,Nuclei,cpe:2.3:a:zeta-producer:zeta_producer:*:*:*:*:*:*:*:* CVE-2018-14013,0.0,,0.39816,Synacor Zimbra Collaboration Suite Collaboration before 8.8.11 has XSS in the AJAX and html web clients.,2019-05-29,Nuclei,cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:-:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:p1:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:p2:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:p3:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:p4:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:p5:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:p6:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:-:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:p2:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:p3:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:p4:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.11:-:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:-:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:p1:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:p2:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:p3:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:p4:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:p7:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:p8:*:*:*:*:*:* CVE-2018-14058,0.0,,0.01587,Pimcore before 5.3.0 allows SQL Injection via the REST web service API.,2018-08-17,Metasploit,cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:* CVE-2018-14064,0.0,,0.74849,"The uc-http service 1.0.0 on VelotiSmart WiFi B-380 camera devices allows Directory Traversal, as demonstrated by /../../etc/passwd on TCP port 80.",2018-07-15,Nuclei,cpe:2.3:h:velotismart_project:velotismart_wifi:-:*:*:*:*:*:*:*;cpe:2.3:o:velotismart_project:velotismart_wifi_firmware:b-380:*:*:*:*:*:*:* CVE-2018-1418,0.0,,0.70799,IBM Security QRadar SIEM 7.2 and 7.3 could allow a user to bypass authentication which could lead to code execution. IBM X-Force ID: 138824.,2018-04-26,Metasploit,cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p10:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p11:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p7:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p8:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p9:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.1:-:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.1:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.1:p2:*:*:*:*:*:* CVE-2018-14474,0.0,,0.02192,views/auth.go in Orange Forum 1.4.0 allows Open Redirection via the next parameter to /login or /signup.,2018-07-20,Nuclei,cpe:2.3:a:goodoldweb:orange_forum:1.4.0:*:*:*:*:*:*:* CVE-2018-14558,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.81989,"An issue was discovered on Tenda AC7 devices with firmware through V15.03.06.44_CN(AC7), AC9 devices with firmware through V15.03.05.19(6318)_CN(AC9), and AC10 devices with firmware through V15.03.06.23_CN(AC10). A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted goform/setUsbUnload request. This occurs because the ""formsetUsbUnload"" function executes a dosystemCmd function with untrusted input.",2018-10-30,CISA,cpe:2.3:h:tenda:ac10:-:*:*:*:*:*:*:*;cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*;cpe:2.3:h:tenda:ac9:-:*:*:*:*:*:*:*;cpe:2.3:o:tenda:ac10_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:tenda:ac7_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:tenda:ac9_firmware:*:*:*:*:*:*:*:* CVE-2018-14574,0.0,,0.09877,django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.,2018-08-03,Nuclei,cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2018-14665,0.0,,0.03795,A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges.,2018-10-25,Metasploit,cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2018-14667,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.88855,"The RichFaces Framework 3.X through 3.3.4 is vulnerable to Expression Language (EL) injection via the UserResource resource. A remote, unauthenticated attacker could exploit this to execute arbitrary code using a chain of java serialized objects via org.ajax4jsf.resource.UserResource$UriData.",2018-11-06,CISA,cpe:2.3:a:redhat:richfaces:*:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* CVE-2018-14728,0.0,,0.92876,upload.php in Responsive FileManager 9.13.1 allows SSRF via the url parameter.,2018-08-03,Nuclei,cpe:2.3:a:tecrail:responsive_filemanager:9.13.1:*:*:*:*:*:*:* CVE-2018-14839,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.91722,LG N1A1 NAS 3718.510 is affected by: Remote Command Execution. The impact is: execute arbitrary code (remote). The attack vector is: HTTP POST with parameters.,2019-05-14,CISA,cpe:2.3:h:lg:n1a1:-:*:*:*:*:*:*:*;cpe:2.3:o:lg:n1a1_firmware:3718.510:*:*:*:*:*:*:* CVE-2018-14847,9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,0.92843,MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.,2018-08-02,Metasploit/CISA,cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:* CVE-2018-14912,0.0,,0.91584,"cgit_clone_objects in CGit before 1.2.1 has a directory traversal vulnerability when `enable-http-clone=1` is not turned off, as demonstrated by a cgit/cgit.cgi/git/objects/?path=../ request.",2018-08-03,Metasploit/Nuclei,cpe:2.3:a:cgit_project:cgit:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2018-14916,0.0,,0.68248,LOYTEC LGATE-902 6.3.2 devices allow Arbitrary file deletion.,2019-06-28,Nuclei,cpe:2.3:h:loytec:lgate-902:-:*:*:*:*:*:*:*;cpe:2.3:o:loytec:lgate-902_firmware:*:*:*:*:*:*:*:* CVE-2018-14918,0.0,,0.73138,LOYTEC LGATE-902 6.3.2 devices allow Directory Traversal.,2019-06-28,Nuclei,cpe:2.3:h:loytec:lgate-902:-:*:*:*:*:*:*:*;cpe:2.3:o:loytec:lgate-902_firmware:*:*:*:*:*:*:*:* CVE-2018-14931,0.0,,0.07006,An issue was discovered in the Core and Portal modules in Polaris FT Intellect Core Banking 9.7.1. An open redirect exists via a /IntellectMain.jsp?IntellectSystem= URI.,2019-04-30,Nuclei,cpe:2.3:a:polarisft:intellect_core_banking:9.7.1:*:*:*:*:*:*:* CVE-2018-14933,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93752,upgrade_handle.php on NUUO NVRmini devices allows Remote Command Execution via shell metacharacters in the uploaddir parameter for a writeuploaddir command.,2018-08-04,Metasploit/Nuclei/CISA,cpe:2.3:h:nuuo:nvrmini:-:*:*:*:*:*:*:*;cpe:2.3:o:nuuo:nvrmini_firmware:2016:*:*:*:*:*:*:* CVE-2018-15133,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.80228,"In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack.",2018-08-09,Metasploit/CISA,cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:* CVE-2018-15138,0.0,,0.50624,Ericsson-LG iPECS NMS 30M allows directory traversal via ipecs-cm/download?filename=../ URIs.,2018-08-15,Nuclei,cpe:2.3:a:ericssonlg:ipecs_nms:30m-2.3gn:*:*:*:*:*:*:*;cpe:2.3:a:ericssonlg:ipecs_nms:30m-b.2ia:*:*:*:*:*:*:* CVE-2018-15379,0.0,,0.89681,"A vulnerability in which the HTTP web server for Cisco Prime Infrastructure (PI) has unrestricted directory permissions could allow an unauthenticated, remote attacker to upload an arbitrary file. This file could allow the attacker to execute commands at the privilege level of the user prime. This user does not have administrative or root privileges. The vulnerability is due to an incorrect permission setting for important system directories. An attacker could exploit this vulnerability by uploading a malicious file by using TFTP, which can be accessed via the web-interface GUI. A successful exploit could allow the attacker to run commands on the targeted application without authentication.",2018-10-05,Metasploit,cpe:2.3:a:cisco:prime_infrastructure:3.2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_infrastructure:3.2:fips:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_infrastructure:3.2\(0.0\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_infrastructure:3.2\(1.0\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_infrastructure:3.2\(2.0\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_infrastructure:3.3:*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_infrastructure:3.3\(0.0\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_infrastructure:3.4:*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_infrastructure:3.4\(0.0\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_infrastructure:3.5\(0.0\):*:*:*:*:*:*:* CVE-2018-15442,0.0,,0.56105,"A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow an authenticated, local attacker to execute arbitrary commands as a privileged user. The vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges. While the CVSS Attack Vector metric denotes the requirement for an attacker to have local access, administrators should be aware that in Active Directory deployments, the vulnerability could be exploited remotely by leveraging the operating system remote management tools.",2018-10-24,Metasploit,cpe:2.3:a:cisco:webex_meetings_desktop:*:*:*:*:*:windows:*:*;cpe:2.3:a:cisco:webex_productivity_tools:*:*:*:*:*:*:*:* CVE-2018-15473,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.90285,"OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.",2018-08-17,Metasploit,cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:fas_baseboard_management_controller:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*;cpe:2.3:a:netapp:ontap_select_deploy:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:storage_replication_adapter:*:*:*:*:*:vsphere:*:*;cpe:2.3:a:netapp:vasa_provider:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vsphere:*:*;cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit:8.8.6:*:*:*:*:*:*:*;cpe:2.3:h:netapp:cn1610:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:scalance_x204rna:-:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*;cpe:2.3:o:siemens:scalance_x204rna_firmware:*:*:*:*:*:*:*:* CVE-2018-15517,0.0,,0.7459,"The MailConnect feature on D-Link Central WiFiManager CWM-100 1.03 r0098 devices is intended to check a connection to an SMTP server but actually allows outbound TCP to any port on any IP address, leading to SSRF, as demonstrated by an index.php/System/MailConnect/host/127.0.0.1/port/22/secure/ URI.",2019-01-31,Nuclei,cpe:2.3:a:dlink:central_wifimanager:1.03:r0098:*:*:*:*:*:* CVE-2018-15535,0.0,,0.81247,"/filemanager/ajax_calls.php in tecrail Responsive FileManager before 9.13.4 uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize get_file sequences such as "".."" that can resolve to a location that is outside of that directory, aka Directory Traversal.",2018-08-24,Nuclei,cpe:2.3:a:tecrail:responsive_filemanager:*:*:*:*:*:*:*:* CVE-2018-15708,0.0,,0.91808,Snoopy 1.0 in Nagios XI 5.5.6 allows remote unauthenticated attackers to execute arbitrary commands via a crafted HTTP request.,2018-11-14,Metasploit,cpe:2.3:a:nagios:nagios_xi:5.5.6:*:*:*:*:*:*:* CVE-2018-15710,0.0,,0.78778,Nagios XI 5.5.6 allows local authenticated attackers to escalate privileges to root via Autodiscover_new.php.,2018-11-14,Metasploit,cpe:2.3:a:nagios:nagios_xi:5.5.6:*:*:*:*:*:*:* CVE-2018-15727,0.0,,0.76773,"Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid ""remember me"" cookie knowing only a username of an LDAP or OAuth user.",2018-08-29,Metasploit,cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:* CVE-2018-15745,0.0,,0.91321,"Argus Surveillance DVR 4.0.0.0 devices allow Unauthenticated Directory Traversal, leading to File Disclosure via a ..%2F in the WEBACCOUNT.CGI RESULTPAGE parameter.",2018-08-30,Metasploit/Nuclei,cpe:2.3:a:argussurveillance:dvr:4.0.0.0:*:*:*:*:*:*:* CVE-2018-15811,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.75191,DNN (aka DotNetNuke) 9.2 through 9.2.1 uses a weak encryption algorithm to protect input parameters.,2019-07-03,Metasploit/CISA,cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:* CVE-2018-15812,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.82374,"DNN (aka DotNetNuke) 9.2 through 9.2.1 incorrectly converts encryption key source values, resulting in lower than expected entropy.",2019-07-03,Metasploit,cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:* CVE-2018-15877,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.82713,The Plainview Activity Monitor plugin before 20180826 for WordPress is vulnerable to OS command injection via shell metacharacters in the ip parameter of a wp-admin/admin.php?page=plainview_activity_monitor&tab=activity_tools request.,2018-08-26,Metasploit,cpe:2.3:a:plainview_activity_monitor_project:plainview_activity_monitor:*:*:*:*:*:wordpress:*:* CVE-2018-15917,0.0,,0.00609,Persistent cross-site scripting (XSS) issues in Jorani 0.6.5 allow remote attackers to inject arbitrary web script or HTML via the language parameter to session/language.,2018-09-05,Nuclei,cpe:2.3:a:jorani_project:jorani:0.6.5:*:*:*:*:*:*:* CVE-2018-15961,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94422,"Adobe ColdFusion versions July 12 release (2018.0.0.310739), Update 6 and earlier, and Update 14 and earlier have an unrestricted file upload vulnerability. Successful exploitation could lead to arbitrary code execution.",2018-09-25,Metasploit/Nuclei/CISA,cpe:2.3:a:adobe:coldfusion:11.0:-:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update10:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update11:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update12:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update13:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update14:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update1:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update2:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update3:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update4:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update5:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update6:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update7:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update8:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update9:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:update1:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:update2:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:update3:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:update4:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:update5:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:update6:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:* CVE-2018-15982,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93426,"Flash Player versions 31.0.0.153 and earlier, and 31.0.0.108 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.",2019-01-18,CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*;cpe:2.3:a:adobe:flash_player_installer:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2018-16059,0.0,,0.37052,Endress+Hauser WirelessHART Fieldgate SWG70 3.x devices allow Directory Traversal via the fcgi-bin/wgsetcgi filename parameter.,2018-09-07,Nuclei,cpe:2.3:h:endress:wirelesshart_fieldgate_swg70:-:*:*:*:*:*:*:*;cpe:2.3:o:endress:wirelesshart_fieldgate_swg70_firmware:3.00.07:*:*:*:*:*:*:* CVE-2018-1612,0.0,,0.78368,"IBM QRadar Incident Forensics (IBM QRadar SIEM 7.2, and 7.3) could allow a remote attacker to bypass authentication and obtain sensitive information. IBM X-Force ID: 144164.",2018-07-17,Metasploit,cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p10:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p11:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p4:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p5:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p6:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p7:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p8:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p9:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.1:p1:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.1:p2:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.1:p3:*:*:*:*:*:*;cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.1:p4:*:*:*:*:*:* CVE-2018-16133,0.0,,0.57542,Cybrotech CyBroHttpServer 1.0.3 allows Directory Traversal via a ../ in the URI.,2018-08-29,Nuclei,cpe:2.3:a:cybrotech:cybrohttpserver:1.0.3:*:*:*:*:*:*:* CVE-2018-16139,0.0,,0.02063,Cross-site scripting (XSS) vulnerability in BIBLIOsoft BIBLIOpac 2008 allows remote attackers to inject arbitrary web script or HTML via the db or action parameter to to bin/wxis.exe/bibliopac/.,2019-05-13,Nuclei,cpe:2.3:a:bibliosoft:bibliopac:2008:*:*:*:*:*:*:* CVE-2018-16158,0.0,,0.67312,"Eaton Power Xpert Meter 4000, 6000, and 8000 devices before 13.4.0.10 have a single SSH private key across different customers' installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins (to uid 0) via the PubkeyAuthentication option.",2018-08-30,Metasploit,cpe:2.3:h:eaton:power_xpert_meter_4000:-:*:*:*:*:*:*:*;cpe:2.3:h:eaton:power_xpert_meter_6000:-:*:*:*:*:*:*:*;cpe:2.3:h:eaton:power_xpert_meter_8000:-:*:*:*:*:*:*:*;cpe:2.3:o:eaton:power_xpert_meter_4000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:eaton:power_xpert_meter_6000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:eaton:power_xpert_meter_8000_firmware:*:*:*:*:*:*:*:* CVE-2018-16159,0.0,,0.59877,The Gift Vouchers plugin through 2.0.1 for WordPress allows SQL Injection via the template_id parameter in a wp-admin/admin-ajax.php wpgv_doajax_front_template request.,2018-08-30,Nuclei,cpe:2.3:a:codemenschen:gift_vouchers:*:*:*:*:*:wordpress:*:* CVE-2018-16167,0.0,,0.86645,LogonTracer 1.2.0 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors.,2019-01-09,Nuclei,cpe:2.3:a:jpcert:logontracer:*:*:*:*:*:*:*:* CVE-2018-16283,0.0,,0.84821,The Wechat Broadcast plugin 1.2.0 and earlier for WordPress allows Directory Traversal via the Image.php url parameter.,2018-09-24,Nuclei,cpe:2.3:a:wechat_brodcast_project:wechat_brodcast:*:*:*:*:*:wordpress:*:* CVE-2018-16288,0.0,,0.6366,LG SuperSign CMS allows reading of arbitrary files via signEzUI/playlist/edit/upload/..%2f URIs.,2018-09-14,Nuclei,cpe:2.3:a:lg:supersign_cms:2.5:*:*:*:*:*:*:* CVE-2018-16299,0.0,,0.84841,The Localize My Post plugin 1.0 for WordPress allows Directory Traversal via the ajax/include.php file parameter.,2018-09-24,Nuclei,cpe:2.3:a:localize_my_post_project:localize_my_post:1.0:*:*:*:*:wordpress:*:* CVE-2018-16509,0.0,,0.91744,"An issue was discovered in Artifex Ghostscript before 9.24. Incorrect ""restoration of privilege"" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the ""pipe"" instruction.",2018-09-05,Metasploit,cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*;cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2018-16668,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.43027,An issue was discovered in CIRCONTROL CirCarLife before 4.3. There is internal installation path disclosure due to the lack of authentication for /html/repository.,2018-09-18,Nuclei,cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:* CVE-2018-16670,0.0,,0.45583,An issue was discovered in CIRCONTROL CirCarLife before 4.3. There is PLC status disclosure due to lack of authentication for /html/devstat.html.,2018-09-18,Nuclei,cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:* CVE-2018-16671,0.0,,0.42489,An issue was discovered in CIRCONTROL CirCarLife before 4.3. There is system software information disclosure due to lack of authentication for /html/device-id.,2018-09-18,Nuclei,cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:* CVE-2018-16716,0.0,,0.44536,"A path traversal vulnerability exists in viewcgi.c in the 2.0.7 through 2.2.26 legacy versions of the NCBI ToolBox, which may result in reading of arbitrary files (i.e., significant information disclosure) or file deletion via the nph-viewgif.cgi query string.",2019-05-02,Nuclei,cpe:2.3:a:nih:ncbi_toolbox:*:*:*:*:*:*:*:* CVE-2018-16761,0.0,,0.01872,Eventum before 3.4.0 has an open redirect vulnerability.,2018-09-09,Nuclei,cpe:2.3:a:eventum_project:eventum:*:*:*:*:*:*:*:* CVE-2018-16763,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93933,FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter. This can lead to Pre-Auth Remote Code Execution.,2018-09-09,Nuclei,cpe:2.3:a:thedaylightstudio:fuel_cms:*:*:*:*:*:*:*:* CVE-2018-16836,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.86763,"Rubedo through 3.4.0 contains a Directory Traversal vulnerability in the theme component, allowing unauthenticated attackers to read and execute arbitrary files outside of the service root path, as demonstrated by a /theme/default/img/%2e%2e/..//etc/passwd URI.",2018-09-11,Nuclei,cpe:2.3:a:rubedo_project:rubedo:*:*:*:*:*:*:*:* CVE-2018-16858,0.0,,0.92577,"It was found that libreoffice before versions 6.0.7 and 6.1.3 was vulnerable to a directory traversal attack which could be used to execute arbitrary macros bundled with a document. An attacker could craft a document, which when opened by LibreOffice, would execute a Python method from a script in any arbitrary file system location, specified relative to the LibreOffice install location.",2019-03-25,Metasploit,cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:* CVE-2018-16979,0.0,,0.19962,"Monstra CMS V3.0.4 allows HTTP header injection in the plugins/captcha/crypt/cryptographp.php cfg parameter, a related issue to CVE-2012-2943.",2018-09-12,Nuclei,cpe:2.3:a:monstra:monstra:3.0.4:*:*:*:*:*:*:* CVE-2018-17153,0.0,,0.91654,"It was discovered that the Western Digital My Cloud device before 2.30.196 is affected by an authentication bypass vulnerability. An unauthenticated attacker can exploit this vulnerability to authenticate as an admin user without needing to provide a password, thereby gaining full control of the device. (Whenever an admin logs into My Cloud, a server-side session is created that is bound to the user's IP address. After the session is created, it is possible to call authenticated CGI modules by sending the cookie username=admin in the HTTP request. The invoked CGI will check if a valid session is present and bound to the user's IP address.) It was found that it is possible for an unauthenticated attacker to create a valid session without a login. The network_mgr.cgi CGI module contains a command called ""cgi_get_ipv6"" that starts an admin session -- tied to the IP address of the user making the request -- if the additional parameter ""flag"" with the value ""1"" is provided. Subsequent invocation of commands that would normally require admin privileges now succeed if an attacker sets the username=admin cookie.",2018-09-18,Metasploit/Nuclei,cpe:2.3:h:western_digital:my_cloud_dl2100:-:*:*:*:*:*:*:*;cpe:2.3:h:western_digital:my_cloud_dl4100:-:*:*:*:*:*:*:*;cpe:2.3:h:western_digital:my_cloud_ex2100:-:*:*:*:*:*:*:*;cpe:2.3:h:western_digital:my_cloud_ex2:-:*:*:*:*:*:*:*;cpe:2.3:h:western_digital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*;cpe:2.3:h:western_digital:my_cloud_ex4100:-:*:*:*:*:*:*:*;cpe:2.3:h:western_digital:my_cloud_ex4:-:*:*:*:*:*:*:*;cpe:2.3:h:western_digital:my_cloud_mirror:-:*:*:*:*:*:*:*;cpe:2.3:h:western_digital:my_cloud_mirror_gen_2:-:*:*:*:*:*:*:*;cpe:2.3:h:western_digital:my_cloud_pr2100:-:*:*:*:*:*:*:*;cpe:2.3:h:western_digital:my_cloud_pr4100:-:*:*:*:*:*:*:*;cpe:2.3:h:western_digital:my_cloud_wdbctl0020hwt:*:*:*:*:*:*:*:*;cpe:2.3:o:western_digital:my_cloud_dl2100:*:*:*:*:*:*:*:*;cpe:2.3:o:western_digital:my_cloud_dl4100_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:western_digital:my_cloud_ex2100_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:western_digital:my_cloud_ex2_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:western_digital:my_cloud_ex2_ultra_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:western_digital:my_cloud_ex4100:*:*:*:*:*:*:*:*;cpe:2.3:o:western_digital:my_cloud_ex4_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:western_digital:my_cloud_mirror_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:western_digital:my_cloud_mirror_gen_2_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:western_digital:my_cloud_pr2100_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:western_digital:my_cloud_pr4100:*:*:*:*:*:*:*:*;cpe:2.3:o:western_digital:my_cloud_wdbctl0020hwt_firmware:*:*:*:*:*:*:*:* CVE-2018-17179,0.0,,0.08357,An issue was discovered in OpenEMR before 5.0.1 Patch 7. There is SQL Injection in the make_task function in /interface/forms/eye_mag/php/taskman_functions.php via /interface/forms/eye_mag/taskman.php.,2019-05-17,Metasploit,cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* CVE-2018-17207,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.87527,"An issue was discovered in Snap Creek Duplicator before 1.2.42. By accessing leftover installer files (installer.php and installer-backup.php), an attacker can inject PHP code into wp-config.php during the database setup step, achieving arbitrary code execution.",2018-09-19,Metasploit/Nuclei,cpe:2.3:a:snapcreek:duplicator:*:*:*:*:lite:wordpress:*:* CVE-2018-17246,0.0,,0.93277,Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.,2018-12-20,Nuclei,cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* CVE-2018-17254,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.87333,The JCK Editor component 6.4.4 for Joomla! allows SQL Injection via the jtreelink/dialogs/links.php parent parameter.,2018-09-20,Nuclei,cpe:2.3:a:arkextensions:jck_editor:6.4.4:*:*:*:*:joomla\!:*:* CVE-2018-17283,0.0,,0.35826,"Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter.",2018-09-21,Nuclei,cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:* CVE-2018-17408,0.0,,0.42871,Stack-based buffer overflows in Zahir Accounting Enterprise Plus 6 through build 10b allow remote attackers to execute arbitrary code via a crafted CSV file that is accessed through the Import CSV File menu.,2018-10-03,Metasploit,cpe:2.3:a:zahiraccounting:zahir_enterprise_plus:6:*:*:*:*:*:*:* CVE-2018-17422,0.0,,0.06141,dotCMS before 5.0.2 has open redirects via the html/common/forward_js.jsp FORWARD_URL parameter or the html/portlet/ext/common/page_preview_popup.jsp hostname parameter.,2019-03-07,Nuclei,cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:* CVE-2018-17431,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9133,Web Console in Comodo UTM Firewall before 2.7.0 allows remote attackers to execute arbitrary code without authentication via a crafted URL.,2019-01-30,Nuclei,cpe:2.3:a:comodo:unified_threat_management_firewall:*:*:*:*:*:*:*:* CVE-2018-17456,0.0,,0.707,"Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive ""git clone"" of a superproject if a .gitmodules file has a URL field beginning with a '-' character.",2018-10-06,Metasploit,cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2018-17463,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.91082,Incorrect side effect annotation in V8 in Google Chrome prior to 70.0.3538.64 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.,2018-11-14,Metasploit/CISA,cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2018-17480,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.2743,Execution of user supplied Javascript during array deserialization leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.,2018-12-11,CISA,cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2018-17552,0.0,,0.88398,SQL Injection in login.php in Naviwebs Navigate CMS 2.8 allows remote attackers to bypass authentication via the navigate-user cookie.,2018-10-03,Metasploit,cpe:2.3:a:naviwebs:navigate_cms:2.8:*:*:*:*:*:*:* CVE-2018-17553,0.0,,0.80078,"An ""Unrestricted Upload of File with Dangerous Type"" issue with directory traversal in navigate_upload.php in Naviwebs Navigate CMS 2.8 allows authenticated attackers to achieve remote code execution via a POST request with engine=picnik and id=../../../navigate_info.php.",2018-10-03,Metasploit,cpe:2.3:a:naviwebs:navigate_cms:2.8:*:*:*:*:*:*:* CVE-2018-17888,0.0,,0.41857,"NUUO CMS all versions 3.1 and prior, The application uses a session identification mechanism that could allow attackers to obtain the active session ID, which could allow arbitrary remote code execution.",2018-10-12,Metasploit,cpe:2.3:a:nuuo:nuuo_cms:*:*:*:*:*:*:*:* CVE-2018-17934,0.0,,0.67751,"NUUO CMS All versions 3.3 and prior the application allows external input to construct a pathname that is able to be resolved outside the intended directory. This could allow an attacker to impersonate a legitimate user, obtain restricted information, or execute arbitrary code.",2018-11-27,Metasploit,cpe:2.3:a:nuuo:nuuo_cms:*:*:*:*:*:*:*:* CVE-2018-17936,0.0,,0.67158,"NUUO CMS All versions 3.3 and prior the application allows the upload of arbitrary files that can modify or overwrite configuration files to the server, which could allow remote code execution.",2018-11-27,Metasploit,cpe:2.3:a:nuuo:nuuo_cms:*:*:*:*:*:*:*:* CVE-2018-18069,0.0,,0.08387,process_forms in the WPML (aka sitepress-multilingual-cms) plugin through 3.6.3 for WordPress has XSS via any locale_file_name_ parameter (such as locale_file_name_en) in an authenticated theme-localization.php request to wp-admin/admin.php.,2018-10-08,Nuclei,cpe:2.3:a:wpml:wpml:*:*:*:*:*:wordpress:*:* CVE-2018-18264,0.0,,0.909,Kubernetes Dashboard before 1.10.1 allows attackers to bypass authentication and use Dashboard's Service Account for reading secrets within the cluster.,2019-01-03,Nuclei,cpe:2.3:a:kubernetes:dashboard:*:*:*:*:*:*:*:* CVE-2018-18323,0.0,,0.84291,CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.480 has Local File Inclusion via directory traversal with an admin/index.php?module=file_editor&file=/../ URI.,2018-10-15,Nuclei,cpe:2.3:a:control-webpanel:webpanel:0.9.8.480:*:*:*:*:*:*:* CVE-2018-18325,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.76118,DNN (aka DotNetNuke) 9.2 through 9.2.2 uses a weak encryption algorithm to protect input parameters. NOTE: this issue exists because of an incomplete fix for CVE-2018-15811.,2019-07-03,Metasploit/CISA,cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:* CVE-2018-18326,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.76537,"DNN (aka DotNetNuke) 9.2 through 9.2.2 incorrectly converts encryption key source values, resulting in lower than expected entropy. NOTE: this issue exists because of an incomplete fix for CVE-2018-15812.",2019-07-03,Metasploit,cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:* CVE-2018-18556,9.9,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,0.69492,A privilege escalation issue was discovered in VyOS 1.1.8. The default configuration also allows operator users to execute the pppd binary with elevated (sudo) permissions. Certain input parameters are not properly validated. A malicious operator user can run the binary with elevated permissions and leverage its improper input validation condition to spawn an attacker-controlled shell with root privileges.,2018-12-17,Metasploit,cpe:2.3:o:vyos:vyos:1.1.8:*:*:*:*:*:*:* CVE-2018-18570,0.0,,0.11047,Planon before Live Build 41 has XSS.,2019-07-29,Nuclei,cpe:2.3:a:planonsoftware:planon:*:*:*:*:*:*:*:* CVE-2018-18608,0.0,,0.07885,"DedeCMS 5.7 SP2 allows XSS via the function named GetPageList defined in the include/datalistcp.class.php file that is used to display the page numbers list at the bottom of some templates, as demonstrated by the PATH_INFO to /member/index.php, /member/pm.php, /member/content_list.php, or /plus/feedback.php.",2018-10-23,Nuclei,cpe:2.3:a:dedecms:dedecms:5.7:sp2:*:*:*:*:*:* CVE-2018-18775,0.0,,0.16021,"Microstrategy Web, version 7, does not sufficiently encode user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability via the Login.asp Msg parameter. NOTE: this is a deprecated product.",2018-11-01,Nuclei,cpe:2.3:a:microstrategy:microstrategy_web:7:*:*:*:*:*:*:* CVE-2018-18777,0.0,,0.69525,"Directory traversal vulnerability in Microstrategy Web, version 7, in ""/WebMstr7/servlet/mstrWeb"" (in the parameter subpage) allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application. NOTE: this is a deprecated product.",2018-11-01,Nuclei,cpe:2.3:a:microstrategy:microstrategy_web:7:*:*:*:*:*:*:* CVE-2018-18778,0.0,,0.9258,ACME mini_httpd before 1.30 lets remote users read arbitrary files.,2018-10-29,Nuclei,cpe:2.3:a:acme:mini-httpd:*:*:*:*:*:*:*:* CVE-2018-18809,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,0.93958,"The default server implementation of TIBCO Software Inc.'s TIBCO JasperReports Library, TIBCO JasperReports Library Community Edition, TIBCO JasperReports Library for ActiveMatrix BPM, TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a directory-traversal vulnerability that may theoretically allow web server users to access contents of the host system. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Library: versions up to and including 6.3.4; 6.4.1; 6.4.2; 6.4.21; 7.1.0; 7.2.0, TIBCO JasperReports Library Community Edition: versions up to and including 6.7.0, TIBCO JasperReports Library for ActiveMatrix BPM: versions up to and including 6.4.21, TIBCO JasperReports Server: versions up to and including 6.3.4; 6.4.0; 6.4.1; 6.4.2; 6.4.3; 7.1.0, TIBCO JasperReports Server Community Edition: versions up to and including 6.4.3; 7.1.0, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.3, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 7.1.0, TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 7.1.0.",2019-03-07,Nuclei/CISA,cpe:2.3:a:tibco:jasperreports_library:*:*:*:*:activematrix_bpm:*:*:*;cpe:2.3:a:tibco:jasperreports_library:*:*:*:*:community:*:*:*;cpe:2.3:a:tibco:jasperreports_library:6.3.4:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_library:6.4.1:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_library:6.4.21:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_library:6.4.2:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_library:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_library:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:activematrix_bpm:*:*;cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:community:*:*:*;cpe:2.3:a:tibco:jasperreports_server:6.3.4:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_server:6.4.0:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_server:6.4.1:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_server:6.4.2:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_server:6.4.3:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_server:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_server:7.1.0:*:*:*:community:*:*:*;cpe:2.3:a:tibco:jaspersoft:*:*:*:*:*:aws_with_multi-tenancy:*:*;cpe:2.3:a:tibco:jaspersoft_reporting_and_analytics:*:*:*:*:*:aws:*:* CVE-2018-18925,0.0,,0.91977,"Gogs 0.11.66 allows remote code execution because it does not properly validate session IDs, as demonstrated by a "".."" session-file forgery in the file session provider in file.go. This is related to session ID handling in the go-macaron/session code for Macaron.",2018-11-04,Nuclei,cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* CVE-2018-18955,0.0,,0.1106,"In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected user namespace can bypass access controls on resources outside the namespace, as demonstrated by reading /etc/shadow. This occurs because an ID transformation takes place properly for the namespaced-to-kernel direction but not for the kernel-to-namespaced direction.",2018-11-16,Metasploit,cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* CVE-2018-18982,0.0,,0.66827,"NUUO CMS All versions 3.3 and prior the web server application allows injection of arbitrary SQL characters, which can be used to inject SQL into an executing statement and allow arbitrary code execution.",2018-11-27,Metasploit,cpe:2.3:a:nuuo:nuuo_cms:*:*:*:*:*:*:*:* CVE-2018-19127,0.0,,0.86004,"A code injection vulnerability in /type.php in PHPCMS 2008 allows attackers to write arbitrary content to a website cache file with a controllable filename, leading to arbitrary code execution. The PHP code is sent via the template parameter, and is written to a data/cache_template/*.tpl.php file along with a ""prepare() input is mishandled, as exploited in the wild in November 2018.",2018-11-12,Metasploit/Nuclei,cpe:2.3:a:van-ons:wp-gdpr-compliance:*:*:*:*:*:wordpress:*:* CVE-2018-19276,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.91891,OpenMRS before 2.24.0 is affected by an Insecure Object Deserialization vulnerability that allows an unauthenticated user to execute arbitrary commands on the targeted system via crafted XML data in a request body.,2019-03-21,Metasploit/Nuclei,cpe:2.3:a:openmrs:openmrs:*:*:*:*:*:*:*:* CVE-2018-19287,0.0,,0.19252,"XSS in the Ninja Forms plugin before 3.3.18 for WordPress allows Remote Attackers to execute JavaScript via the includes/Admin/Menus/Submissions.php (aka submissions page) begin_date, end_date, or form_id parameter.",2018-11-15,Nuclei,cpe:2.3:a:ninjaforma:ninja_forms:*:*:*:*:*:wordpress:*:* CVE-2018-19320,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.23571,"The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 exposes ring0 memcpy-like functionality that could allow a local attacker to take complete control of the affected system.",2018-12-21,CISA,cpe:2.3:a:gigabyte:aorus_graphics_engine:*:*:*:*:*:*:*:*;cpe:2.3:a:gigabyte:app_center:*:*:*:*:*:*:*:*;cpe:2.3:a:gigabyte:oc_guru_ii:2.08:*:*:*:*:*:*:*;cpe:2.3:a:gigabyte:xtreme_gaming_engine:*:*:*:*:*:*:*:* CVE-2018-19321,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.20734,"The GPCIDrv and GDrv low-level drivers in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 expose functionality to read and write arbitrary physical memory. This could be leveraged by a local attacker to elevate privileges.",2018-12-21,CISA,cpe:2.3:a:gigabyte:aorus_graphics_engine:*:*:*:*:*:*:*:*;cpe:2.3:a:gigabyte:app_center:*:*:*:*:*:*:*:*;cpe:2.3:a:gigabyte:oc_guru_ii:2.08:*:*:*:*:*:*:*;cpe:2.3:a:gigabyte:xtreme_gaming_engine:*:*:*:*:*:*:*:* CVE-2018-19322,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.03885,"The GPCIDrv and GDrv low-level drivers in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 expose functionality to read/write data from/to IO ports. This could be leveraged in a number of ways to ultimately run code with elevated privileges.",2018-12-21,CISA,cpe:2.3:a:gigabyte:aorus_graphics_engine:*:*:*:*:*:*:*:*;cpe:2.3:a:gigabyte:app_center:*:*:*:*:*:*:*:*;cpe:2.3:a:gigabyte:oc_guru_ii:2.08:*:*:*:*:*:*:*;cpe:2.3:a:gigabyte:xtreme_gaming_engine:*:*:*:*:*:*:*:* CVE-2018-19323,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.24217,"The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 exposes functionality to read and write Machine Specific Registers (MSRs).",2018-12-21,CISA,cpe:2.3:a:gigabyte:aorus_graphics_engine:*:*:*:*:*:*:*:*;cpe:2.3:a:gigabyte:gigabyte_app_center:*:*:*:*:*:*:*:*;cpe:2.3:a:gigabyte:oc_guru_ii:2.08:*:*:*:*:*:*:*;cpe:2.3:a:gigabyte:xtreme_gaming_engine:*:*:*:*:*:*:*:* CVE-2018-19326,0.0,,0.44086,"Zyxel VMG1312-B10D devices before 5.13(AAXA.8)C0 allow ../ Directory Traversal, as demonstrated by reading /etc/passwd.",2018-11-17,Nuclei,cpe:2.3:h:zyxel:vmg1312-b10d:-:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:vmg1312-b10d_firmware:*:*:*:*:*:*:*:* CVE-2018-19365,9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,0.84527,"The REST API in Wowza Streaming Engine 4.7.4.01 allows traversal of the directory structure and retrieval of a file via a remote, specifically crafted HTTP request.",2019-03-21,Nuclei,cpe:2.3:a:wowza:streaming_engine:4.7.4.0.1:*:*:*:*:*:*:* CVE-2018-19386,0.0,,0.23271,"SolarWinds Database Performance Analyzer 11.1.457 contains an instance of Reflected XSS in its idcStateError component, where the page parameter is reflected into the HREF of the 'Try Again' Button on the page, aka a /iwc/idcStateError.iwc?page= URI.",2019-08-14,Nuclei,cpe:2.3:a:solarwinds:database_performance_analyzer:11.1.457:*:*:*:*:*:*:* CVE-2018-19410,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93118,"PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator).",2018-11-21,Nuclei/CISA,cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:* CVE-2018-19422,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,0.84263,"/panel/uploads in Subrion CMS 4.2.1 allows remote attackers to execute arbitrary PHP code via a .pht or .phar file, because the .htaccess file omits these.",2018-11-21,Metasploit,cpe:2.3:a:intelliants:subrion_cms:4.2.1:*:*:*:*:*:*:* CVE-2018-19439,0.0,,0.43597,"XSS exists in the Administration Console in Oracle Secure Global Desktop 4.4 20080807152602 (but was fixed in later versions including 5.4). helpwindow.jsp has reflected XSS via all parameters, as demonstrated by the sgdadmin/faces/com_sun_web_ui/help/helpwindow.jsp windowTitle parameter.",2018-12-13,Nuclei,cpe:2.3:a:oracle:secure_global_desktop:4.4:*:*:*:*:*:*:* CVE-2018-19458,0.0,,0.79148,"In PHP Proxy 3.0.3, any user can read files from the server without authentication due to an index.php?q=file:/// LFI URI, a different vulnerability than CVE-2018-19246.",2018-11-22,Nuclei,cpe:2.3:a:php-proxy:php-proxy:3.0.3:*:*:*:*:*:*:* CVE-2018-19518,7.5,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,0.93956,"University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a ""-oProxyCommand"" argument.",2018-11-25,Metasploit,cpe:2.3:a:php:php:*:*:*:*:*:*:*:*;cpe:2.3:a:uw-imap_project:uw-imap:2007f:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2018-19749,0.0,,0.00236,DomainMOD through 4.11.01 has XSS via the assets/add/account-owner.php Owner name field.,2018-11-29,Nuclei,cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* CVE-2018-19751,0.0,,0.00236,DomainMOD through 4.11.01 has XSS via the admin/ssl-fields/add.php notes field for Custom SSL Fields.,2018-11-29,Nuclei,cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* CVE-2018-19752,0.0,,0.00236,DomainMOD through 4.11.01 has XSS via the assets/add/registrar.php notes field for the Registrar.,2018-11-29,Nuclei,cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* CVE-2018-19753,0.0,,0.73324,Tarantella Enterprise before 3.11 allows Directory Traversal.,2018-12-05,Nuclei,cpe:2.3:a:oracle:tarantella_enterprise:*:*:*:*:*:*:*:* CVE-2018-19877,0.0,,0.06688,login.php in Adiscon LogAnalyzer before 4.1.7 has XSS via the Login Button Referer field.,2018-12-05,Nuclei,cpe:2.3:a:adiscon:loganalyzer:*:*:*:*:*:*:*:* CVE-2018-19892,0.0,,0.01183,"DomainMOD through 4.11.01 has XSS via the admin/dw/add-server.php DisplayName, HostName, or UserName field.",2018-12-06,Nuclei,cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* CVE-2018-19914,0.0,,0.00255,DomainMOD through 4.11.01 has XSS via the assets/add/dns.php Profile Name or notes field.,2018-12-06,Nuclei,cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* CVE-2018-19915,0.0,,0.00392,DomainMOD through 4.11.01 has XSS via the assets/edit/host.php Web Host Name or Web Host URL field.,2018-12-06,Nuclei,cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* CVE-2018-19943,8.0,CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H,0.06458,"If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed these issues in the following QTS versions. QTS 4.4.2.1270 build 20200410 and later QTS 4.4.1.1261 build 20200330 and later QTS 4.3.6.1263 build 20200330 and later QTS 4.3.4.1282 build 20200408 and later QTS 4.3.3.1252 build 20200409 and later QTS 4.2.6 build 20200421 and later",2020-10-28,CISA,cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20170517:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20190322:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20190730:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20190921:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20191107:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20200109:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20200421:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20200611:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20200821:*:*:*:*:*:* CVE-2018-19949,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.49207,"If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands. QNAP has already fixed the issue in the following QTS versions. QTS 4.4.2.1231 on build 20200302; QTS 4.4.1.1201 on build 20200130; QTS 4.3.6.1218 on build 20200214; QTS 4.3.4.1190 on build 20200107; QTS 4.3.3.1161 on build 20200109; QTS 4.2.6 on build 20200109.",2020-10-28,CISA,cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20170517:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20190322:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20190730:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20190921:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20191107:*:*:*:*:*:* CVE-2018-19953,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.34489,"If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed the issue in the following QTS versions. QTS 4.4.2.1231 on build 20200302; QTS 4.4.1.1201 on build 20200130; QTS 4.3.6.1218 on build 20200214; QTS 4.3.4.1190 on build 20200107; QTS 4.3.3.1161 on build 20200109; QTS 4.2.6 on build 20200109.",2020-10-28,CISA,cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20170517:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20190322:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20190730:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20190921:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:build_20191107:*:*:*:*:*:* CVE-2018-20009,0.0,,0.00377,DomainMOD 4.11.01 has XSS via the assets/add/ssl-provider.php SSL Provider Name or SSL Provider URL field.,2018-12-10,Nuclei,cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* CVE-2018-20010,0.0,,0.00377,DomainMOD 4.11.01 has XSS via the assets/add/ssl-provider-account.php username field.,2018-12-10,Nuclei,cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* CVE-2018-20011,0.0,,0.00377,DomainMOD 4.11.01 has XSS via the assets/add/category.php Category Name or Stakeholder field.,2018-12-10,Nuclei,cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* CVE-2018-20062,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94306,"An issue was discovered in NoneCms V1.3. thinkphp/library/think/App.php allows remote attackers to execute arbitrary PHP code via crafted use of the filter parameter, as demonstrated by the s=index/\think\Request/input&filter=phpinfo&data=1 query string.",2018-12-11,Metasploit/Nuclei/CISA,cpe:2.3:a:5none:nonecms:1.3.0:*:*:*:*:*:*:* CVE-2018-20250,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.93406,"In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.",2019-02-05,Metasploit/CISA,cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:* CVE-2018-20323,0.0,,0.7532,www/soap/application/MCSoap/Logs.php in MailCleaner Community Edition 2018.08 allows remote attackers to execute arbitrary OS commands.,2019-03-21,Metasploit,cpe:2.3:a:mailcleaner:mailcleaner:2018.08:*:*:*:community:*:*:* CVE-2018-20434,0.0,,0.66987,"LibreNMS 1.46 allows remote attackers to execute arbitrary OS commands by using the $_POST['community'] parameter to html/pages/addhost.inc.php during creation of a new device, and then making a /ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost request that triggers html/includes/output/capture.inc.php command mishandling.",2019-04-24,Metasploit,cpe:2.3:a:librenms:librenms:1.46:*:*:*:*:*:*:* CVE-2018-20462,0.0,,0.03854,An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the jsmol.php data parameter.,2018-12-25,Nuclei,cpe:2.3:a:jsmol2wp_project:jsmol2wp:1.07:*:*:*:*:wordpress:*:* CVE-2018-20463,0.0,,0.77906,An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.,2018-12-25,Nuclei,cpe:2.3:a:jsmol2wp_project:jsmol2wp:1.07:*:*:*:*:wordpress:*:* CVE-2018-20470,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.88207,An issue was discovered in Tyto Sahi Pro through 7.x.x and 8.0.0. A directory traversal (arbitrary file access) vulnerability exists in the web reports module. This allows an outside attacker to view contents of sensitive files.,2019-06-17,Nuclei,cpe:2.3:a:sahipro:sahi_pro:*:*:*:*:*:*:*:* CVE-2018-20526,0.0,,0.83406,Roxy Fileman 1.4.5 allows unrestricted file upload in upload.php.,2019-03-21,Nuclei,cpe:2.3:a:roxyfileman:roxy_fileman:1.4.5:*:*:*:*:*:*:* CVE-2018-20608,0.0,,0.63562,imcat 4.4 allows remote attackers to read phpinfo output via the root/tools/adbug/binfo.php?phpinfo1 URI.,2018-12-30,Nuclei,cpe:2.3:a:txjia:imcat:4.4:*:*:*:*:*:*:* CVE-2018-20735,0.0,,0.38007,"An issue was discovered in BMC PATROL Agent through 11.3.01. It was found that the PatrolCli application can allow for lateral movement and escalation of privilege inside a Windows Active Directory environment. It was found that by default the PatrolCli / PATROL Agent application only verifies if the password provided for the given username is correct; it does not verify the permissions of the user on the network. This means if you have PATROL Agent installed on a high value target (domain controller), you can use a low privileged domain user to authenticate with PatrolCli and then connect to the domain controller and run commands as SYSTEM. This means any user on a domain can escalate to domain admin through PATROL Agent. NOTE: the vendor disputes this because they believe it is adequate to prevent this escalation by means of a custom, non-default configuration",2019-01-17,Metasploit,cpe:2.3:a:bmc:patrol_agent:*:*:*:*:*:*:*:* CVE-2018-20753,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.37234,"Kaseya VSA RMM before R9.3 9.3.0.35, R9.4 before 9.4.0.36, and R9.5 before 9.5.0.5 allows unprivileged remote attackers to execute PowerShell payloads on all managed devices. In January 2018, attackers actively exploited this vulnerability in the wild.",2019-02-05,CISA,cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:* CVE-2018-20781,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.04697,"In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.",2019-02-12,Metasploit,cpe:2.3:a:gnome:gnome_keyring:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* CVE-2018-20824,0.0,,0.53506,The WallboardServlet resource in Jira before version 7.13.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the cyclePeriod parameter.,2019-05-03,Nuclei,cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:* CVE-2018-20985,0.0,,0.42918,"The wp-payeezy-pay plugin before 2.98 for WordPress has local file inclusion in pay.php, donate.php, donate-rec, and pay-rec.",2019-08-22,Nuclei,cpe:2.3:a:payeezy:wp_payeezy_pay:*:*:*:*:*:wordpress:*:* CVE-2018-2380,6.6,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L,0.47801,"SAP CRM, 7.01, 7.02,7.30, 7.31, 7.33, 7.54, allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing ""traverse to parent directory"" are passed through to the file APIs.",2018-03-01,CISA,cpe:2.3:a:sap:customer_relationship_management:7.01:*:*:*:*:*:*:*;cpe:2.3:a:sap:customer_relationship_management:7.02:*:*:*:*:*:*:*;cpe:2.3:a:sap:customer_relationship_management:7.30:*:*:*:*:*:*:*;cpe:2.3:a:sap:customer_relationship_management:7.31:*:*:*:*:*:*:*;cpe:2.3:a:sap:customer_relationship_management:7.33:*:*:*:*:*:*:*;cpe:2.3:a:sap:customer_relationship_management:7.54:*:*:*:*:*:*:* CVE-2018-2392,0.0,,0.86102,"Under certain conditions SAP Internet Graphics Server (IGS) 7.20, 7.20EXT, 7.45, 7.49, 7.53, fails to validate XML External Entity appropriately causing the SAP Internet Graphics Server (IGS) to become unavailable.",2018-02-14,Metasploit/Nuclei,cpe:2.3:a:sap:internet_graphics_server:7.20:*:*:*:*:*:*:*;cpe:2.3:a:sap:internet_graphics_server:7.20ext:*:*:*:*:*:*:*;cpe:2.3:a:sap:internet_graphics_server:7.45:*:*:*:*:*:*:*;cpe:2.3:a:sap:internet_graphics_server:7.49:*:*:*:*:*:*:*;cpe:2.3:a:sap:internet_graphics_server:7.53:*:*:*:*:*:*:* CVE-2018-2393,0.0,,0.17952,"Under certain conditions SAP Internet Graphics Server (IGS) 7.20, 7.20EXT, 7.45, 7.49, 7.53, fails to validate XML External Entity appropriately causing the SAP Internet Graphics Server (IGS) to become unavailable.",2018-02-14,Metasploit,cpe:2.3:a:sap:internet_graphics_server:7.20:*:*:*:*:*:*:*;cpe:2.3:a:sap:internet_graphics_server:7.20ext:*:*:*:*:*:*:*;cpe:2.3:a:sap:internet_graphics_server:7.45:*:*:*:*:*:*:*;cpe:2.3:a:sap:internet_graphics_server:7.49:*:*:*:*:*:*:*;cpe:2.3:a:sap:internet_graphics_server:7.53:*:*:*:*:*:*:* CVE-2018-2628,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94422,"Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).",2018-04-19,Metasploit/Nuclei/CISA,cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.3:*:*:*:*:*:*:* CVE-2018-2791,0.0,,0.87017,"Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Advanced UI). Supported versions that are affected are 11.1.1.8.0, 12.2.1.2.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data as well as unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).",2018-04-19,Nuclei,cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:webcenter_sites:12.2.1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:* CVE-2018-2893,0.0,,0.9429,"Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).",2018-07-18,Nuclei,cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.3:*:*:*:*:*:*:* CVE-2018-2894,0.0,,0.94307,"Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). Supported versions that are affected are 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).",2018-07-18,Nuclei,cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.3:*:*:*:*:*:*:* CVE-2018-3167,0.0,,0.68033,"Vulnerability in the Application Management Pack for Oracle E-Business Suite component of Oracle E-Business Suite (subcomponent: User Monitoring). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Application Management Pack for Oracle E-Business Suite. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Application Management Pack for Oracle E-Business Suite accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).",2018-10-17,Nuclei,cpe:2.3:a:oracle:application_management_pack:12.1.3:*:*:*:*:e-business_suite:*:*;cpe:2.3:a:oracle:application_management_pack:12.2.3:*:*:*:*:e-business_suite:*:*;cpe:2.3:a:oracle:application_management_pack:12.2.4:*:*:*:*:e-business_suite:*:*;cpe:2.3:a:oracle:application_management_pack:12.2.5:*:*:*:*:e-business_suite:*:*;cpe:2.3:a:oracle:application_management_pack:12.2.6:*:*:*:*:e-business_suite:*:*;cpe:2.3:a:oracle:application_management_pack:12.2.7:*:*:*:*:e-business_suite:*:* CVE-2018-3238,0.0,,0.30481,"Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Advanced UI). The supported version that is affected is 11.1.1.8.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data as well as unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 6.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N).",2018-10-17,Nuclei,cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:* CVE-2018-3714,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,0.75099,"node-srv node module suffers from a Path Traversal vulnerability due to lack of validation of url, which allows a malicious user to read content of any file with known path.",2018-06-07,Nuclei,cpe:2.3:a:node-srv_project:node-srv:*:*:*:*:*:node.js:*:* CVE-2018-3760,0.0,,0.93243,"There is an information leak vulnerability in Sprockets. Versions Affected: 4.0.0.beta7 and lower, 3.7.1 and lower, 2.12.4 and lower. Specially crafted requests can be used to access files that exists on the filesystem that is outside an application's root directory, when the Sprockets server is used in production. All users running an affected release should either upgrade or use one of the work arounds immediately.",2018-06-26,Nuclei,cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*;cpe:2.3:a:redhat:cloudforms:4.6:*:*:*:*:*:*:*;cpe:2.3:a:sprockets_project:sprockets:*:*:*:*:*:*:*:*;cpe:2.3:a:sprockets_project:sprockets:4.0.0:beta1:*:*:*:*:*:*;cpe:2.3:a:sprockets_project:sprockets:4.0.0:beta2:*:*:*:*:*:*;cpe:2.3:a:sprockets_project:sprockets:4.0.0:beta3:*:*:*:*:*:*;cpe:2.3:a:sprockets_project:sprockets:4.0.0:beta4:*:*:*:*:*:*;cpe:2.3:a:sprockets_project:sprockets:4.0.0:beta5:*:*:*:*:*:*;cpe:2.3:a:sprockets_project:sprockets:4.0.0:beta6:*:*:*:*:*:*;cpe:2.3:a:sprockets_project:sprockets:4.0.0:beta7:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:* CVE-2018-3810,0.0,,0.90968,"Authentication Bypass vulnerability in the Oturia Smart Google Code Inserter plugin before 3.5 for WordPress allows unauthenticated attackers to insert arbitrary JavaScript or HTML code (via the sgcgoogleanalytic parameter) that runs on all pages served by WordPress. The saveGoogleCode() function in smartgooglecode.php does not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update the inserted code.",2018-01-01,Nuclei,cpe:2.3:a:oturia:smart_google_code_inserter:*:*:*:*:*:wordpress:*:* CVE-2018-4162,0.0,,0.40022,"An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the ""WebKit"" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",2018-04-03,Metasploit,cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*;cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2018-4233,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.90064,"An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the ""WebKit"" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",2018-06-08,Metasploit,cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2018-4237,0.0,,0.70337,"An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the ""libxpc"" component. It allows attackers to gain privileges via a crafted app that leverages a logic error.",2018-06-08,Metasploit,cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* CVE-2018-4344,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.00322,"A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5.",2019-04-03,CISA,cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* CVE-2018-4404,8.8,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.70102,"In iOS before 11.4 and macOS High Sierra before 10.13.5, a memory corruption issue exists and was addressed with improved memory handling.",2019-01-11,Metasploit,cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* CVE-2018-4878,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93156,A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.,2018-02-06,CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*;cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2018-4939,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.85528,"Adobe ColdFusion Update 5 and earlier versions, ColdFusion 11 Update 13 and earlier versions have an exploitable Deserialization of Untrusted Data vulnerability. Successful exploitation could lead to arbitrary code execution.",2018-05-19,CISA,cpe:2.3:a:adobe:coldfusion:11.0:-:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update10:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update11:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update12:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update13:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update1:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update2:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update3:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update4:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update5:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update6:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update7:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update8:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:11.0:update9:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:update1:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:update2:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:update3:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:update4:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:2016:update5:*:*:*:*:*:* CVE-2018-4990,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.60065,"Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Double Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",2018-07-09,CISA,cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*;cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*;cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*;cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* CVE-2018-4993,0.0,,0.82748,"Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an NTLM SSO hash theft vulnerability. Successful exploitation could lead to information disclosure.",2018-07-09,Metasploit,cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*;cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*;cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*;cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2018-5002,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.37375,Adobe Flash Player versions 29.0.0.171 and earlier have a Stack-based buffer overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.,2018-07-09,CISA,cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*;cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2018-5230,0.0,,0.24983,"The issue collector in Atlassian Jira before version 7.6.6, from version 7.7.0 before version 7.7.4, from version 7.8.0 before version 7.8.4 and from version 7.9.0 before version 7.9.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the error message of custom fields when an invalid value is specified.",2018-05-14,Nuclei,cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*;cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* CVE-2018-5233,0.0,,0.18828,Cross-site scripting (XSS) vulnerability in system/src/Grav/Common/Twig/Twig.php in Grav CMS before 1.3.0 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to admin/tools.,2018-03-19,Nuclei,cpe:2.3:a:getgrav:grav_cms:*:*:*:*:*:*:*:* CVE-2018-5316,0.0,,0.02338,"The ""SagePay Server Gateway for WooCommerce"" plugin before 1.0.9 for WordPress has XSS via the includes/pages/redirect.php page parameter.",2018-01-09,Nuclei,cpe:2.3:a:patsatech:sagepay_server_gateway_for_woocommerce:*:*:*:*:*:wordpress:*:* CVE-2018-5333,0.0,,0.02296,"In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",2018-01-11,Metasploit,cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* CVE-2018-5430,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.70808,"The Spring web flows of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contain a vulnerability which may allow any authenticated user read-only access to the contents of the web application, including key configuration files. Affected releases include TIBCO Software Inc.'s TIBCO JasperReports Server: versions up to and including 6.2.4; 6.3.0; 6.3.2; 6.3.3;6.4.0; 6.4.2, TIBCO JasperReports Server Community Edition: versions up to and including 6.4.2, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.2, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 6.4.2, TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 6.4.2.",2018-04-17,CISA,cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:activematrix_bpm:*:*;cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:community:*:*:*;cpe:2.3:a:tibco:jasperreports_server:6.3.0:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_server:6.3.2:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_server:6.3.3:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_server:6.4.0:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jasperreports_server:6.4.2:*:*:*:*:*:*:*;cpe:2.3:a:tibco:jaspersoft:*:*:*:*:*:aws_with_multi-tenancy:*:*;cpe:2.3:a:tibco:jaspersoft_reporting_and_analytics:*:*:*:*:*:aws:*:* CVE-2018-5715,0.0,,0.07943,phprint.php in SugarCRM 3.5.1 has XSS via a parameter name in the query string (aka a $key variable).,2018-01-16,Nuclei,cpe:2.3:a:sugarcrm:sugarcrm:3.5.1:*:*:*:*:*:*:* CVE-2018-5955,0.0,,0.8868,"An issue was discovered in GitStack through 2.3.10. User controlled input is not sufficiently filtered, allowing an unauthenticated attacker to add a user to the server via the username and password fields to the rest/user/ URI.",2018-01-21,Metasploit,cpe:2.3:a:smartmobilesoftware:gitstack:*:*:*:*:*:*:*:* CVE-2018-5999,0.0,,0.90791,"An issue was discovered in AsusWRT before 3.0.0.4.384_10007. In the handle_request function in router/httpd/httpd.c, processing of POST requests continues even if authentication fails.",2018-01-22,Metasploit,cpe:2.3:o:asus:asuswrt:*:*:*:*:*:*:*:* CVE-2018-6000,0.0,,0.90654,"An issue was discovered in AsusWRT before 3.0.0.4.384_10007. The do_vpnupload_post function in router/httpd/web.c in vpnupload.cgi provides functionality for setting NVRAM configuration values, which allows attackers to set the admin password and launch an SSH daemon (or enable infosvr command mode), and consequently obtain remote administrative access, via a crafted request. This is available to unauthenticated attackers in conjunction with CVE-2018-5999.",2018-01-22,Metasploit,cpe:2.3:o:asus:asuswrt:*:*:*:*:*:*:*:* CVE-2018-6008,0.0,,0.77607,Arbitrary File Download exists in the Jtag Members Directory 5.3.7 component for Joomla! via the download_file parameter.,2018-01-29,Nuclei,cpe:2.3:a:joomlatag:jtag_members_directory:5.3.7:*:*:*:*:joomla\!:*:* CVE-2018-6065,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.86749,Integer overflow in computing the required allocation size when instantiating a new javascript object in V8 in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,2018-11-14,CISA,cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:a:mi:mi6_browser:-:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* CVE-2018-6184,0.0,,0.49051,ZEIT Next.js 4 before 4.2.3 has Directory Traversal under the /_next request namespace.,2018-01-24,Nuclei,cpe:2.3:a:zeit:next.js:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.1.4:*:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.1.4:canary_1:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.1.4:canary_2:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.2.0:canary_1:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:zeit:next.js:4.2.2:*:*:*:*:*:*:* CVE-2018-6200,0.0,,0.15384,vBulletin 3.x.x and 4.2.x through 4.2.5 has an open redirect via the redirector.php url parameter.,2018-01-25,Nuclei,cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:* CVE-2018-6317,0.0,,0.72662,"The remote management interface in Claymore Dual Miner 10.5 and earlier is vulnerable to an unauthenticated format string vulnerability, allowing remote attackers to read memory or cause a denial of service.",2018-02-02,Metasploit,cpe:2.3:a:claymore_dual_miner_project:claymore_dual_miner:*:*:*:*:*:*:*:* CVE-2018-6328,0.0,,0.70958,"It was discovered that the Unitrends Backup (UB) before 10.1.0 user interface was exposed to an authentication bypass, which then could allow an unauthenticated user to inject arbitrary commands into its /api/hosts parameters using backquotes.",2018-03-14,Metasploit,cpe:2.3:a:kaseya:unitrends_backup:*:*:*:*:*:*:*:* CVE-2018-6329,0.0,,0.78992,"It was discovered that the Unitrends Backup (UB) before 10.1.0 libbpext.so authentication could be bypassed with a SQL injection, allowing a remote attacker to place a privilege escalation exploit on the target system and subsequently execute arbitrary commands.",2018-03-14,Metasploit,cpe:2.3:a:unitrends:backup:*:*:*:*:*:*:*:* CVE-2018-6530,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93889,"OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin) in D-Link DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and previous versions, DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to execute arbitrary OS commands via the service parameter.",2018-03-06,Nuclei/CISA,cpe:2.3:h:dlink:dir-860l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-865l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-868l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-880l:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-860l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-865l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-868l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-880l_firmware:*:*:*:*:*:*:*:* CVE-2018-6605,0.0,,0.90109,"SQL Injection exists in the Zh BaiduMap 3.0.0.1 component for Joomla! via the id parameter in a getPlacemarkDetails, getPlacemarkHoverText, getPathHoverText, or getPathDetails request.",2018-02-05,Nuclei,cpe:2.3:a:zh_baidumap_project:zh_baidumap:3.0.0.1:*:*:*:*:joomla\!:*:* CVE-2018-6789,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.84925,"An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.",2018-02-08,CISA,cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2018-6849,0.0,,0.76795,"In the WebRTC component in DuckDuckGo 4.2.0, after visiting a web site that attempts to gather complete client information (such as https://ip.voidsec.com), the browser can disclose a private IP address in a STUN request.",2018-04-01,Metasploit,cpe:2.3:a:duckduckgo:duckduckgo:4.2.0:*:*:*:*:*:*:* CVE-2018-6882,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.65605,Cross-site scripting (XSS) vulnerability in the ZmMailMsgView.getAttachmentLinkHtml function in Zimbra Collaboration Suite (ZCS) before 8.7 Patch 1 and 8.8.x before 8.8.7 might allow remote attackers to inject arbitrary web script or HTML via a Content-Location header in an email attachment.,2018-03-27,CISA,cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.0:-:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.0:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.1:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.2:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.3:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.4:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.5:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.6:*:*:*:*:*:*:* CVE-2018-6892,0.0,,0.90167,"An issue was discovered in CloudMe before 1.11.0. An unauthenticated remote attacker that can connect to the ""CloudMe Sync"" client application listening on port 8888 can send a malicious payload causing a buffer overflow condition. This will result in an attacker controlling the program's execution flow and allowing arbitrary code execution.",2018-02-11,Metasploit,cpe:2.3:a:cloudme:sync:*:*:*:*:*:*:*:* CVE-2018-6910,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.91264,DedeCMS 5.7 allows remote attackers to discover the full path via a direct request for include/downmix.inc.php or inc/inc_archives_functions.php.,2018-02-13,Nuclei,cpe:2.3:a:dedecms:dedecms:5.7:*:*:*:*:*:*:* CVE-2018-6961,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92029,VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.,2018-06-11,CISA,cpe:2.3:a:vmware:nsx_sd-wan_by_velocloud:*:*:*:*:*:*:*:* CVE-2018-7192,0.0,,0.00775,"Cross-site scripting (XSS) vulnerability in /ajax.php/form/help-topic in Enhancesoft osTicket before 1.10.2 allows remote attackers to inject arbitrary web script or HTML via the ""message"" parameter.",2018-03-27,Nuclei,cpe:2.3:a:osticket:osticket:*:*:*:*:*:*:*:* CVE-2018-7193,0.0,,0.0013,"Cross-site scripting (XSS) vulnerability in /scp/directory.php in Enhancesoft osTicket before 1.10.2 allows remote attackers to inject arbitrary web script or HTML via the ""order"" parameter.",2018-03-27,Nuclei,cpe:2.3:a:osticket:osticket:*:*:*:*:*:*:*:* CVE-2018-7196,0.0,,0.0013,"Cross-site scripting (XSS) vulnerability in /scp/index.php in Enhancesoft osTicket before 1.10.2 allows remote attackers to inject arbitrary web script or HTML via the ""sort"" parameter.",2018-03-27,Nuclei,cpe:2.3:a:osticket:osticket:*:*:*:*:*:*:*:* CVE-2018-7251,0.0,,0.92809,"An issue was discovered in config/error.php in Anchor 0.12.3. The error log is exposed at an errors.log URI, and contains MySQL credentials if a MySQL error (such as ""Too many connections"") has occurred.",2018-02-19,Nuclei,cpe:2.3:a:anchorcms:anchor:0.12.3:*:*:*:*:*:*:* CVE-2018-7282,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.74238,The username parameter of the TITool PrintMonitor solution during the login request is vulnerable to and/or time-based blind SQLi.,2019-12-06,Nuclei,cpe:2.3:a:titool:printmonitor:*:*:*:*:*:*:*:* CVE-2018-7314,0.0,,0.9227,"SQL Injection exists in the PrayerCenter 3.0.2 component for Joomla! via the sessionid parameter, a different vulnerability than CVE-2008-6429.",2018-02-22,Nuclei,cpe:2.3:a:mlwebtechnologies:prayercenter:3.0.2:*:*:*:*:joomla\!:*:* CVE-2018-7422,0.0,,0.91394,"A Local File Inclusion vulnerability in the Site Editor plugin through 1.1.1 for WordPress allows remote attackers to retrieve arbitrary files via the ajax_path parameter to editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php, aka absolute path traversal.",2018-03-19,Nuclei,cpe:2.3:a:siteeditor:site_editor:*:*:*:*:*:wordpress:*:* CVE-2018-7445,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.84296,"A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 are vulnerable.",2018-03-19,CISA,cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*;cpe:2.3:o:mikrotik:routeros:6.42:rc11:*:*:*:*:*:*;cpe:2.3:o:mikrotik:routeros:6.42:rc12:*:*:*:*:*:*;cpe:2.3:o:mikrotik:routeros:6.42:rc14:*:*:*:*:*:*;cpe:2.3:o:mikrotik:routeros:6.42:rc15:*:*:*:*:*:*;cpe:2.3:o:mikrotik:routeros:6.42:rc18:*:*:*:*:*:*;cpe:2.3:o:mikrotik:routeros:6.42:rc20:*:*:*:*:*:*;cpe:2.3:o:mikrotik:routeros:6.42:rc23:*:*:*:*:*:*;cpe:2.3:o:mikrotik:routeros:6.42:rc24:*:*:*:*:*:*;cpe:2.3:o:mikrotik:routeros:6.42:rc2:*:*:*:*:*:*;cpe:2.3:o:mikrotik:routeros:6.42:rc5:*:*:*:*:*:*;cpe:2.3:o:mikrotik:routeros:6.42:rc6:*:*:*:*:*:*;cpe:2.3:o:mikrotik:routeros:6.42:rc9:*:*:*:*:*:* CVE-2018-7467,0.0,,0.10699,AxxonSoft Axxon Next has Directory Traversal via an initial /css//..%2f substring in a URI.,2018-02-27,Nuclei,cpe:2.3:a:axxonsoft:next:-:*:*:*:*:*:*:* CVE-2018-7490,0.0,,0.94105,"uWSGI before 2.0.17 mishandles a DOCUMENT_ROOT check during use of the --php-docroot option, allowing directory traversal.",2018-02-26,Nuclei,cpe:2.3:a:unbit:uwsgi:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2018-7573,0.0,,0.77803,"An issue was discovered in FTPShell Client 6.7. A remote FTP server can send 400 characters of 'F' in conjunction with the FTP 220 response code to crash the application; after this overflow, one can run arbitrary code on the victim machine. This is similar to CVE-2009-3364 and CVE-2017-6465.",2018-03-01,Metasploit,cpe:2.3:a:ftpshell:ftpshell_client:6.70:*:*:*:*:*:*:* CVE-2018-7600,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94489,"Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.",2018-03-29,Metasploit/Nuclei/CISA,cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2018-7602,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9425,"A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild.",2018-07-19,Nuclei/CISA,cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2018-7653,0.0,,0.01096,"In YzmCMS 3.6, index.php has XSS via the a, c, or m parameter.",2018-03-04,Nuclei,cpe:2.3:a:yzmcms:yzmcms:3.6:*:*:*:*:*:*:* CVE-2018-7662,0.0,,0.787,Couch through 2.0 allows remote attackers to discover the full path via a direct request to includes/mysql2i/mysql2i.func.php or addons/phpmailer/phpmailer.php.,2018-03-04,Nuclei,cpe:2.3:a:couchcms:couch:*:*:*:*:*:*:*:* CVE-2018-7665,0.0,,0.71111,"An issue was discovered in ClipBucket before 4.0.0 Release 4902. A malicious file can be uploaded via the name parameter to actions/beats_uploader.php or actions/photo_uploader.php, or the coverPhoto parameter to edit_account.php.",2018-03-05,Metasploit,cpe:2.3:a:clip-bucket:clipbucket:*:*:*:*:*:*:*:* CVE-2018-7700,0.0,,0.9158,"DedeCMS 5.7 has CSRF with an impact of arbitrary code execution, because the partcode parameter in a tag_test_action.php request can specify a runphp field in conjunction with PHP code.",2018-03-27,Nuclei,cpe:2.3:a:dedecms:dedecms:5.7:*:*:*:*:*:*:* CVE-2018-7719,0.0,,0.77856,Acrolinx Server before 5.2.5 on Windows allows Directory Traversal.,2018-03-25,Nuclei,cpe:2.3:a:acrolinx:acrolinx_server:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2018-7841,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.59135,A SQL Injection (CWE-89) vulnerability exists in U.motion Builder software version 1.3.4 which could cause unwanted code execution when an improper set of characters is entered.,2019-05-22,Nuclei/CISA,cpe:2.3:a:schneider-electric:u.motion_builder:1.3.4:*:*:*:*:*:*:* CVE-2018-7890,0.0,,0.86279,"A remote code execution issue was discovered in Zoho ManageEngine Applications Manager before 13.6 (build 13640). The publicly accessible testCredential.do endpoint takes multiple user inputs and validates supplied credentials by accessing a specified system. This endpoint calls several internal classes, and then executes a PowerShell script. If the specified system is OfficeSharePointServer, then the username and password parameters to this script are not validated, leading to Command Injection.",2018-03-08,Metasploit,cpe:2.3:a:zohocorp:manageengine_applications_manager:*:*:*:*:*:*:*:* CVE-2018-8006,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.78775,An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of Apache ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the QueueFilter parameter.,2018-10-10,Nuclei,cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:* CVE-2018-8024,0.0,,0.56588,"In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause script to execute and expose information from the user's view of the Spark UI. While some browsers like recent versions of Chrome and Safari are able to block this type of attack, current versions of Firefox (and possibly others) do not.",2018-07-12,Nuclei,cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:spark:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:* CVE-2018-8033,0.0,,0.89406,"In Apache OFBiz 16.11.01 to 16.11.04, the OFBiz HTTP engine (org.apache.ofbiz.service.engine.HttpEngine.java) handles requests for HTTP services via the /webtools/control/httpService endpoint. Both POST and GET requests to the httpService endpoint may contain three parameters: serviceName, serviceMode, and serviceContext. The exploitation occurs by having DOCTYPEs pointing to external references that trigger a payload that returns secret information from the host.",2018-12-13,Nuclei,cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:* CVE-2018-8065,0.0,,0.77166,An issue was discovered in the web server in Flexense SyncBreeze Enterprise 10.6.24. There is a user mode write access violation on the syncbrs.exe memory region that can be triggered by rapidly sending a variety of HTTP requests with long HTTP header values or long URIs.,2018-03-12,Metasploit,cpe:2.3:a:flexense:syncbreeze:10.6.24:*:*:*:enterprise:*:*:* CVE-2018-8120,7.0,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,0.94149,"An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka ""Win32k Elevation of Privilege Vulnerability."" This affects Windows Server 2008, Windows 7, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8124, CVE-2018-8164, CVE-2018-8166.",2018-05-09,Metasploit/CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* CVE-2018-8174,7.5,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,0.94283,"A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka ""Windows VBScript Engine Remote Code Execution Vulnerability."" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.",2018-05-09,CISA,cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* CVE-2018-8298,7.5,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,0.89009,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka ""Scripting Engine Memory Corruption Vulnerability."" This affects ChakraCore. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8287, CVE-2018-8288, CVE-2018-8291, CVE-2018-8296.",2018-07-11,CISA,cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:* CVE-2018-8373,7.5,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,0.73305,"A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka ""Scripting Engine Memory Corruption Vulnerability."" This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.",2018-08-15,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* CVE-2018-8405,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.12741,"An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka ""DirectX Graphics Kernel Elevation of Privilege Vulnerability."" This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8400, CVE-2018-8401, CVE-2018-8406.",2018-08-15,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* CVE-2018-8406,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.12741,"An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka ""DirectX Graphics Kernel Elevation of Privilege Vulnerability."" This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8400, CVE-2018-8401, CVE-2018-8405.",2018-08-15,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* CVE-2018-8414,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.87827,"A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths, aka ""Windows Shell Remote Code Execution Vulnerability."" This affects Windows 10 Servers, Windows 10.",2018-08-15,CISA,cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:* CVE-2018-8440,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.77725,"An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC), aka ""Windows ALPC Elevation of Privilege Vulnerability."" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.",2018-09-13,Metasploit/CISA,cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* CVE-2018-8453,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.83473,"An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka ""Win32k Elevation of Privilege Vulnerability."" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.",2018-10-10,Metasploit/CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2018-8581,7.4,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N,0.90918,"An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka ""Microsoft Exchange Server Elevation of Privilege Vulnerability."" This affects Microsoft Exchange Server.",2018-11-14,CISA,cpe:2.3:a:microsoft:exchange_server:2010:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2013:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2016:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2019:-:*:*:*:*:*:* CVE-2018-8589,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.04106,"An elevation of privilege vulnerability exists when Windows improperly handles calls to Win32k.sys, aka ""Windows Win32k Elevation of Privilege Vulnerability."" This affects Windows Server 2008, Windows 7, Windows Server 2008 R2.",2018-11-14,CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* CVE-2018-8611,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.06406,"An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka ""Windows Kernel Elevation of Privilege Vulnerability."" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.",2018-12-12,CISA,cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:pro_n:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2018-8639,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.28081,"An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka ""Win32k Elevation of Privilege Vulnerability."" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8641.",2018-12-12,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:pro_n:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2018-8653,7.5,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,0.29375,"A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka ""Scripting Engine Memory Corruption Vulnerability."" This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8643.",2018-12-20,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1703:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1709:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:pro_n:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2018-8715,0.0,,0.89058,"The Embedthis HTTP library, and Appweb versions before 7.0.3, have a logic flaw related to the authCondition function in http/httpLib.c. With a forged HTTP request, it is possible to bypass authentication for the form and digest login types.",2018-03-15,Nuclei,cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:* CVE-2018-8719,0.0,,0.07242,"An issue was discovered in the WP Security Audit Log plugin 3.1.1 for WordPress. Access to wp-content/uploads/wp-security-audit-log/* files is not restricted. For example, these files are indexed by Google and allows for attackers to possibly find sensitive information.",2018-04-04,Nuclei,cpe:2.3:a:wpsecurityauditlog:wp_security_audit_log:3.1.1:*:*:*:*:wordpress:*:* CVE-2018-8727,0.0,,0.53351,Path Traversal in Gateway in Mirasys DVMS Workstation 5.12.6 and earlier allows an attacker to traverse the file system to access files or directories via the Web Client webserver.,2018-06-19,Nuclei,cpe:2.3:a:mirasys:dvms_workstation:*:*:*:*:*:*:*:* CVE-2018-8733,0.0,,0.79722,Authentication bypass vulnerability in the core config manager in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an unauthenticated attacker to make configuration changes and leverage an authenticated SQL injection vulnerability.,2018-04-18,Metasploit,cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:* CVE-2018-8734,0.0,,0.78955,SQL injection vulnerability in the core config manager in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an attacker to execute arbitrary SQL commands via the selInfoKey1 parameter.,2018-04-18,Metasploit,cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:* CVE-2018-8735,0.0,,0.76531,"Remote command execution (RCE) vulnerability in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an attacker to execute arbitrary commands on the target system, aka OS command injection.",2018-04-18,Metasploit,cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:* CVE-2018-8736,0.0,,0.67977,A privilege escalation vulnerability in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an attacker to leverage an RCE vulnerability escalating to root.,2018-04-18,Metasploit,cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:* CVE-2018-8770,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.58047,"Physical path Leakage exists in Western Bridge Cobub Razor 0.8.0 via generate.php, controllers/getConfigTest.php, controllers/getUpdateTest.php, controllers/postclientdataTest.php, controllers/posterrorTest.php, controllers/posteventTest.php, controllers/posttagTest.php, controllers/postusinglogTest.php, fixtures/Controller_fixt.php, fixtures/Controller_fixt2.php, fixtures/view_fixt2.php, libs/ipTest.php, or models/commonDbfix.php in tests/.",2018-03-18,Nuclei,cpe:2.3:a:cobub:razor:0.8.0:*:*:*:*:*:*:* CVE-2018-8823,0.0,,0.89199,modules/bamegamenu/ajax_phpcode.php in the Responsive Mega Menu (Horizontal+Vertical+Dropdown) Pro module 1.0.32 for PrestaShop 1.5.5.0 through 1.7.2.5 allows remote attackers to execute arbitrary PHP code via the code parameter.,2018-03-28,Nuclei,cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*;cpe:2.3:a:responsive_mega_menu_pro_project:responsive_mega_menu_pro:1.0.32:*:*:*:*:prestashop:*:* CVE-2018-8897,0.0,,0.2321,"A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL < 3, the debug exception is delivered after the transfer to CPL < 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.",2018-05-08,Metasploit,cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:*;cpe:2.3:a:citrix:xenserver:6.5:*:*:*:*:*:*:*;cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*;cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*;cpe:2.3:a:citrix:xenserver:7.2:*:*:*:*:*:*:*;cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:*;cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:*;cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_virtualization_manager:3.0:*:*:*:*:*:*:*;cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:*;cpe:2.3:o:synology:diskstation_manager:6.0:*:*:*:*:*:*:*;cpe:2.3:o:synology:diskstation_manager:6.1:*:*:*:*:*:*:*;cpe:2.3:o:xen:xen:-:*:*:*:*:*:x86:* CVE-2018-9118,0.0,,0.74425,exports/download.php in the 99 Robots WP Background Takeover Advertisements plugin before 4.1.5 for WordPress has Directory Traversal via a .. in the filename parameter.,2018-04-12,Nuclei,cpe:2.3:a:99robots:wp_background_takeover_advertisements:*:*:*:*:*:wordpress:*:* CVE-2018-9160,0.0,,0.63695,SickRage before v2018.03.09-1 includes cleartext credentials in HTTP responses.,2018-03-31,Metasploit,cpe:2.3:a:sickrage:sickrage:*:*:*:*:*:*:*:* CVE-2018-9161,0.0,,0.69162,Prisma Industriale Checkweigher PrismaWEB 1.21 allows remote attackers to discover the hardcoded prisma password for the prismaweb account by reading user/scripts/login_par.js.,2018-03-31,Nuclei,cpe:2.3:a:prismaindustriale:checkweigher_prismaweb:1.21:*:*:*:*:*:*:* CVE-2018-9205,0.0,,0.8191,"Vulnerability in avatar_uploader v7.x-1.0-beta8 , The code in view.php doesn't verify users or sanitize the file path.",2018-04-04,Nuclei,cpe:2.3:a:drupal:avatar_uploader:7.x-1.0:beta8:*:*:*:*:*:* CVE-2018-9206,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93191,Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0,2018-10-11,Metasploit,cpe:2.3:a:jquery_file_upload_project:jquery_file_upload:*:*:*:*:*:*:*:* CVE-2018-9276,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,0.83401,An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios.,2018-07-02,Metasploit/CISA,cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:* CVE-2018-9845,0.0,,0.69404,Etherpad Lite before 1.6.4 is exploitable for admin access.,2018-04-29,Nuclei,cpe:2.3:a:etherpad:etherpad_lite:*:*:*:*:*:*:*:* CVE-2018-9948,0.0,,0.87518,This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of typed arrays. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-5380.,2018-05-17,Metasploit,cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:* CVE-2018-9958,0.0,,0.86753,"This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Text Annotations. When setting the point attribute, the process does not properly validate the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5620.",2018-05-17,Metasploit,cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:* CVE-2018-9995,0.0,,0.94138,"TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night OWL, DVR Login, HVR Login, and MDVR Login, which run re-branded versions of the original TBK DVR4104 and DVR4216 series, allow remote attackers to bypass authentication via a ""Cookie: uid=admin"" header, as demonstrated by a device.rsp?opt=user&cmd=list request that provides credentials within JSON data in a response.",2018-04-10,Nuclei,cpe:2.3:h:tbkvision:tbk-dvr4104:-:*:*:*:*:*:*:*;cpe:2.3:h:tbkvision:tbk-dvr4216:-:*:*:*:*:*:*:*;cpe:2.3:o:tbkvision:tbk-dvr4104_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:tbkvision:tbk-dvr4216_firmware:-:*:*:*:*:*:*:* CVE-2019-0192,0.0,,0.93185,"In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.",2019-03-07,Nuclei,cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:* CVE-2019-0193,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,0.93129,"In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's ""dataConfig"" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property ""enable.dih.dataConfigParam"" to true.",2019-08-01,Nuclei/CISA,cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2019-0211,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.8573,"In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.",2019-04-08,CISA,cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*;cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*;cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openshift_container_platform_for_power:3.11_ppc64le:*:*:*:*:*:*:*;cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:* CVE-2019-0221,0.0,,0.12656,"The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.",2019-05-28,Nuclei,cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:* CVE-2019-0230,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93837,"Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.",2020-09-14,Metasploit/Nuclei,cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* CVE-2019-0232,0.0,,0.94164,"When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).",2019-04-15,Metasploit/Nuclei,cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2019-0307,0.0,,0.06135,"Diagnostics Agent in Solution Manager, version 7.2, stores several credentials such as SLD user connection as well as Solman user communication in the SAP Secure Storage file which is not encrypted by default. By decoding these credentials, an attacker with admin privileges could gain access to the entire configuration, but no system sensitive information can be gained.",2019-06-12,Metasploit,cpe:2.3:a:sap:solution_manager:7.2:*:*:*:*:*:*:* CVE-2019-0344,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.50696,"Due to unsafe deserialization used in SAP Commerce Cloud (virtualjdbc extension), versions 6.4, 6.5, 6.6, 6.7, 1808, 1811, 1905, it is possible to execute arbitrary code on a target machine with 'Hybris' user rights, resulting in Code Injection.",2019-08-14,CISA,cpe:2.3:a:sap:commerce_cloud:1808:*:*:*:*:*:*:*;cpe:2.3:a:sap:commerce_cloud:1811:*:*:*:*:*:*:*;cpe:2.3:a:sap:commerce_cloud:1905:*:*:*:*:*:*:*;cpe:2.3:a:sap:commerce_cloud:6.4:*:*:*:*:*:*:*;cpe:2.3:a:sap:commerce_cloud:6.5:*:*:*:*:*:*:*;cpe:2.3:a:sap:commerce_cloud:6.6:*:*:*:*:*:*:*;cpe:2.3:a:sap:commerce_cloud:6.7:*:*:*:*:*:*:* CVE-2019-0541,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.84144,"A remote code execution vulnerability exists in the way that the MSHTML engine inproperly validates input, aka ""MSHTML Engine Remote Code Execution Vulnerability."" This affects Microsoft Office, Microsoft Office Word Viewer, Internet Explorer 9, Internet Explorer 11, Microsoft Excel Viewer, Internet Explorer 10, Office 365 ProPlus.",2019-01-08,CISA,cpe:2.3:a:microsoft:excel_viewer:2007:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*;cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-0543,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.03524,"An elevation of privilege vulnerability exists when Windows improperly handles authentication requests, aka ""Microsoft Windows Elevation of Privilege Vulnerability."" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.",2019-01-08,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-0604,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94411,"A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0594.",2019-03-05,CISA,cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:* CVE-2019-0676,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,0.29573,"An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory.An attacker who successfully exploited this vulnerability could test for the presence of files on disk, aka 'Internet Explorer Information Disclosure Vulnerability'.",2019-03-05,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-0703,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,0.08611,"An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, aka 'Windows SMB Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0704, CVE-2019-0821.",2019-04-09,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-0708,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94445,"A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.",2019-05-16,Metasploit/CISA,cpe:2.3:a:siemens:syngo_lab_process_manager:*:*:*:*:*:*:*:*;cpe:2.3:h:huawei:agile_controller-campus:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:bh620_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:bh621_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:bh622_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:bh640_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:ch121:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:ch140:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:ch220:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:ch221:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:ch222:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:ch240:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:ch242:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:ch242_v3:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:e6000:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:e6000_chassis:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:elog:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:espace_ecs:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:gtsoftx3000:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:oceanstor_18500:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:oceanstor_18800:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:oceanstor_18800f:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:oceanstor_hvs85t:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:oceanstor_hvs88t:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:rh1288_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:rh1288a_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:rh2265_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:rh2268_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:rh2285_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:rh2285h_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:rh2288_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:rh2288a_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:rh2288e_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:rh2288h_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:rh2485_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:rh5885_v2:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:rh5885_v3:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:seco_vsm:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:uma:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:x6000:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:x8000:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:aptio:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:atellica_solution:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:axiom_multix_m:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:axiom_vertix_md_trauma:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:axiom_vertix_solitaire_m:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:centralink:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:lantis:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:mobilett_xp_digital:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:multix_pro:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:multix_pro_acss:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:multix_pro_acss_p:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:multix_pro_navy:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:multix_pro_p:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:multix_swing:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:multix_top:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:multix_top_acss:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:multix_top_acss_p:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:multix_top_p:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:rapidpoint_500:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:streamlab:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:vertix_solitaire:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:viva_e:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:viva_twin:-:*:*:*:*:*:*:*;cpe:2.3:o:huawei:agile_controller-campus_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:agile_controller-campus_firmware:v100r002c10:*:*:*:*:*:*:*;cpe:2.3:o:huawei:bh620_v2_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:bh621_v2_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:bh622_v2_firmware:v100r001c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:bh640_v2_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:ch121_firmware:v100r001c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:ch140_firmware:v100r001c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:ch220_firmware:v100r001c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:ch221_firmware:v100r001c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:ch222_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:ch240_firmware:v100r001c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:ch242_firmware:v100r001c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:ch242_v3_firmware:v100r001c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:e6000_chassis_firmware:v100r001c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:e6000_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:elog_firmware:v200r003c10:*:*:*:*:*:*:*;cpe:2.3:o:huawei:espace_ecs_firmware:v300r001c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r001c01spc100:*:*:*:*:*:*:*;cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r002c00spc300:*:*:*:*:*:*:*;cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r002c10spc100:*:*:*:*:*:*:*;cpe:2.3:o:huawei:oceanstor_18500_firmware:v100r001c30spc300:*:*:*:*:*:*:*;cpe:2.3:o:huawei:oceanstor_18800_firmware:v100r001c30spc300:*:*:*:*:*:*:*;cpe:2.3:o:huawei:oceanstor_18800f_firmware:v100r001c30spc300:*:*:*:*:*:*:*;cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:v100r001c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:v100r001c30spc200:*:*:*:*:*:*:*;cpe:2.3:o:huawei:oceanstor_hvs88t_firmware:v100r001c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:oceanstor_hvs88t_firmware:v100r001c30spc200:*:*:*:*:*:*:*;cpe:2.3:o:huawei:rh1288_v2_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:rh1288a_v2_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:rh2265_v2_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:rh2268_v2_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:rh2285_v2_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:rh2285h_v2_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:rh2288_v2_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:rh2288a_v2_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:rh2288e_v2_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:rh2288h_v2_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:rh2485_v2_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:rh5885_v2_firmware:v100r001c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:rh5885_v3_firmware:v100r003c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:seco_vsm_firmware:v200r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:uma_firmware:v200r001c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:uma_firmware:v300r001c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:x6000_firmware:v100r002c00:*:*:*:*:*:*:*;cpe:2.3:o:huawei:x8000_firmware:v100r002c20:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:siemens:aptio_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:atellica_solution_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:axiom_multix_m_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:axiom_vertix_md_trauma_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:axiom_vertix_solitaire_m_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:centralink_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:lantis_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:mobilett_xp_digital_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:multix_pro_acss_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:multix_pro_acss_p_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:multix_pro_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:multix_pro_navy_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:multix_pro_p_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:multix_swing_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:multix_top_acss_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:multix_top_acss_p_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:multix_top_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:multix_top_p_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:rapidpoint_500_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:streamlab_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:vertix_solitaire_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:viva_e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:viva_twin_firmware:*:*:*:*:*:*:*:* CVE-2019-0724,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.59226,"An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka 'Microsoft Exchange Server Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0686.",2019-03-05,Metasploit,cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_26:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_22:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_12:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_1:*:*:*:*:*:* CVE-2019-0752,7.5,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,0.91963,"A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0739, CVE-2019-0753, CVE-2019-0862.",2019-04-09,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-0797,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.03027,"An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0808.",2019-04-09,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-0803,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.78606,"An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0685, CVE-2019-0859.",2019-04-09,CISA,cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-0808,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.52291,"An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0797.",2019-04-09,Metasploit/CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:* CVE-2019-0841,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.8483,"An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0730, CVE-2019-0731, CVE-2019-0796, CVE-2019-0805, CVE-2019-0836.",2019-04-09,Metasploit/CISA,cpe:2.3:o:microsoft:windows_10_1703:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1709:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-0859,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.09566,"An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0685, CVE-2019-0803.",2019-04-09,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-0863,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.14148,"An elevation of privilege vulnerability exists in the way Windows Error Reporting (WER) handles files, aka 'Windows Error Reporting Elevation of Privilege Vulnerability'.",2019-05-16,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-0880,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.0137,"A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls, aka 'Microsoft splwow64 Elevation of Privilege Vulnerability'.",2019-07-15,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-0903,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.50834,"A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'.",2019-05-16,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-1003000,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.94445,A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java that allows attackers with the ability to provide sandboxed scripts to execute arbitrary code on the Jenkins master JVM.,2019-01-22,Metasploit/Nuclei,cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*;cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* CVE-2019-1003001,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.93984,"A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.",2019-01-22,Metasploit,cpe:2.3:a:jenkins:pipeline\:_groovy:*:*:*:*:*:jenkins:*:*;cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* CVE-2019-1003002,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.93925,A sandbox bypass vulnerability exists in Pipeline: Declarative Plugin 1.3.3 and earlier in pipeline-model-definition/src/main/groovy/org/jenkinsci/plugins/pipeline/modeldefinition/parser/Converter.groovy that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.,2019-01-22,Metasploit,cpe:2.3:a:jenkins:pipeline\:_declarative:*:*:*:*:*:jenkins:*:*;cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* CVE-2019-1003005,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.75823,A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.50 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.,2019-02-06,Metasploit,cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:* CVE-2019-1003029,9.9,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,0.93042,"A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to execute arbitrary code on the Jenkins master JVM.",2019-03-08,Metasploit/CISA,cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*;cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* CVE-2019-1003030,9.9,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,0.93008,"A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.",2019-03-08,CISA,cpe:2.3:a:jenkins:pipeline\:_groovy:*:*:*:*:*:jenkins:*:*;cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* CVE-2019-10068,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94179,"An issue was discovered in Kentico 12.0.x before 12.0.15, 11.0.x before 11.0.48, 10.0.x before 10.0.52, and 9.x versions. Due to a failure to validate security headers, it was possible for a specially crafted request to the staging service to bypass the initial authentication and proceed to deserialize user-controlled .NET object input. This deserialization then led to unauthenticated remote code execution on the server where the Kentico instance was hosted.",2019-03-26,Metasploit/Nuclei/CISA,cpe:2.3:a:kentico:kentico:*:*:*:*:*:*:*:* CVE-2019-10092,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.82379,"In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.",2019-09-26,Nuclei,cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:secure_global_desktop:5.5:*:*:*:*:*:*:*;cpe:2.3:a:redhat:software_collection:1.0:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*;cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*;cpe:2.3:o:netapp:clustered_data_ontap:9.6:-:*:*:*:*:*:*;cpe:2.3:o:netapp:clustered_data_ontap:9.6:p1:*:*:*:*:*:*;cpe:2.3:o:netapp:clustered_data_ontap:9.6:p3:*:*:*:*:*:*;cpe:2.3:o:netapp:clustered_data_ontap:9.6:p4:*:*:*:*:*:*;cpe:2.3:o:netapp:clustered_data_ontap:9.6:p7:*:*:*:*:*:*;cpe:2.3:o:netapp:clustered_data_ontap:9.6:p8:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* CVE-2019-10098,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.77398,"In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.",2019-09-25,Nuclei,cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* CVE-2019-1010287,0.0,,0.20584,"Timesheet Next Gen 1.5.3 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Allows an attacker to execute arbitrary HTML and JavaScript code via a ""redirect"" parameter. The component is: Web login form: login.php, lines 40 and 54. The attack vector is: reflected XSS, victim may click the malicious url.",2019-07-17,Nuclei,cpe:2.3:a:timesheet_next_gen_project:timesheet_next_gen:*:*:*:*:*:*:*:* CVE-2019-1010290,0.0,,0.21947,"Babel: Multilingual site Babel All is affected by: Open Redirection. The impact is: Redirection to any URL, which is supplied to redirect.php in a ""newurl"" parameter. The component is: redirect.php. The attack vector is: The victim must open a link created by an attacker. Attacker may use any legitimate site using Babel to redirect user to a URL of his/her choosing.",2019-07-16,Nuclei,cpe:2.3:a:cmsmadesimple:bable\:multilingual_site:*:*:*:*:*:cms_made_simple:*:* CVE-2019-10123,0.0,,0.72742,SQL Injection in Advanced InfoData Systems (AIS) ESEL-Server 67 (which is the backend for the AIS logistics mobile app) allows an anonymous attacker to execute arbitrary code in the context of the user of the MSSQL database. The default user for the database is the 'sa' user.,2019-05-31,Metasploit,cpe:2.3:h:ais:esel-server:-:*:*:*:*:*:*:*;cpe:2.3:o:ais:logistic_software:*:*:*:*:*:*:*:* CVE-2019-10149,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93802,A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.,2019-06-05,Metasploit/CISA,cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2019-10232,0.0,,0.89565,"Teclib GLPI through 9.3.3 has SQL injection via the ""cycle"" parameter in /scripts/unlock_tasks.php.",2019-03-27,Nuclei,cpe:2.3:a:teclib-edition:gestionnaire_libre_de_parc_informatique:*:*:*:*:*:*:*:* CVE-2019-10267,0.0,,0.66166,"An insecure file upload and code execution issue was discovered in Ahsay Cloud Backup Suite 8.1.0.50. It is possible to upload a file into any directory of the server. One can insert a JSP shell into the web server's directory and execute it. This leads to full access to the system, as the configured user (e.g., Administrator).",2019-07-26,Metasploit,cpe:2.3:a:ahsay:cloud_backup_suite:*:*:*:*:*:*:*:* CVE-2019-10405,5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N,0.79431,"Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the ""Cookie"" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.",2019-09-25,Nuclei,cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*;cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:* CVE-2019-10475,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.91969,A reflected cross-site scripting vulnerability in Jenkins build-metrics Plugin allows attackers to inject arbitrary HTML and JavaScript into web pages provided by this plugin.,2019-10-23,Nuclei,cpe:2.3:a:jenkins:build-metrics:*:*:*:*:*:jenkins:*:* CVE-2019-1064,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.13668,"An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links.",2019-06-12,CISA,cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-10655,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.85159,"Grandstream GAC2500 1.0.3.35, GXP2200 1.0.3.27, GVC3202 1.0.3.51, GXV3275 before 1.0.3.219 Beta, and GXV3240 before 1.0.3.219 Beta devices allow unauthenticated remote code execution via shell metacharacters in a /manager?action=getlogcat priority field, in conjunction with a buffer overflow (via the phonecookie cookie) to overwrite a data structure and consequently bypass authentication. This can be exploited remotely or via CSRF because the cookie can be placed in an Accept HTTP header in an XMLHttpRequest call to lighttpd.",2019-03-30,Metasploit,cpe:2.3:h:grandstream:gac2500:-:*:*:*:*:*:*:*;cpe:2.3:h:grandstream:gvc3202:-:*:*:*:*:*:*:*;cpe:2.3:h:grandstream:gxp2200:-:*:*:*:*:*:*:*;cpe:2.3:h:grandstream:gxv3240:-:*:*:*:*:*:*:*;cpe:2.3:h:grandstream:gxv3275:-:*:*:*:*:*:*:*;cpe:2.3:o:grandstream:gac2500_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:grandstream:gvc3202_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:grandstream:gxp2200_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:grandstream:gxv3240_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:grandstream:gxv3275_firmware:*:*:*:*:*:*:*:* CVE-2019-10669,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,0.68361,"An issue was discovered in LibreNMS through 1.47. There is a command injection vulnerability in html/includes/graphs/device/collectd.inc.php where user supplied parameters are filtered with the mysqli_escape_real_string function. This function is not the appropriate function to sanitize command arguments as it does not escape a number of command line syntax characters such as ` (backtick), allowing an attacker to inject commands into the variable $rrd_cmd, which gets executed via passthru().",2019-09-09,Metasploit,cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:* CVE-2019-1069,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.29837,"An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system. The security update addresses the vulnerability by correctly validating file operations.",2019-06-12,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-10692,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.89356,"In the wp-google-maps plugin before 7.11.18 for WordPress, includes/class.rest-api.php in the REST API does not sanitize field names before a SELECT statement.",2019-04-02,Metasploit/Nuclei,cpe:2.3:a:codecabin:wp_go_maps:*:*:*:*:*:wordpress:*:* CVE-2019-10717,0.0,,0.1493,BlogEngine.NET 3.3.7.0 allows /api/filemanager Directory Traversal via the path parameter.,2019-07-03,Nuclei,cpe:2.3:a:dotnetblogengine:blogengine.net:3.3.7.0:*:*:*:*:*:*:* CVE-2019-10758,9.9,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,0.94361,mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints that uses the `toBSON` method. A misuse of the `vm` dependency to perform `exec` commands in a non-safe environment.,2019-12-24,Nuclei/CISA,cpe:2.3:a:mongo-express_project:mongo-express:*:*:*:*:*:node.js:*:* CVE-2019-10867,0.0,,0.53534,"An issue was discovered in Pimcore before 5.7.1. An attacker with classes permission can send a POST request to /admin/class/bulk-commit, which will make it possible to exploit the unserialize function when passing untrusted values in the data parameter to bundles/AdminBundle/Controller/Admin/DataObject/ClassController.php.",2019-04-04,Metasploit,cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:* CVE-2019-11001,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,0.49387,"On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the ""TestEmail"" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.",2019-04-08,CISA,cpe:2.3:h:reolink:c1_pro:-:*:*:*:*:*:*:*;cpe:2.3:h:reolink:c2_pro:-:*:*:*:*:*:*:*;cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*;cpe:2.3:h:reolink:rlc-422w:-:*:*:*:*:*:*:*;cpe:2.3:h:reolink:rlc-511w:-:*:*:*:*:*:*:*;cpe:2.3:o:reolink:c1_pro_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:reolink:c2_pro_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:reolink:rlc-410w_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:reolink:rlc-422w_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:reolink:rlc-511w_firmware:*:*:*:*:*:*:*:* CVE-2019-11013,0.0,,0.87607,Nimble Streamer 3.0.2-2 through 3.5.4-9 has a ../ directory traversal vulnerability. Successful exploitation could allow an attacker to traverse the file system to access files or directories that are outside of the restricted directory on the remote server.,2019-08-22,Nuclei,cpe:2.3:a:softvelum:nimble_streamer:*:*:*:*:*:*:*:* CVE-2019-11043,8.7,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N,0.94105,"In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.",2019-10-28,Metasploit/CISA,cpe:2.3:a:php:php:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*;cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2019-11231,0.0,,0.61684,"An issue was discovered in GetSimple CMS through 3.3.15. insufficient input sanitation in the theme-edit.php file allows upload of files with arbitrary content (PHP code, for example). This vulnerability is triggered by an authenticated user; however, authentication can be bypassed. According to the official documentation for installation step 10, an admin is required to upload all the files, including the .htaccess files, and run a health check. However, what is overlooked is that the Apache HTTP Server by default no longer enables the AllowOverride directive, leading to data/users/admin.xml password exposure. The passwords are hashed but this can be bypassed by starting with the data/other/authorization.xml API key. This allows one to target the session state, since they decided to roll their own implementation. The cookie_name is crafted information that can be leaked from the frontend (site name and version). If a someone leaks the API key and the admin username, then they can bypass authentication. To do so, they need to supply a cookie based on an SHA-1 computation of this known information. The vulnerability exists in the admin/theme-edit.php file. This file checks for forms submissions via POST requests, and for the csrf nonce. If the nonce sent is correct, then the file provided by the user is uploaded. There is a path traversal allowing write access outside the jailed themes directory root. Exploiting the traversal is not necessary because the .htaccess file is ignored. A contributing factor is that there isn't another check on the extension before saving the file, with the assumption that the parameter content is safe. This allows the creation of web accessible and executable files with arbitrary content.",2019-05-22,Metasploit,cpe:2.3:a:get-simple:getsimple_cms:*:*:*:*:*:*:*:* CVE-2019-11248,8.2,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L,0.91485,"The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration.",2019-08-29,Nuclei,cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.0:-:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha1:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha2:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha3:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.0:beta0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.0:beta1:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.0:beta2:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.0:rc1:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.0:rc2:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.1:-:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.1:beta0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.2:-:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.2:beta0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.3:-:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.3:beta0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.4:-:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.4:beta0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.5:-:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.5:beta0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.6:-:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.6:beta0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.7:-:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.7:beta.0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.13.8:beta.0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.0:-:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha1:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha2:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha3:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta1:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta2:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.0:rc1:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.1:-:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.1:beta0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.2:-:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.2:beta0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.3:-:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.3:beta0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.14.4:beta.0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha1:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha2:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha3:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.15.0:beta0:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.15.0:beta1:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.15.0:beta2:*:*:*:*:*:*;cpe:2.3:a:kubernetes:kubernetes:1.15.0:rc1:*:*:*:*:*:* CVE-2019-1129,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.08695,"An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1130.",2019-07-15,CISA,cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-1130,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.03987,"An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1129.",2019-07-15,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-1132,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.29255,"An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.",2019-07-15,CISA,cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* CVE-2019-11370,0.0,,0.10004,"Stored XSS was discovered in Carel pCOWeb prior to B1.2.4, as demonstrated by the config/pw_snmp.html ""System contact"" field.",2019-06-03,Nuclei,cpe:2.3:h:carel:pcoweb_card:-:*:*:*:*:*:*:*;cpe:2.3:o:carel:pcoweb_card_firmware:*:*:*:*:*:*:*:* CVE-2019-11409,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.90488,app/operator_panel/exec.php in the Operator Panel module in FusionPBX 4.4.3 suffers from a command injection vulnerability due to a lack of input validation that allows authenticated non-administrative attackers to execute commands on the host. This can further lead to remote code execution when combined with an XSS vulnerability also present in the FusionPBX Operator Panel module.,2019-06-17,Metasploit,cpe:2.3:a:fusionpbx:fusionpbx:4.4.3:*:*:*:*:*:*:* CVE-2019-11510,10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,0.94357,"In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability .",2019-05-08,Metasploit/Nuclei/CISA,cpe:2.3:a:ivanti:connect_secure:8.2:r1.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r1.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r10.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r11.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r12.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r2.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r3.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r3.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r4.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r4.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r5.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r5.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r6.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r7.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r7.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r8.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r8.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r8.2:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r9.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r2.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r2:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r3:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r4:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r5.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r5.2:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r5:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r6.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r6:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r7:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:9.0:r1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:9.0:r2.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:9.0:r2:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:9.0:r3.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:9.0:r3.2:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:9.0:r3.3:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:9.0:r3:*:*:*:*:*:* CVE-2019-11539,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,0.93911,"In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, 8.2RX before 8.2R12.1, and 8.1RX before 8.1R15.1 and Pulse Policy Secure version 9.0RX before 9.0R3.2, 5.4RX before 5.4R7.1, 5.3RX before 5.3R12.1, 5.2RX before 5.2R12.1, and 5.1RX before 5.1R15.1, the admin web interface allows an authenticated attacker to inject and execute commands.",2019-04-26,Metasploit/CISA,cpe:2.3:a:ivanti:connect_secure:8.1:-:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r1.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r1.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r10.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r11.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r11.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r12.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r12.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r13.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r14.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r2.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r2.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r3.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r3.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r3.2:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r4.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r4.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r5.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r6.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r7.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r7:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r8.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r9.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r9.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.1:r9.2:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:*:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r1.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r1.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r10.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r11.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r12.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r2.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r3.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r3.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r4.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r4.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r5.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r5.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r6.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r7.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r7.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r7.2:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r8.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r8.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r8.2:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.2:r9.0:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:-:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r1.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r2.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r2:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r3:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r4:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r5.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r5.2:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r5:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r6.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r6:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:8.3:r7:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:9.0:r1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:9.0:r2.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:9.0:r2:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:9.0:r3.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:9.0:r3.2:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:9.0:r3.3:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:9.0:r3:*:*:*:*:*:*;cpe:2.3:a:ivanti:policy_secure:9.0:r1:*:*:*:*:*:*;cpe:2.3:a:ivanti:policy_secure:9.0:r2.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:policy_secure:9.0:r2:*:*:*:*:*:*;cpe:2.3:a:ivanti:policy_secure:9.0:r3.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:policy_secure:9.0:r3:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r1.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r1.1:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r10.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r11.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r11.1:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r12.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r12.1:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r13.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r14.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r2.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r2.1:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r3.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r3.2:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r4.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r5.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r6.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r7.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r8.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r9.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r9.1:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r1.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r10.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r11.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r2.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r3.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r3.2:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r4.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r5.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r6.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r7.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r7.1:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r8.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r9.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r9.1:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2rx:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r1.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r1.1:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r10.:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r11.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r12.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r2.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r3.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r3.1:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r4.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r4.1:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r5.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r5.1:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r5.2:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r6.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r7.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r8.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r8.1:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r8.2:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r9.0:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3rx:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4r1:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4r2.1:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4r2:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4r3:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4r4:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4r5.2:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4r5:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4r6.1:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4r6:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4r7:*:*:*:*:*:*:*;cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4rx:*:*:*:*:*:*:* CVE-2019-11580,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94406,"Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x), from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.",2019-06-03,Metasploit/Nuclei/CISA,cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:* CVE-2019-11581,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94377,"There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.",2019-08-09,Nuclei/CISA,cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* CVE-2019-11634,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.56205,Citrix Workspace App before 1904 for Windows has Incorrect Access Control.,2019-05-22,CISA,cpe:2.3:a:citrix:receiver:4.9:cumulative_update_6:*:*:windows:*:*:*;cpe:2.3:a:citrix:workspace:*:*:*:*:*:windows:*:* CVE-2019-11660,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.28238,"Privileges manipulation in Micro Focus Data Protector, versions 10.00, 10.01, 10.02, 10.03, 10.04, 10.10, 10.20, 10.30, 10.40. This vulnerability could be exploited by a low-privileged user to execute a custom binary with higher privileges.",2019-09-13,Metasploit,cpe:2.3:a:microfocus:data_protector:*:*:*:*:*:*:*:* CVE-2019-11707,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.8106,"A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 60.7.1, Firefox < 67.0.3, and Thunderbird < 60.7.2.",2019-07-23,CISA,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* CVE-2019-11708,10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,0.53987,"Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.",2019-07-23,CISA,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* CVE-2019-11869,0.0,,0.06548,"The Yuzo Related Posts plugin 5.12.94 for WordPress has XSS because it mistakenly expects that is_admin() verifies that the request comes from an admin user (it actually only verifies that the request is for an admin page). An unauthenticated attacker can inject a payload into the plugin settings, such as the yuzo_related_post_css_and_style setting.",2019-05-09,Nuclei,cpe:2.3:a:yuzopro:yuzo:5.12.94:*:*:*:*:wordpress:*:* CVE-2019-11886,0.0,,0.34578,"The WaspThemes Visual CSS Style Editor (aka yellow-pencil-visual-theme-customizer) plugin before 7.2.1 for WordPress allows yp_option_update CSRF, as demonstrated by use of yp_remote_get to obtain admin access.",2019-05-13,Nuclei,cpe:2.3:a:yellowpencil:visual_css_style_editor:*:*:*:*:*:wordpress:*:* CVE-2019-1214,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.11567,"An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Windows Common Log File System Driver Elevation of Privilege Vulnerability'.",2019-09-11,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-1215,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.03053,"An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1253, CVE-2019-1278, CVE-2019-1303.",2019-09-11,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-12169,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.79009,"ATutor 2.2.4 allows Arbitrary File Upload and Directory Traversal, resulting in remote code execution via a "".."" pathname in a ZIP archive to the mods/_core/languages/language_import.php (aka Import New Language) or mods/_standard/patcher/index_admin.php (aka Patcher) component.",2019-06-03,Metasploit,cpe:2.3:a:atutor:atutor:*:*:*:*:*:*:*:* CVE-2019-12181,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.50196,A privilege escalation vulnerability exists in SolarWinds Serv-U before 15.1.7 for Linux.,2019-06-17,Metasploit,cpe:2.3:a:solarwinds:serv-u_ftp_server:*:*:*:*:*:linux:*:*;cpe:2.3:a:solarwinds:serv-u_mft_server:*:*:*:*:*:linux:*:* CVE-2019-12258,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.14881,Wind River VxWorks 6.6 through vx7 has Session Fixation in the TCP component. This is a IPNET security vulnerability: DoS of TCP connection via malformed TCP options.,2019-08-09,Metasploit,cpe:2.3:h:belden:garrettcom_magnum_dx940e:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_dragon_mach4000:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_dragon_mach4500:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_eagle20:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_eagle30:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_eagle_one:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_ees20:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_ees25:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_eesx20:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_eesx30:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_grs1020:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_grs1030:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_grs1042:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_grs1120:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_grs1130:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_grs1142:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_msp30:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_msp32:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_msp40:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_octopus_os3:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_rail_switch_power_lite:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_rail_switch_power_smart:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_red25:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_rsp20:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_rsp25:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_rsp30:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_rsp35:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_rspe30:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_rspe32:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_rspe35:-:*:*:*:*:*:*:*;cpe:2.3:h:belden:hirschmann_rspe37:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:power_meter_9410:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:power_meter_9810:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:ruggedcom_win7000:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:ruggedcom_win7018:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:ruggedcom_win7025:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:ruggedcom_win7200:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:siprotec_5:-:*:*:*:*:*:*:*;cpe:2.3:o:belden:garrettcom_magnum_dx940e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*;cpe:2.3:o:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:power_meter_9410_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:power_meter_9810_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:ruggedcom_win7000_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:ruggedcom_win7018_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:ruggedcom_win7025_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:ruggedcom_win7200_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp200;cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp300;cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*;cpe:2.3:o:sonicwall:sonicos:6.2.7.0:*:*:*:*:*:*:*;cpe:2.3:o:sonicwall:sonicos:6.2.7.1:*:*:*:*:*:*:*;cpe:2.3:o:sonicwall:sonicos:6.2.7.7:*:*:*:*:*:*:*;cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*;cpe:2.3:o:windriver:vxworks:7.0:-:*:*:*:*:*:* CVE-2019-12276,0.0,,0.89074,"A Path Traversal vulnerability in Controllers/LetsEncryptController.cs in LetsEncryptController in GrandNode 4.40 allows remote, unauthenticated attackers to retrieve arbitrary files on the web server via specially crafted LetsEncrypt/Index?fileName= HTTP requests. A patch for this issue was made on 2019-05-30 in GrandNode 4.40.",2019-06-05,Nuclei,cpe:2.3:a:grandnode:grandnode:4.40:*:*:*:*:*:*:* CVE-2019-12314,0.0,,0.91543,"Deltek Maconomy 2.2.5 is prone to local file inclusion via absolute path traversal in the WS.macx1.W_MCS/ PATH_INFO, as demonstrated by a cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS/etc/passwd URI.",2019-05-24,Nuclei,cpe:2.3:a:deltek:maconomy:2.2.5:*:*:*:*:*:*:* CVE-2019-12461,0.0,,0.55026,Web Port 1.19.1 allows XSS via the /log type parameter.,2019-05-30,Nuclei,cpe:2.3:a:webport:web_port:1.19.1:*:*:*:*:*:*:* CVE-2019-12477,0.0,,0.33135,"Supra Smart Cloud TV allows remote file inclusion in the openLiveURL function, which allows a local attacker to broadcast fake video without any authentication via a /remote/media_control?action=setUri&uri= URI.",2019-06-07,Metasploit,cpe:2.3:h:supra:stv-lc40lt0020f:-:*:*:*:*:*:*:*;cpe:2.3:o:supra:stv-lc40lt0020f_firmware:-:*:*:*:*:*:*:* CVE-2019-12518,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.74844,Anviz CrossChex access control management software 4.3.8.0 and 4.3.12 is vulnerable to a buffer overflow vulnerability.,2019-12-02,Metasploit,cpe:2.3:a:anviz:crosschex:4.3.12:*:*:*:*:*:*:*;cpe:2.3:a:anviz:crosschex:4.3.8.0:*:*:*:*:*:*:* CVE-2019-1253,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.23634,"An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1215, CVE-2019-1278, CVE-2019-1303.",2019-09-11,CISA,cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-12581,0.0,,0.55651,"A reflective Cross-site scripting (XSS) vulnerability in the free_time_failed.cgi CGI program in selected Zyxel ZyWall, USG, and UAG devices allows remote attackers to inject arbitrary web script or HTML via the err_msg parameter.",2019-06-27,Nuclei,cpe:2.3:h:zyxel:uag2100:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:uag4100:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:uag5100:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg1100:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg110:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg1900:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg210:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg2200-vpn:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg310:-:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:uag2100_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:uag4100_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:uag5100_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg1100_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg110_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg1900_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg210_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg2200-vpn_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg310_firmware:*:*:*:*:*:*:*:* CVE-2019-12583,0.0,,0.59063,"Missing Access Control in the ""Free Time"" component of several Zyxel UAG, USG, and ZyWall devices allows a remote attacker to generate guest accounts by directly accessing the account generator. This can lead to unauthorised network access or Denial of Service.",2019-06-27,Nuclei,cpe:2.3:h:zyxel:uag2100:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:uag4100:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:uag5100:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg1100:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg110:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg1900:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg210:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg2200-vpn:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg310:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:zywall_1100:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:zywall_110:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:zywall_310:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:zywall_vpn100:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:zywall_vpn300:-:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:uag2100_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:uag4100_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:uag5100_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg1100_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg110_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg1900_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg210_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg2200-vpn_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg310_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:zywall_1100_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:zywall_110_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:zywall_310_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:zywall_vpn100_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:zywall_vpn300_firmware:*:*:*:*:*:*:*:* CVE-2019-12593,0.0,,0.75901,IceWarp Mail Server through 10.4.4 is prone to a local file inclusion vulnerability via webmail/calendar/minimizer/index.php?style=..%5c directory traversal.,2019-06-03,Nuclei,cpe:2.3:a:icewarp:mail_server:*:*:*:*:*:*:*:* CVE-2019-12725,0.0,,0.94092,"Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occurs because the web application mishandles a few HTTP parameters. An unauthenticated attacker can exploit this issue by injecting OS commands inside the vulnerable parameters.",2019-07-19,Nuclei,cpe:2.3:o:zeroshell:zeroshell:3.9.0:*:*:*:*:*:*:* CVE-2019-12799,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.2902,"In createInstanceFromNamedArguments in Shopware through 5.6.x, a crafted web request can trigger a PHP object instantiation vulnerability, which can result in an arbitrary deserialization if the right class is instantiated. An attacker can leverage this deserialization to achieve remote code execution. NOTE: this issue is a bypass for a CVE-2017-18357 whitelist patch.",2019-06-13,Metasploit,cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:* CVE-2019-12840,0.0,,0.88027,"In Webmin through 1.910, any user authorized to the ""Package Updates"" module can execute arbitrary commands with root privileges via the data parameter to update.cgi.",2019-06-15,Metasploit,cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:* CVE-2019-12962,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.06302,LiveZilla Server before 8.0.1.1 is vulnerable to XSS in mobile/index.php via the Accept-Language HTTP header.,2019-06-25,Nuclei,cpe:2.3:a:livezilla:livezilla:*:*:*:*:*:*:*:* CVE-2019-1297,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.56776,"A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'.",2019-09-11,CISA,cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*;cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2016:*:*:*:*:mac_os:*:*;cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:* CVE-2019-12985,0.0,,0.92243,Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 have Improper Input Validation (issue 1 of 6).,2019-07-16,Nuclei,cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:*;cpe:2.3:a:citrix:sd-wan:*:*:*:*:*:*:*:* CVE-2019-12986,0.0,,0.92069,Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 have Improper Input Validation (issue 2 of 6).,2019-07-16,Nuclei,cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:*;cpe:2.3:a:citrix:sd-wan:*:*:*:*:*:*:*:* CVE-2019-12987,0.0,,0.92351,Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 have Improper Input Validation (issue 3 of 6).,2019-07-16,Nuclei,cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:*;cpe:2.3:a:citrix:sd-wan:*:*:*:*:*:*:*:* CVE-2019-12988,0.0,,0.92351,Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 have Improper Input Validation (issue 4 of 6).,2019-07-16,Nuclei,cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:*;cpe:2.3:a:citrix:sd-wan:*:*:*:*:*:*:*:* CVE-2019-12989,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.80822,Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 allow SQL Injection.,2019-07-16,CISA,cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:*;cpe:2.3:a:citrix:sd-wan:*:*:*:*:*:*:*:* CVE-2019-12990,0.0,,0.90791,Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 allow Directory Traversal.,2019-07-16,Nuclei,cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:*;cpe:2.3:a:citrix:sd-wan:*:*:*:*:*:*:*:* CVE-2019-12991,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.86745,Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 have Improper Input Validation (issue 5 of 6).,2019-07-16,CISA,cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:*;cpe:2.3:a:citrix:sd-wan:*:*:*:*:*:*:*:* CVE-2019-13101,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.73292,"An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.",2019-08-08,Nuclei,cpe:2.3:h:dlink:dir-600m:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-600m_firmware:3.02:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-600m_firmware:3.03:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-600m_firmware:3.04:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-600m_firmware:3.06:*:*:*:*:*:*:* CVE-2019-1315,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.06219,"An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles hard links, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1339, CVE-2019-1342.",2019-10-10,CISA,cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-1322,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.34966,"An elevation of privilege vulnerability exists when Windows improperly handles authentication requests, aka 'Microsoft Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1320, CVE-2019-1340.",2019-10-10,Metasploit/CISA,cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-13272,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.81241,"In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.",2019-07-17,Metasploit/CISA,cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*;cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:aff_a700s:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm_64:7.0_aarch64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.8:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.8:*:*:*:*:*:*:* CVE-2019-13372,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9053,"/web/Lib/Action/IndexAction.class.php in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 allows remote attackers to execute arbitrary PHP code via a cookie because a cookie's username field allows eval injection, and an empty password bypasses authentication.",2019-07-06,Metasploit/Nuclei,cpe:2.3:a:dlink:central_wifimanager:*:*:*:*:*:*:*:* CVE-2019-13373,0.0,,0.90075,An issue was discovered in the D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6. Input does not get validated and arbitrary SQL statements can be executed in the database via the /web/Public/Conn.php parameter dbSQL.,2019-07-06,Metasploit,cpe:2.3:a:dlink:central_wifimanager:1.03:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2019-13392,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.1071,"A reflected Cross-Site Scripting (XSS) vulnerability in MindPalette NateMail 3.0.15 allows an attacker to execute remote JavaScript in a victim's browser via a specially crafted POST request. The application will reflect the recipient value if it is not in the NateMail recipient array. Note that this array is keyed via integers by default, so any string input will be invalid.",2019-10-16,Nuclei,cpe:2.3:a:mindpalette:natemail:3.0.15:*:*:*:*:*:*:* CVE-2019-13396,0.0,,0.55014,FlightPath 4.x and 5.0-x allows directory traversal and Local File Inclusion through the form_include parameter in an index.php?q=system-handle-form-submit POST request because of an include_once in system_handle_form_submit in modules/system/system.module.,2019-07-10,Nuclei,cpe:2.3:a:getflightpath:flightpath:*:*:*:*:*:*:*:*;cpe:2.3:a:getflightpath:flightpath:5.0:beta1:*:*:*:*:*:*;cpe:2.3:a:getflightpath:flightpath:5.0:beta2:*:*:*:*:*:*;cpe:2.3:a:getflightpath:flightpath:5.0:dev1:*:*:*:*:*:*;cpe:2.3:a:getflightpath:flightpath:5.0:dev2:*:*:*:*:*:*;cpe:2.3:a:getflightpath:flightpath:5.0:rc1:*:*:*:*:*:*;cpe:2.3:a:getflightpath:flightpath:5.0:rc2:*:*:*:*:*:*;cpe:2.3:a:getflightpath:flightpath:5.0:rc3:*:*:*:*:*:* CVE-2019-13462,0.0,,0.60423,Lansweeper before 7.1.117.4 allows unauthenticated SQL injection.,2019-08-12,Nuclei,cpe:2.3:a:lansweeper:lansweeper:*:*:*:*:*:*:*:* CVE-2019-13608,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.29403,"Citrix StoreFront Server before 1903, 7.15 LTSR before CU4 (3.12.4000), and 7.6 LTSR before CU8 (3.0.8000) allows XXE attacks.",2019-08-29,CISA,cpe:2.3:a:citrix:storefront_server:*:*:*:*:*:*:*:* CVE-2019-1367,7.5,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,0.88091,"A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1221.",2019-09-23,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-13720,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.90143,Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,2019-11-25,CISA,cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* CVE-2019-1385,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.00381,"An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges., aka 'Windows AppX Deployment Extensions Elevation of Privilege Vulnerability'.",2019-11-12,CISA,cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-1388,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.03445,"An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges, aka 'Windows Certificate Dialog Elevation of Privilege Vulnerability'.",2019-11-12,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-1405,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.57211,"An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly allows COM object creation, aka 'Windows UPnP Service Elevation of Privilege Vulnerability'.",2019-11-12,Metasploit/CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-14205,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.68048,A Local File Inclusion vulnerability in the Nevma Adaptive Images plugin before 0.6.67 for WordPress allows remote attackers to retrieve arbitrary files via the $REQUEST['adaptive-images-settings']['source_file'] parameter in adaptive-images-script.php.,2019-07-21,Nuclei,cpe:2.3:a:nevma:adaptive_images:*:*:*:*:*:wordpress:*:* CVE-2019-14223,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.59279,"An issue was discovered in Alfresco Community Edition versions below 5.2.6, 6.0.N and 6.1.N. The Alfresco Share application is vulnerable to an Open Redirect attack via a crafted POST request. By manipulating the POST parameters, an attacker can redirect a victim to a malicious website over any protocol the attacker desires (e.g.,http, https, ftp, smb, etc.).",2019-09-06,Nuclei,cpe:2.3:a:alfresco:alfresco:*:*:*:*:community:*:*:*;cpe:2.3:a:alfresco:alfresco:6.0:*:*:*:community:*:*:*;cpe:2.3:a:alfresco:alfresco:6.1:*:*:*:community:*:*:* CVE-2019-14251,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.64701,"An issue was discovered in T24 in TEMENOS Channels R15.01. The login page presents JavaScript functions to access a document on the server once successfully authenticated. However, an attacker can leverage downloadDocServer() to traverse the file system and access files or directories that are outside of the restricted directory because WealthT24/GetImage is used with the docDownloadPath and uploadLocation parameters.",2019-12-09,Nuclei,cpe:2.3:a:temenos:t24:r15.01:*:*:*:*:*:*:* CVE-2019-1429,7.5,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,0.67064,"A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1426, CVE-2019-1427, CVE-2019-1428.",2019-11-12,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2019-14312,0.0,,0.40875,Aptana Jaxer 1.0.3.4547 is vulnerable to a local file inclusion vulnerability in the wikilite source code viewer. This vulnerability allows a remote attacker to read internal files on the server via a tools/sourceViewer/index.html?filename=../ URI.,2019-08-09,Nuclei,cpe:2.3:a:aptana:jaxer:1.0.3.4547:*:*:*:*:*:*:* CVE-2019-14322,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.90059,"In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames.",2019-07-28,Nuclei,cpe:2.3:a:palletsprojects:werkzeug:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2019-14470,0.0,,0.30592,"cosenary Instagram-PHP-API (aka Instagram PHP API V2), as used in the UserPro plugin through 4.9.32 for WordPress, has XSS via the example/success.php error_description parameter.",2019-09-04,Nuclei,cpe:2.3:a:instagram-php-api_project:instagram-php-api:-:*:*:*:*:*:*:*;cpe:2.3:a:userproplugin:user_pro:*:*:*:*:*:wordpress:*:* CVE-2019-14530,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.79098,"An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server.",2019-08-13,Nuclei,cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* CVE-2019-1458,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.92602,"An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.",2019-12-10,Metasploit/CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* CVE-2019-14696,0.0,,0.14889,"Open-School 3.0, and Community Edition 2.3, allows XSS via the osv/index.php?r=students/guardians/create id parameter.",2019-08-06,Nuclei,cpe:2.3:a:open-school:open-school:2.3:*:*:*:community:*:*:*;cpe:2.3:a:open-school:open-school:3.0:*:*:*:-:*:*:* CVE-2019-14750,0.0,,0.03327,An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. Stored XSS exists in setup/install.php. It was observed that no input sanitization was provided in the firstname and lastname fields of the application. The insertion of malicious queries in those fields leads to the execution of those queries. This can further lead to cookie stealing or other malicious actions.,2019-08-07,Nuclei,cpe:2.3:a:osticket:osticket:*:*:*:*:*:*:*:* CVE-2019-14789,0.0,,0.00851,The Custom 404 Pro plugin 3.2.8 for WordPress has XSS via the wp-admin/admin.php?page=c4p-main page parameter.,2019-08-15,Nuclei,cpe:2.3:a:kunalnagar:custom_404_pro:3.2.8:*:*:*:*:wordpress:*:* CVE-2019-14974,0.0,,0.29776,SugarCRM Enterprise 9.0.0 allows mobile/error-not-supported-platform.html?desktop_url= XSS.,2019-08-14,Nuclei,cpe:2.3:a:sugarcrm:sugarcrm:9.0.0:*:*:*:enterprise:*:*:* CVE-2019-15043,0.0,,0.90763,"In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana.",2019-09-03,Nuclei,cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* CVE-2019-15107,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94461,An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability.,2019-08-16,Metasploit/Nuclei/CISA,cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:* CVE-2019-15271,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.09841,"A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.",2019-11-26,CISA,cpe:2.3:h:cisco:rv016_multi-wan_vpn:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:rv042_dual_wan_vpn:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:rv042g_dual_gigabit_wan_vpn:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:rv082_dual_wan_vpn:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv016_multi-wan_vpn_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv042_dual_wan_vpn_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv042g_dual_gigabit_wan_vpn_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv082_dual_wan_vpn_firmware:*:*:*:*:*:*:*:* CVE-2019-15501,0.0,,0.09803,Reflected cross site scripting (XSS) in L-Soft LISTSERV before 16.5-2018a exists via the /scripts/wa.exe OK parameter.,2019-08-26,Nuclei,cpe:2.3:a:lsoft:listserv:*:*:*:*:*:*:*:* CVE-2019-15642,0.0,,0.91534,"rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states ""RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users.""",2019-08-26,Nuclei,cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:* CVE-2019-15713,0.0,,0.04716,The my-calendar plugin before 3.1.10 for WordPress has XSS.,2019-08-28,Nuclei,cpe:2.3:a:my_calendar_project:my_calendar:*:*:*:*:*:wordpress:*:* CVE-2019-15742,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.08764,A local privilege-escalation vulnerability exists in the Poly Plantronics Hub before 3.14 for Windows client application. A local attacker can exploit this issue to gain elevated privileges.,2020-01-17,Metasploit,cpe:2.3:a:plantronics:plantronics_hub:*:*:*:*:*:windows:*:* CVE-2019-15752,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.44567,"Docker Desktop Community Edition before 2.1.0.1 allows local users to gain privileges by placing a Trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\ as a low-privilege user, and then waiting for an admin or service user to authenticate with Docker, restart Docker, or run 'docker login' to force the command.",2019-08-28,Metasploit/CISA,cpe:2.3:a:apache:geode:1.12.0:*:*:*:*:*:*:*;cpe:2.3:a:docker:docker:*:*:*:*:community:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2019-15774,0.0,,0.01231,The nd-booking plugin before 2.5 for WordPress has a nopriv_ AJAX action that allows modification of the siteurl setting.,2019-08-29,Nuclei,cpe:2.3:a:booking_project:booking:*:*:*:*:*:wordpress:*:* CVE-2019-1579,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92678,"Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and PAN-OS 8.1.2 and earlier with GlobalProtect Portal or GlobalProtect Gateway Interface enabled may allow an unauthenticated remote attacker to execute arbitrary code.",2019-07-19,CISA,cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* CVE-2019-15811,0.0,,0.05244,"In DomainMOD through 4.13, the parameter daterange in the file reporting/domains/cost-by-month.php has XSS.",2019-08-29,Nuclei,cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* CVE-2019-15829,0.0,,0.01087,The photoblocks-grid-gallery plugin before 1.1.33 for WordPress has wp-admin/admin.php?page=photoblocks-edit&id= XSS.,2019-08-30,Nuclei,cpe:2.3:a:greentreelabs:gallery_photoblocks:*:*:*:*:*:wordpress:*:* CVE-2019-15858,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.59563,"admin/includes/class.import.snippet.php in the ""Woody ad snippets"" plugin before 2.2.5 for WordPress allows unauthenticated options import, as demonstrated by storing an XSS payload for remote code execution.",2019-09-03,Nuclei,cpe:2.3:a:webcraftic:woody_ad_snippets:*:*:*:*:*:wordpress:*:* CVE-2019-15859,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.7572,Password disclosure in the web interface on socomec DIRIS A-40 devices before 48250501 allows a remote attacker to get full access to a device via the /password.jsn URI.,2019-10-09,Nuclei,cpe:2.3:h:socomec:diris_a-40:-:*:*:*:*:*:*:*;cpe:2.3:o:socomec:diris_a-40_firmware:*:*:*:*:*:*:*:* CVE-2019-15889,0.0,,0.12845,"The download-manager plugin before 2.9.94 for WordPress has XSS via the category shortcode feature, as demonstrated by the orderby or search[publish_date] parameter.",2019-09-03,Nuclei,cpe:2.3:a:w3eden:download_manager:*:*:*:*:*:wordpress:*:* CVE-2019-15949,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.90137,"Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.",2019-09-05,Metasploit/CISA,cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:* CVE-2019-15954,9.9,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,0.58874,"An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload: ",2019-09-05,Metasploit,cpe:2.3:a:totaljs:total.js_cms:12.0.0:*:*:*:*:*:*:* CVE-2019-15975,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.83634,"Multiple vulnerabilities in the authentication mechanisms of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.",2020-01-06,Metasploit,cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:* CVE-2019-16057,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9375,The login_mgr.cgi script in D-Link DNS-320 through 2.05.B10 is vulnerable to remote command injection.,2019-09-16,Nuclei/CISA,cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dns-320_firmware:*:*:*:*:*:*:*:* CVE-2019-16097,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,0.93699,"core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API, when Harbor is setup with DB as authentication backend and allow user to do self-registration. Fixed version: v1.7.6 v1.8.3. v.1.9.0. Workaround without applying the fix: configure Harbor to use non-DB authentication backend such as LDAP.",2019-09-08,Nuclei,cpe:2.3:a:linuxfoundation:harbor:1.7.0:-:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:harbor:1.7.0:rc1:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:harbor:1.7.0:rc2:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:harbor:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:harbor:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:harbor:1.7.3:*:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:harbor:1.7.4:*:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:harbor:1.7.5:*:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:harbor:1.8.0:-:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:harbor:1.8.0:rc1:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:harbor:1.8.0:rc2:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:harbor:1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:harbor:1.8.2:-:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:harbor:1.8.2:rc1:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:harbor:1.8.2:rc2:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:harbor:1.9.0:rc1:*:*:*:*:*:* CVE-2019-16113,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.90123,"Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php because PHP code can be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname.",2019-09-08,Metasploit,cpe:2.3:a:bludit:bludit:3.9.2:*:*:*:*:*:*:* CVE-2019-16123,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.36652,"In Kartatopia PilusCart 1.4.1, the parameter filename in the file catalog.php is mishandled, leading to ../ Local File Disclosure.",2019-09-09,Nuclei,cpe:2.3:a:kartatopia:piluscart:*:*:*:*:*:*:*:* CVE-2019-1619,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.7169,"A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper session management on affected DCNM software. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to gain administrative access on the affected device.",2019-06-27,Metasploit,cpe:2.3:a:cisco:data_center_network_manager:10.4\(2\):*:*:*:*:*:*:* CVE-2019-1620,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.856,"A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to upload arbitrary files on an affected device. The vulnerability is due to incorrect permission settings in affected DCNM software. An attacker could exploit this vulnerability by uploading specially crafted data to the affected device. A successful exploit could allow the attacker to write arbitrary files on the filesystem and execute code with root privileges on the affected device.",2019-06-27,Metasploit,cpe:2.3:a:cisco:data_center_network_manager:11.0\(1\):*:*:*:*:*:*:* CVE-2019-1621,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.63694,"A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to gain access to sensitive files on an affected device. The vulnerability is due to incorrect permissions settings on affected DCNM software. An attacker could exploit this vulnerability by connecting to the web-based management interface of an affected device and requesting specific URLs. A successful exploit could allow the attacker to download arbitrary files from the underlying filesystem of the affected device.",2019-06-27,Metasploit,cpe:2.3:a:cisco:data_center_network_manager:11.0\(1\):*:*:*:*:*:*:* CVE-2019-1622,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.85997,"A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device. The vulnerability is due to improper access controls for certain URLs on affected DCNM software. An attacker could exploit this vulnerability by connecting to the web-based management interface of an affected device and requesting specific URLs. A successful exploit could allow the attacker to download log files and diagnostic information from the affected device.",2019-06-27,Metasploit,cpe:2.3:a:cisco:data_center_network_manager:11.0\(1\):*:*:*:*:*:*:* CVE-2019-16256,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.42681,"Some Samsung devices include the SIMalliance Toolbox Browser (aka S@T Browser) on the UICC, which might allow remote attackers to retrieve location and IMEI information, or retrieve other data or execute certain commands, via SIM Toolkit (STK) instructions in an SMS message, aka Simjacker.",2019-09-12,CISA,cpe:2.3:h:samsung:samsung:-:*:*:*:*:*:*:*;cpe:2.3:o:samsung:samsung_firmware:-:*:*:*:*:*:*:* CVE-2019-16278,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9439,Directory Traversal in the function http_verify in nostromo nhttpd through 1.9.6 allows an attacker to achieve remote code execution via a crafted HTTP request.,2019-10-14,Metasploit/Nuclei/CISA,cpe:2.3:a:nazgul:nostromo_nhttpd:*:*:*:*:*:*:*:* CVE-2019-16313,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.93949,ifw8 Router ROM v4.31 allows credential disclosure by reading the action/usermanager.htm HTML source code.,2019-09-14,Nuclei,cpe:2.3:h:ifw8:fr5-e:-:*:*:*:*:*:*:*;cpe:2.3:h:ifw8:fr5:-:*:*:*:*:*:*:*;cpe:2.3:h:ifw8:fr6-s:-:*:*:*:*:*:*:*;cpe:2.3:h:ifw8:fr6:-:*:*:*:*:*:*:*;cpe:2.3:h:ifw8:fr8:-:*:*:*:*:*:*:*;cpe:2.3:o:ifw8:fr5-e_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:ifw8:fr5_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:ifw8:fr6-s_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:ifw8:fr6_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:ifw8:fr8_firmware:4.31:*:*:*:*:*:*:* CVE-2019-16328,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,0.73039,"In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.",2019-10-03,Metasploit,cpe:2.3:a:rpyc_project:rpyc:*:*:*:*:*:*:*:* CVE-2019-16332,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.16351,"In the api-bearer-auth plugin before 20190907 for WordPress, the server parameter is not correctly filtered in the swagger-config.yaml.php file, and it is possible to inject JavaScript code, aka XSS.",2019-09-15,Nuclei,cpe:2.3:a:api_bearer_auth_project:api_bearer_auth:*:*:*:*:*:wordpress:*:* CVE-2019-16469,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.73573,"Adobe Experience Manager versions 6.5, 6.4, 6.3, 6.2, 6.1, and 6.0 have an expression language injection vulnerability. Successful exploitation could lead to sensitive information disclosure.",2020-01-15,Nuclei,cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:* CVE-2019-1652,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,0.90083,"A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability.",2019-01-24,Metasploit/CISA,cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:* CVE-2019-16525,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.0745,"An XSS issue was discovered in the checklist plugin before 1.1.9 for WordPress. The fill parameter is not correctly filtered in the checklist-icon.php file, and it is possible to inject JavaScript code.",2019-09-19,Nuclei,cpe:2.3:a:checklist:checklist:*:*:*:*:*:wordpress:*:* CVE-2019-1653,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.94357,"A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.",2019-01-24,Metasploit/Nuclei/CISA,cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv320_firmware:1.4.2.17:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv325_firmware:1.4.2.17:*:*:*:*:*:*:* CVE-2019-1663,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.91671,"A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. RV110W Wireless-N VPN Firewall versions prior to 1.2.2.1 are affected. RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected. RV215W Wireless-N VPN Router versions prior to 1.3.1.1 are affected.",2019-02-28,Metasploit,cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:rv215w:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv110w_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv130w_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv215w_firmware:*:*:*:*:*:*:*:* CVE-2019-16662,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94452,"An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution.",2019-10-28,Metasploit/Nuclei,cpe:2.3:a:rconfig:rconfig:3.9.2:*:*:*:*:*:*:* CVE-2019-16724,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.8303,"File Sharing Wizard 1.5.0 allows a remote attacker to obtain arbitrary code execution by exploiting a Structured Exception Handler (SEH) based buffer overflow in an HTTP POST parameter, a similar issue to CVE-2010-2330 and CVE-2010-2331.",2019-09-24,Metasploit,cpe:2.3:a:upredsun:file_sharing_wizard:1.5.0:*:*:*:*:*:*:* CVE-2019-16759,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94407,vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request.,2019-09-24,Metasploit/Nuclei/CISA,cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:* CVE-2019-16920,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94343,"Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a ""PingTest"" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.",2019-09-27,Nuclei/CISA,cpe:2.3:h:dlink:dap-1533:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dhp-1565:ax:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-652:ax:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-655:cx:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-825:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-835:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-855l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-862l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-866l:ax:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dap-1533_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dhp-1565_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-615_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-652_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-655_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-825_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-835_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-855l_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-862l_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-866l_firmware:*:*:*:*:*:*:*:* CVE-2019-16928,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9059,"Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.",2019-09-27,CISA,cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* CVE-2019-16931,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.01991,"A stored XSS vulnerability in the Visualizer plugin 3.3.0 for WordPress allows an unauthenticated attacker to execute arbitrary JavaScript when an admin or other privileged user edits the chart via the admin dashboard. This occurs because classes/Visualizer/Gutenberg/Block.php registers wp-json/visualizer/v1/update-chart with no access control, and classes/Visualizer/Render/Page/Data.php lacks output sanitization.",2019-10-03,Nuclei,cpe:2.3:a:themeisle:visualizer:*:*:*:*:*:wordpress:*:* CVE-2019-16932,10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N,0.82175,A blind SSRF vulnerability exists in the Visualizer plugin before 3.3.1 for WordPress via wp-json/visualizer/v1/upload-data.,2019-09-30,Nuclei,cpe:2.3:a:themeisle:visualizer:*:*:*:*:*:wordpress:*:* CVE-2019-16996,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,0.92323,"In Metinfo 7.0.0beta, a SQL Injection was discovered in app/system/product/admin/product_admin.class.php via the admin/?n=product&c=product_admin&a=dopara&app_type=shop id parameter.",2019-09-30,Nuclei,cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:* CVE-2019-16997,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,0.92932,"In Metinfo 7.0.0beta, a SQL Injection was discovered in app/system/language/admin/language_general.class.php via the admin/?n=language&c=language_general&a=doExportPack appno parameter.",2019-09-30,Nuclei,cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:* CVE-2019-17026,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.50979,"Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 68.4.1, Thunderbird < 68.4.1, and Firefox < 72.0.1.",2020-03-02,CISA,cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* CVE-2019-17228,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N,0.03443,includes/options.php in the motors-car-dealership-classified-listings (aka Motors - Car Dealer & Classified Ads) plugin through 1.4.0 for WordPress allows unauthenticated options changes.,2020-02-24,Nuclei,"cpe:2.3:a:stylemixthemes:motors_-_car_dealer\,_classifieds_\&_listing:*:*:*:*:*:wordpress:*:*" CVE-2019-17230,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,0.13264,includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress allows unauthenticated options changes.,2020-04-03,Nuclei,cpe:2.3:a:mageewp:onetone:*:*:*:*:*:wordpress:*:* CVE-2019-17231,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.01236,includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress has multiple stored XSS issues.,2020-04-03,Nuclei,cpe:2.3:a:mageewp:onetone:*:*:*:*:*:wordpress:*:* CVE-2019-17232,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,0.27947,Functions/EWD_UFAQ_Import.php in the ultimate-faqs plugin through 1.8.24 for WordPress allows unauthenticated options import.,2019-10-07,Nuclei,cpe:2.3:a:etoilewebdesign:ultimate_faq:*:*:*:*:*:wordpress:*:* CVE-2019-17233,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.04787,Functions/EWD_UFAQ_Import.php in the ultimate-faqs plugin through 1.8.24 for WordPress allows HTML content injection.,2019-10-07,Nuclei,cpe:2.3:a:etoilewebdesign:ultimate_faq:*:*:*:*:*:wordpress:*:* CVE-2019-17270,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93129,"Yachtcontrol through 2019-10-06: It's possible to perform direct Operating System commands as an unauthenticated user via the ""/pages/systemcall.php?command={COMMAND}"" page and parameter, where {COMMAND} will be executed and returning the results to the client. Affects Yachtcontrol webservers disclosed via Dutch GPRS/4G mobile IP-ranges. IP addresses vary due to DHCP client leasing of telco's.",2019-12-10,Nuclei,cpe:2.3:a:yachtcontrol:yachtcontrol:*:*:*:*:*:*:*:* CVE-2019-17382,9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,0.93651,"An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin.",2019-10-09,Nuclei,cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* CVE-2019-17418,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,0.92822,"An issue was discovered in MetInfo 7.0. There is SQL injection via the admin/?n=language&c=language_general&a=doSearchParameter appno parameter, a different issue than CVE-2019-16997.",2019-10-10,Nuclei,cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:* CVE-2019-17444,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.90681,"Jfrog Artifactory uses default passwords (such as ""password"") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory. This issue affects Jfrog Artifactory versions prior to 6.17.0.",2020-10-12,Nuclei,cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:* CVE-2019-17503,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.9022,"An issue was discovered in Kirona Dynamic Resource Scheduling (DRS) 5.5.3.5. An unauthenticated user can access /osm/REGISTER.cmd (aka /osm_tiles/REGISTER.cmd) directly: it contains sensitive information about the database through the SQL queries within this batch file. This file exposes SQL database information such as database version, table name, column name, etc.",2019-10-11,Nuclei,cpe:2.3:a:kirona:dynamic_resource_scheduling:5.5.3.5:*:*:*:*:*:*:* CVE-2019-17506,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92728,There are some web interfaces without authentication requirements on D-Link DIR-868L B1-2.03 and DIR-817LW A1-1.04 routers. An attacker can get the router's username and password (and other information) via a DEVICE.ACCOUNT value for SERVICES in conjunction with AUTHORIZED_GROUP=1%0a to getcfg.php. This could be used to control the router remotely.,2019-10-11,Nuclei,cpe:2.3:h:dlink:dir-817lw_a1:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-868l_b1:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-817lw_a1_firmware:1.04:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-868l_b1_firmware:2.03:*:*:*:*:*:*:* CVE-2019-17538,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.87775,Jiangnan Online Judge (aka jnoj) 0.8.0 has Directory Traversal for file reading via the web/polygon/problem/viewfile?id=1&name=../ substring.,2019-10-13,Nuclei,cpe:2.3:a:jnoj:jiangnan_online_judge:0.8.0:*:*:*:*:*:*:* CVE-2019-17558,7.5,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,0.94474,"Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined configset could contain renderable, potentially malicious, templates. Parameter provided templates are disabled by default, but can be enabled by setting `params.resource.loader.enabled` by defining a response writer with that setting set to `true`. Defining a response writer requires configuration API access. Solr 8.4 removed the params resource loader entirely, and only enables the configset-provided template rendering when the configset is `trusted` (has been uploaded by an authenticated user).",2019-12-30,Metasploit/Nuclei/CISA,cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:* CVE-2019-17564,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93465,"Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions.",2020-04-01,Nuclei,cpe:2.3:a:apache:dubbo:*:*:*:*:*:*:*:* CVE-2019-17574,9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,0.75511,"An issue was discovered in the Popup Maker plugin before 1.8.13 for WordPress. An unauthenticated attacker can partially control the arguments of the do_action function to invoke certain popmake_ or pum_ methods, as demonstrated by controlling content and delivery of popmake-system-info.txt (aka the ""support debug text file"").",2019-10-14,Nuclei,cpe:2.3:a:code-atlantic:popup_maker:*:*:*:*:*:wordpress:*:* CVE-2019-17621,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93194,"The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.",2019-12-30,Metasploit/CISA,cpe:2.3:h:dlink:dir-818lx:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-822:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-823:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-859:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-865l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-868l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-869:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-880l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-885l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-885r:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-890l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-890r:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-895l:-:*:*:*:*:*:*:*;cpe:2.3:h:dlink:dir-895r:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-818lx_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-822_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-823_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-823_firmware:1.00b06:beta:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-859_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-859_firmware:1.06b01:beta1:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-865l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-868l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-869_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-869_firmware:1.03b02:beta02:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-880l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-885l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-885r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-890l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-890l_firmware:1.11b01:beta01:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-890r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-890r_firmware:1.11b01:beta01:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-895l_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-895r_firmware:*:*:*:*:*:*:*:* CVE-2019-17662,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93379,"ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise of the VNC server. The vulnerability exists even when authentication is turned on during the deployment of the VNC server. The password for authentication is stored in cleartext in a file that can be read via a ../../ThinVnc.ini directory traversal attack vector.",2019-10-16,Metasploit/Nuclei,cpe:2.3:a:cybelsoft:thinvnc:1.0:b1:*:*:*:*:*:* CVE-2019-18187,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.71916,"Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication.",2019-10-28,CISA,cpe:2.3:a:trendmicro:officescan:11.0:sp1:*:*:*:*:*:*;cpe:2.3:a:trendmicro:officescan:xg:*:*:*:*:*:*:*;cpe:2.3:a:trendmicro:officescan:xg:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2019-1821,0.0,,0.93014,"A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system.",2019-05-16,Metasploit/Nuclei,cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:cisco:network_level_service:3.0\(0.0.83b\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:* CVE-2019-18217,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.05457,ProFTPD before 1.3.6b and 1.3.7rc before 1.3.7rc2 allows remote unauthenticated denial-of-service due to incorrect handling of overly long commands because main.c in a child process enters an infinite loop.,2019-10-21,Nuclei,cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.6:-:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.6:a:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.6:rc1:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.6:rc2:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.6:rc3:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.6:rc4:*:*:*:*:*:*;cpe:2.3:a:proftpd:proftpd:1.3.7:rc1:*:*:*:*:*:* CVE-2019-18371,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.90631,"An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. There is a directory traversal vulnerability to read arbitrary files via a misconfigured NGINX alias, as demonstrated by api-third-party/download/extdisks../etc/config/account. With this vulnerability, the attacker can bypass authentication.",2019-10-23,Nuclei,cpe:2.3:h:mi:millet_router_3g:-:*:*:*:*:*:*:*;cpe:2.3:o:mi:millet_router_3g_firmware:*:*:*:*:*:*:*:* CVE-2019-18393,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.83848,"PluginServlet.java in Ignite Realtime Openfire through 4.4.2 does not ensure that retrieved files are located under the Openfire home directory, aka a directory traversal vulnerability.",2019-10-24,Nuclei,cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:* CVE-2019-18394,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9388,A Server Side Request Forgery (SSRF) vulnerability in FaviconServlet.java in Ignite Realtime Openfire through 4.4.2 allows attackers to send arbitrary HTTP GET requests.,2019-10-24,Nuclei,cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:* CVE-2019-18426,8.2,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N,0.51202,A vulnerability in WhatsApp Desktop versions prior to 0.3.9309 when paired with WhatsApp for iPhone versions prior to 2.20.10 allows cross-site scripting and local file reading. Exploiting the vulnerability requires the victim to click a link preview from a specially crafted text message.,2020-01-21,CISA,cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*;cpe:2.3:a:whatsapp:whatsapp_for_desktop:*:*:*:*:*:-:*:* CVE-2019-18665,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.57184,The Log module in SECUDOS DOMOS before 5.6 allows local file inclusion.,2019-11-02,Nuclei,cpe:2.3:a:secudos:domos:*:*:*:*:*:*:*:* CVE-2019-18818,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94006,strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js.,2019-11-07,Metasploit/Nuclei,cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha10.1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha10.2:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha10.3:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha11.1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha11.2:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha11.3:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha11:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha12.1.3:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha12.1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha12.2:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha12.3:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha12.4:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha12.5:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha12.6:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha12.7.1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha12.7:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha12:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha13.0.1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha13.1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha13:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha14.1.1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha14.1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha14.2:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha14.3:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha14.4.0:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha14.5:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha14:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha15:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha16:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha17:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha18:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha19:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha20:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha21:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha22:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha23.1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha23:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha24.1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha24:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha25.1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha25.2:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha25:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha26.1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha26.2:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha26:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha4.8:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha4:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha5.3:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha5.5:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha6.3:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha6.4:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha6.7:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha7.2:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha7.3:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha8.3:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha8:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha9.1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha9.2:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:alpha9:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta0:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta10:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta11:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta12:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta13:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta14:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta15:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta16.1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta16.2:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta16.3:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta16.4:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta16.5:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta16.6:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta16.7:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta16.8:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta16:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta17.1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta17.2:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta17.3:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta17.4:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta17:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta1:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta2:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta3:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta4:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta5:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta6:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta7:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta8:*:*:*:*:*:*;cpe:2.3:a:strapi:strapi:3.0.0:beta9:*:*:*:*:*:* CVE-2019-18922,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.91607,A Directory Traversal in the Web interface of the Allied Telesis AT-GS950/8 until Firmware AT-S107 V.1.1.3 [1.00.047] allows unauthenticated attackers to read arbitrary system files via a GET request. NOTE: This is an End-of-Life product.,2019-11-29,Nuclei,cpe:2.3:h:alliedtelesis:at-gs950\/8:-:*:*:*:*:*:*:*;cpe:2.3:o:alliedtelesis:at-gs950\/8_firmware:*:*:*:*:*:*:*:* CVE-2019-18935,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93592,"Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)",2019-12-11,Metasploit/CISA,cpe:2.3:a:telerik:ui_for_asp.net_ajax:*:*:*:*:*:*:*:* CVE-2019-18952,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.76868,"SibSoft Xfilesharing through 2.5.1 allows cgi-bin/up.cgi arbitrary file upload. This can be combined with CVE-2019-18951 to achieve remote code execution via a .html file, containing short codes, that is served over HTTP.",2019-11-13,Nuclei,cpe:2.3:a:sibsoft:xfilesharing:*:*:*:*:*:*:*:* CVE-2019-18957,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.0746,Microstrategy Library in MicroStrategy before 2019 before 11.1.3 has reflected XSS.,2019-11-14,Nuclei,cpe:2.3:a:microstrategy:microstrategy_library:*:*:*:*:*:*:*:* CVE-2019-1898,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.73548,"A vulnerability in the web-based management interface of Cisco RV110W, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to access the syslog file on an affected device. The vulnerability is due to improper authorization of an HTTP request. An attacker could exploit this vulnerability by accessing the URL for the syslog file. A successful exploit could allow the attacker to access the information contained in the file.",2019-06-20,Nuclei,cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:rv215w:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv110w_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv130w_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:rv215w_firmware:-:*:*:*:*:*:*:* CVE-2019-18988,7.0,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,0.13242,"TeamViewer Desktop through 14.7.1965 allows a bypass of remote-login access control because the same key is used for different customers' installations. It used a shared AES key for all installations since at least as far back as v7.0.43148, and used it for at least OptionsPasswordAES in the current version of the product. If an attacker were to know this key, they could decrypt protect information stored in the registry or configuration files of TeamViewer. With versions before v9.x , this allowed for attackers to decrypt the Unattended Access password to the system (which allows for remote login to the system as well as headless file browsing). The latest version still uses the same key for OptionPasswordAES but appears to have changed how the Unattended Access password is stored. While in most cases an attacker requires an existing session on a system, if the registry/configuration keys were stored off of the machine (such as in a file share or online), an attacker could then decrypt the required password to login to the system.",2020-02-07,Metasploit/CISA,cpe:2.3:a:teamviewer:teamviewer:*:*:*:*:*:*:*:* CVE-2019-19134,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.08631,The Hero Maps Premium plugin 2.2.1 and prior for WordPress is prone to unauthenticated XSS via the views/dashboard/index.php p parameter because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to inject HTML or arbitrary JavaScript within the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based tokens or to launch other attacks.,2020-02-26,Nuclei,cpe:2.3:a:heroplugins:hero_maps_premium:*:*:*:*:*:wordpress:*:* CVE-2019-1935,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.89105,"A vulnerability in Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to log in to the CLI of an affected system by using the SCP User account (scpuser), which has default user credentials. The vulnerability is due to the presence of a documented default account with an undocumented default password and incorrect permission settings for that account. Changing the default password for this account is not enforced during the installation of the product. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the scpuser account. This includes full read and write access to the system's database.",2019-08-21,Metasploit,cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*;cpe:2.3:a:cisco:integrated_management_controller_supervisor:2.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:6.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:6.5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:6.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:6.6.1.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:6.7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:6.7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:6.7\(0.0.67265\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director_express_for_big_data:3.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director_express_for_big_data:3.5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director_express_for_big_data:3.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director_express_for_big_data:3.7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director_express_for_big_data:3.7.1.0:*:*:*:*:*:*:* CVE-2019-19356,7.5,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,0.88896,"Netis WF2419 is vulnerable to authenticated Remote Code Execution (RCE) as root through the router Web management page. The vulnerability has been found in firmware version V1.2.31805 and V2.2.36123. After one is connected to this page, it is possible to execute system commands as root through the tracert diagnostic tool because of lack of user input sanitizing.",2020-02-07,CISA,cpe:2.3:h:netis-systems:wf2419:-:*:*:*:*:*:*:*;cpe:2.3:o:netis-systems:wf2419_firmware:1.2.31805:*:*:*:*:*:*:*;cpe:2.3:o:netis-systems:wf2419_firmware:2.2.36123:*:*:*:*:*:*:* CVE-2019-1936,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,0.6332,"A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an authenticated, remote attacker to execute arbitrary commands on the underlying Linux shell as the root user. Exploitation of this vulnerability requires privileged access to an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by logging in to the web-based management interface with administrator privileges and then sending a malicious request to a certain part of the interface.",2019-08-21,Metasploit,cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*;cpe:2.3:a:cisco:integrated_management_controller_supervisor:2.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:6.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:6.5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:6.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:6.6.1.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:6.7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:6.7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:6.7\(0.0.67265\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director_express_for_big_data:3.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director_express_for_big_data:3.5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director_express_for_big_data:3.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director_express_for_big_data:3.7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director_express_for_big_data:3.7.1.0:*:*:*:*:*:*:* CVE-2019-19363,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.02604,An issue was discovered in Ricoh (including Savin and Lanier) Windows printer drivers prior to 2020 that allows attackers local privilege escalation. Affected drivers and versions are: PCL6 Driver for Universal Print - Version 4.0 or later PS Driver for Universal Print - Version 4.0 or later PC FAX Generic Driver - All versions Generic PCL5 Driver - All versions RPCS Driver - All versions PostScript3 Driver - All versions PCL6 (PCL XL) Driver - All versions RPCS Raster Driver - All version,2020-01-24,Metasploit,cpe:2.3:a:ricoh:generic_pcl5_driver:-:*:*:*:*:*:*:*;cpe:2.3:a:ricoh:pc_fax_generic_driver:-:*:*:*:*:*:*:*;cpe:2.3:a:ricoh:pcl6_\(pcl_xl\)_driver:-:*:*:*:*:*:*:*;cpe:2.3:a:ricoh:pcl6_driver_for_universal_print:*:*:*:*:*:*:*:*;cpe:2.3:a:ricoh:postscript3_driver:-:*:*:*:*:*:*:*;cpe:2.3:a:ricoh:ps_driver_for_universal_print:*:*:*:*:*:*:*:*;cpe:2.3:a:ricoh:rpcs_driver:-:*:*:*:*:*:*:*;cpe:2.3:a:ricoh:rpcs_raster_driver:-:*:*:*:*:*:*:* CVE-2019-19368,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.75637,A Reflected Cross Site Scripting was discovered in the Login page of Rumpus FTP Web File Manager 8.2.9.1. An attacker can exploit it by sending a crafted link to end users and can execute arbitrary Javascripts,2019-12-16,Nuclei,cpe:2.3:a:maxum:rumpus:8.2.9.1:*:*:*:*:*:*:* CVE-2019-1937,0.0,,0.91304,"A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing user authentication. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious requests to an affected device. An exploit could allow the attacker to use the acquired session token to gain full administrator access to the affected device.",2019-08-21,Metasploit,cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:*:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director:6.7\(0.0.67265\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director_express_for_big_data:*:*:*:*:*:*:*:*;cpe:2.3:a:cisco:ucs_director_express_for_big_data:3.6.0.0:*:*:*:*:*:*:* CVE-2019-19411,3.7,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N,0.02952,"USG9500 with versions of V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 have an information leakage vulnerability. Due to improper processing of the initialization vector used in a specific encryption algorithm, an attacker who gains access to this cryptographic primitive may exploit this vulnerability to cause the value of the confidentiality associated with its use to be diminished.",2020-01-21,Nuclei,cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*;cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc100:*:*:*:*:*:*:*;cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*;cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*;cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*;cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*;cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:* CVE-2019-1943,0.0,,0.22946,"A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Switches software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.",2019-07-17,Nuclei,cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*;cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf300-08_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf300-24_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf300-24mp_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf300-24p_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf300-24pp_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf300-48_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf300-48p_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf300-48pp_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf302-08_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf302-08mp_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf302-08mpp_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf302-08p_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf302-08pp_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg300-10_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg300-10mp_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg300-10mpp_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg300-10p_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg300-10pp_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg300-10sfp_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg300-20_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg300-28_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg300-28mp_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg300-28p_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg300-28pp_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg300-52_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg300-52mp_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg300-52p_firmware:1.3.7.18:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg500-52_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg500-52mp_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:* CVE-2019-19494,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.69068,"Broadcom based cable modems across multiple vendors are vulnerable to a buffer overflow, which allows a remote attacker to execute arbitrary code at the kernel level via JavaScript run in a victim's browser. Examples of affected products include Sagemcom F@st 3890 prior to 50.10.21_T4, Sagemcom F@st 3890 prior to 05.76.6.3f, Sagemcom F@st 3686 3.428.0, Sagemcom F@st 3686 4.83.0, NETGEAR CG3700EMR 2.01.05, NETGEAR CG3700EMR 2.01.03, NETGEAR C6250EMR 2.01.05, NETGEAR C6250EMR 2.01.03, Technicolor TC7230 STEB 01.25, COMPAL 7284E 5.510.5.11, and COMPAL 7486E 5.510.5.11.",2020-01-09,Metasploit,cpe:2.3:h:compal:7284e:-:*:*:*:*:*:*:*;cpe:2.3:h:compal:7486e:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:c6250emr:-:*:*:*:*:*:*:*;cpe:2.3:h:netgear:cg3700emr:-:*:*:*:*:*:*:*;cpe:2.3:h:sagemcom:f\@st_3686:-:*:*:*:*:*:*:*;cpe:2.3:h:sagemcom:f\@st_3890:-:*:*:*:*:*:*:*;cpe:2.3:h:technicolor:tc7230_steb:-:*:*:*:*:*:*:*;cpe:2.3:o:compal:7284e_firmware:5.510.5.11:*:*:*:*:*:*:*;cpe:2.3:o:compal:7486e_firmware:5.510.5.11:*:*:*:*:*:*:*;cpe:2.3:o:netgear:c6250emr_firmware:2.01.03:*:*:*:*:*:*:*;cpe:2.3:o:netgear:c6250emr_firmware:2.01.05:*:*:*:*:*:*:*;cpe:2.3:o:netgear:cg3700emr_firmware:2.01.03:*:*:*:*:*:*:*;cpe:2.3:o:netgear:cg3700emr_firmware:2.01.05:*:*:*:*:*:*:*;cpe:2.3:o:sagemcom:f\@st_3686_firmware:3.428.0:*:*:*:*:*:*:*;cpe:2.3:o:sagemcom:f\@st_3686_firmware:4.83.0:*:*:*:*:*:*:*;cpe:2.3:o:sagemcom:f\@st_3890_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:technicolor:tc7230_steb_firmware:01.25:*:*:*:*:*:*:* CVE-2019-19509,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.92081,"An issue was discovered in rConfig 3.9.3. A remote authenticated user can directly execute system commands by sending a GET request to ajaxArchiveFiles.php because the path parameter is passed to the exec function without filtering, which can lead to command execution.",2020-01-06,Metasploit,cpe:2.3:a:rconfig:rconfig:3.9.3:*:*:*:*:*:*:* CVE-2019-19726,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.10738,"OpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries to strip LD_LIBRARY_PATH from the environment, but fails when it cannot allocate memory. Thus, the attacker is able to execute their own library code as root.",2019-12-12,Metasploit,cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:* CVE-2019-19781,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94442,"An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.",2019-12-27,Metasploit/Nuclei/CISA,cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*;cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*;cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*;cpe:2.3:o:citrix:application_delivery_controller_firmware:10.5:*:*:*:*:*:*:*;cpe:2.3:o:citrix:application_delivery_controller_firmware:11.1:*:*:*:*:*:*:*;cpe:2.3:o:citrix:application_delivery_controller_firmware:12.0:*:*:*:*:*:*:*;cpe:2.3:o:citrix:application_delivery_controller_firmware:12.1:*:*:*:*:*:*:*;cpe:2.3:o:citrix:application_delivery_controller_firmware:13.0:*:*:*:*:*:*:*;cpe:2.3:o:citrix:gateway_firmware:13.0:*:*:*:*:*:*:*;cpe:2.3:o:citrix:netscaler_gateway_firmware:10.5:*:*:*:*:*:*:*;cpe:2.3:o:citrix:netscaler_gateway_firmware:11.1:*:*:*:*:*:*:*;cpe:2.3:o:citrix:netscaler_gateway_firmware:12.0:*:*:*:*:*:*:*;cpe:2.3:o:citrix:netscaler_gateway_firmware:12.1:*:*:*:*:*:*:* CVE-2019-19824,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.93672,"On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and N302RE 2.0.2.",2020-01-27,Nuclei,cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*;cpe:2.3:h:totolink:a702r:-:*:*:*:*:*:*:*;cpe:2.3:h:totolink:n100re:-:*:*:*:*:*:*:*;cpe:2.3:h:totolink:n150rt:-:*:*:*:*:*:*:*;cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*;cpe:2.3:h:totolink:n300rt:-:*:*:*:*:*:*:*;cpe:2.3:h:totolink:n301rt:-:*:*:*:*:*:*:*;cpe:2.3:h:totolink:n302r:-:*:*:*:*:*:*:*;cpe:2.3:o:totolink:a3002ru_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:totolink:a702r_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:totolink:n100re_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:totolink:n150rt_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:totolink:n200re_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:totolink:n300rt_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:totolink:n301rt_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:totolink:n302r_firmware:*:*:*:*:*:*:*:* CVE-2019-19833,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,0.61826,"In Tautulli 2.1.9, CSRF in the /shutdown URI allows an attacker to shut down the remote media server. (Also, anonymous access can be achieved in applications that do not have a user login area).",2019-12-18,Metasploit,cpe:2.3:a:tautulli:tautulli:2.1.9:*:*:*:*:*:*:* CVE-2019-19908,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.54847,"phpMyChat-Plus 1.98 is vulnerable to reflected XSS via JavaScript injection into the password reset URL. In the URL, the pmc_username parameter to pass_reset.php is vulnerable.",2019-12-20,Nuclei,cpe:2.3:a:ciprianmp:phpmychat-plus:1.98:*:*:*:*:*:*:* CVE-2019-19985,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.86715,"The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed unauthenticated file download with user information disclosure.",2019-12-26,Nuclei,cpe:2.3:a:icegram:email_subscribers_\&_newsletters:*:*:*:*:*:wordpress:*:* CVE-2019-20085,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.93964,TVT NVMS-1000 devices allow GET /.. Directory Traversal,2019-12-30,Metasploit/Nuclei/CISA,cpe:2.3:h:tvt:nvms-1000:-:*:*:*:*:*:*:*;cpe:2.3:o:tvt:nvms-1000_firmware:-:*:*:*:*:*:*:* CVE-2019-20141,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.12494,An XSS issue was discovered in the Laborator Neon theme 2.0 for WordPress via the data/autosuggest-remote.php q parameter.,2019-12-30,Nuclei,cpe:2.3:a:laborator:neon:2.0:*:*:*:*:wordpress:*:* CVE-2019-20176,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.00445,"In Pure-FTPd 1.0.49, a stack exhaustion issue was discovered in the listdir function in ls.c.",2019-12-31,Nuclei,cpe:2.3:a:pureftpd:pure-ftpd:1.0.49:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* CVE-2019-20183,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,0.54481,uploadimage.php in Employee Records System 1.0 allows upload and execution of arbitrary PHP code because file-extension validation is only on the client side. The attacker can modify global.js to allow the .php extension.,2020-01-09,Nuclei,cpe:2.3:a:employee_records_system_project:employee_records_system:1.0:*:*:*:*:*:*:* CVE-2019-20210,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.00539,"The CTHthemes CityBook before 2.3.4, TownHub before 1.0.6, and EasyBook before 1.2.2 themes for WordPress allow Reflected XSS via a search query.",2020-01-13,Nuclei,cpe:2.3:a:cththemes:citybook:*:*:*:*:*:wordpress:*:*;cpe:2.3:a:cththemes:easybook:*:*:*:*:*:wordpress:*:*;cpe:2.3:a:cththemes:townhub:*:*:*:*:*:wordpress:*:* CVE-2019-20215,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.90327,"D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via a urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because HTTP_ST is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters.",2020-01-29,Metasploit,cpe:2.3:h:dlink:dir-859:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-859_firmware:1.05:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-859_firmware:1.06b01:beta01:*:*:*:*:*:* CVE-2019-20224,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.93647,netflow_get_stats in functions_netflow.php in Pandora FMS 7.0NG allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ip_src parameter in an index.php?operation/netflow/nf_live_view request. This issue has been fixed in Pandora FMS 7.0 NG 742.,2020-01-09,Nuclei,cpe:2.3:a:artica:pandora_fms:7.0_ng:*:*:*:*:*:*:* CVE-2019-20361,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.32445,"There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 4.3.1, that allowed SQL statements to be passed to the database in the hash parameter (a blind SQL injection vulnerability).",2020-01-08,Metasploit,cpe:2.3:a:icegram:email_subscribers_\&_newsletters:*:*:*:*:*:wordpress:*:* CVE-2019-20499,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.92715,"D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Restore Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_restore configRestore or configServerip parameter.",2020-03-05,Metasploit,cpe:2.3:h:dlink:dwl-2600ap:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dwl-2600ap_firmware:*:*:*:*:*:*:*:* CVE-2019-20500,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.93662,"D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Save Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_save configBackup or downloadServerip parameter.",2020-03-05,CISA,cpe:2.3:h:dlink:dwl-2600ap:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dwl-2600ap_firmware:*:*:*:*:*:*:*:* CVE-2019-20504,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.47181,service/krashrpt.php in Quest KACE K1000 Systems Management Appliance before 6.4 SP3 (6.4.120822) allows a remote attacker to execute code via shell metacharacters in the kuid parameter.,2020-03-09,Nuclei,cpe:2.3:a:quest:kace_systems_management:*:*:*:*:*:*:*:* CVE-2019-20933,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.92775,InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).,2020-11-19,Nuclei,cpe:2.3:a:influxdata:influxdb:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2019-2215,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.49834,"A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095",2019-10-11,Metasploit/CISA,cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:alp-al00b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:alp-tl00b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:anne-al00:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:ares-al00b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:ares-al10d:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:ares-tl00chw:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:barca-al00:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:berkeley-tl10:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:bla-al00b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:bla-tl00b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:columbia-al00a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:cornell-tl10b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:duke-l09i:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:dura-al00a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:figo-al00a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:florida-al20b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:florida-l03:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:florida-l21:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:florida-l22:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:florida-tl10b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:honor_9i:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:jakarta-al00a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:johnson-tl00d:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:leland-al10b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:leland-l21a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:leland-l32a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:leland-tl10b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:leland-tl10c:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:lelandp-al00c:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:lelandp-l22c:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:mate_rs:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:neo-al00d:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:nova_2s:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:nova_3e:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:rhone-al00:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:stanford-l09:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:stanford-l09s:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:sydney-tl00:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:y9_2019:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:yale-tl00b:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:a220:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:a320:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:a800:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:aff_baseboard_management_controller:a700s:*:*:*:*:*:*:*;cpe:2.3:h:netapp:c190:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:fas2720:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:fas2750:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:huawei:alp-al00b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:alp-tl00b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:anne-al00_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:ares-al00b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:ares-al10d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:ares-tl00chw_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:barca-al00_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:berkeley-tl10_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:bla-al00b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:bla-tl00b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:columbia-al00a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:duke-l09i_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:figo-al00a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:florida-al20b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:florida-l03_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:florida-l21_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:florida-l22_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:florida-tl10b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:honor_9i_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:jakarta-al00a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:johnson-tl00d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:leland-al10b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:leland-l21a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:leland-l32a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:leland-tl10b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:leland-tl10c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:lelandp-al00c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:lelandp-l22c_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:mate_rs_firmware:9.1.0.321\(c786e320r1p1t8\):*:*:*:*:*:*:*;cpe:2.3:o:huawei:neo-al00d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:nova_2s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:nova_3_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:nova_3e_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:p20_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:princeton-al10b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:rhone-al00_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:stanford-l09_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:stanford-l09s_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:sydney-al00_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:sydney-tl00_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:sydneym-al00_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:tony-al00b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:tony-tl00b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:y9_2019_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:yale-al00a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:yale-tl00b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:a320_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:aff_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:* CVE-2019-25141,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.63236,"The Easy WP SMTP plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 1.3.9. This is due to missing capability checks on the admin_init() function, in addition to insufficient input validation. This makes it possible for unauthenticated attackers to modify the plugins settings and arbitrary options on the site that can be used to inject new administrative user accounts.",2023-06-07,Nuclei,cpe:2.3:a:wp-ecommerce:easy_wp_smtp:*:*:*:*:*:wordpress:*:* CVE-2019-25152,7.2,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N,0.00524,"The Abandoned Cart Lite for WooCommerce and Abandoned Cart Pro for WooCommerce plugins for WordPress are vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 5.1.3 and 7.12.0 respectively, due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in user input that will execute on the admin dashboard.",2023-06-22,Nuclei,cpe:2.3:a:tychesoftwares:abandoned_cart_lite_for_woocommerce:*:*:*:*:*:wordpress:*:*;cpe:2.3:a:tychesoftwares:abandoned_cart_pro_for_woocommerce:*:*:*:*:*:wordpress:*:* CVE-2019-2557,0.0,,0.55917,"Vulnerability in the Oracle Application Testing Suite component of Oracle Enterprise Manager Products Suite (subcomponent: Load Testing for Web Apps). The supported version that is affected is 13.3.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Testing Suite. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Testing Suite accessible data as well as unauthorized read access to a subset of Oracle Application Testing Suite accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Application Testing Suite. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).",2019-04-23,Metasploit,cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:* CVE-2019-2578,0.0,,0.68924,"Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Advanced UI). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. While the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 8.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).",2019-04-23,Nuclei,cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:* CVE-2019-2579,0.0,,0.59993,Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Advanced UI). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).,2019-04-23,Nuclei,cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:* CVE-2019-2588,0.0,,0.8144,"Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all BI Publisher (formerly XML Publisher) accessible data. CVSS 3.0 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).",2019-04-23,Nuclei,cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.4.0:*:*:*:*:*:*:* CVE-2019-2616,7.2,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N,0.94347,"Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher). While the vulnerability is in BI Publisher (formerly XML Publisher), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of BI Publisher (formerly XML Publisher) accessible data as well as unauthorized read access to a subset of BI Publisher (formerly XML Publisher) accessible data. CVSS 3.0 Base Score 7.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).",2019-04-23,Nuclei/CISA,cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.4.0:*:*:*:*:*:*:* CVE-2019-2725,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9447,"Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).",2019-04-26,Metasploit/Nuclei/CISA,cpe:2.3:a:oracle:agile_plm:9.3.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:agile_plm:9.3.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:agile_plm:9.3.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_converged_application_server:5.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_converged_application_server:7.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_converged_application_server:7.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*;cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*;cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*;cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:tape_library_acsls:8.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:tape_virtual_storage_manager_gui:6.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:vm_virtualbox:5.2.36:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:* CVE-2019-2729,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94364,"Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).",2019-06-19,Nuclei,cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:communications_network_integrity:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.5.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:identity_manager:11.1.2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:identity_manager:12.2.1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*;cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*;cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*;cpe:2.3:a:oracle:rapid_planning:12.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:rapid_planning:12.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:tape_library_acsls:8.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* CVE-2019-2767,0.0,,0.53446,"Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). The supported version that is affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher). While the vulnerability is in BI Publisher (formerly XML Publisher), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of BI Publisher (formerly XML Publisher) accessible data as well as unauthorized read access to a subset of BI Publisher (formerly XML Publisher) accessible data. CVSS 3.0 Base Score 7.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).",2019-07-23,Nuclei,cpe:2.3:a:oracle:bi_publisher:11.1.1.9.0:*:*:*:*:*:*:* CVE-2019-3010,8.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,0.33456,"Vulnerability in the Oracle Solaris product of Oracle Systems (component: XScreenSaver). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).",2019-10-16,Metasploit/CISA,cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:* CVE-2019-3396,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94472,"The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.",2019-03-25,Metasploit/Nuclei/CISA,cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:* CVE-2019-3398,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.93863,"Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability.",2019-04-18,Nuclei/CISA,cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:* CVE-2019-3401,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.8331,The ManageFilters.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check.,2019-05-22,Nuclei,cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*;cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* CVE-2019-3402,0.0,,0.40693,The ConfigurePortalPages.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the searchOwnerUserName parameter.,2019-05-22,Nuclei,cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*;cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* CVE-2019-3403,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.828,"The /rest/api/2/user/picker rest resource in Jira before version 7.13.3, from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check.",2019-05-22,Nuclei,cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*;cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* CVE-2019-3568,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.36028,"A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.",2019-05-14,CISA,cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*;cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*;cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:tizen:*:*;cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:windows_phone:*:*;cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*;cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:iphone_os:*:* CVE-2019-3799,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,0.91318,"Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.",2019-05-06,Metasploit/Nuclei,cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:spring_cloud_config:*:*:*:*:*:*:*:* CVE-2019-3911,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.06647,Reflected cross-site scripting (XSS) vulnerability in LabKey Server Community Edition before 18.3.0-61806.763 allows an unauthenticated remote attacker to inject arbitrary javascript via the onerror parameter in the /__r2/query endpoints.,2019-01-30,Nuclei,cpe:2.3:a:labkey:labkey_server:*:*:community:*:*:*:*:* CVE-2019-3912,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.14696,An open redirect vulnerability in LabKey Server Community Edition before 18.3.0-61806.763 via the /__r1/ returnURL parameter allows an unauthenticated remote attacker to redirect users to arbitrary web sites.,2019-01-30,Nuclei,cpe:2.3:a:labkey:labkey_server:*:*:*:*:community:*:*:* CVE-2019-3929,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9399,"The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root.",2019-04-30,Metasploit/Nuclei/CISA,cpe:2.3:h:barco:wepresent_wipg-1000p:-:*:*:*:*:*:*:*;cpe:2.3:h:barco:wepresent_wipg-1600w:-:*:*:*:*:*:*:*;cpe:2.3:h:blackbox:hd_wireless_presentation_system:-:*:*:*:*:*:*:*;cpe:2.3:h:crestron:am-100:-:*:*:*:*:*:*:*;cpe:2.3:h:crestron:am-101:-:*:*:*:*:*:*:*;cpe:2.3:h:extron:sharelink_200:-:*:*:*:*:*:*:*;cpe:2.3:h:extron:sharelink_250:-:*:*:*:*:*:*:*;cpe:2.3:h:infocus:liteshow3:-:*:*:*:*:*:*:*;cpe:2.3:h:infocus:liteshow4:-:*:*:*:*:*:*:*;cpe:2.3:h:optoma:wps-pro:-:*:*:*:*:*:*:*;cpe:2.3:h:sharp:pn-l703wa:-:*:*:*:*:*:*:*;cpe:2.3:h:teqavit:wips710:-:*:*:*:*:*:*:*;cpe:2.3:o:barco:wepresent_wipg-1000p_firmware:2.3.0.10:*:*:*:*:*:*:*;cpe:2.3:o:barco:wepresent_wipg-1600w_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:blackbox:hd_wireless_presentation_system_firmware:1.0.0.5:*:*:*:*:*:*:*;cpe:2.3:o:crestron:am-100_firmware:1.6.0.2:*:*:*:*:*:*:*;cpe:2.3:o:crestron:am-101_firmware:2.7.0.2:*:*:*:*:*:*:*;cpe:2.3:o:extron:sharelink_200_firmware:2.0.3.4:*:*:*:*:*:*:*;cpe:2.3:o:extron:sharelink_250_firmware:2.0.3.4:*:*:*:*:*:*:*;cpe:2.3:o:infocus:liteshow3_firmware:1.0.16:*:*:*:*:*:*:*;cpe:2.3:o:infocus:liteshow4_firmware:2.0.0.7:*:*:*:*:*:*:*;cpe:2.3:o:optoma:wps-pro_firmware:1.0.0.5:*:*:*:*:*:*:*;cpe:2.3:o:sharp:pn-l703wa_firmware:1.4.2.3:*:*:*:*:*:*:*;cpe:2.3:o:teqavit:wips710_firmware:1.1.0.7:*:*:*:*:*:*:* CVE-2019-3999,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.16557,"Improper neutralization of special elements used in an OS command in Druva inSync Windows Client 6.5.0 allows a local, unauthenticated attacker to execute arbitrary operating system commands with SYSTEM privileges.",2020-02-25,Metasploit,cpe:2.3:a:druva:insync_client:6.5.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* CVE-2019-4061,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.59878,IBM BigFix Platform 9.2 and 9.5 could allow an attacker to query the relay remotely and gather information about the updates and fixlets deployed to the associated sites due to not enabling authenticated access. IBM X-Force ID: 156869.,2019-02-27,Metasploit,cpe:2.3:a:ibm:bigfix_platform:*:*:*:*:*:*:*:* CVE-2019-4279,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.8408,IBM WebSphere Application Server 8.5 and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially-crafted sequence of serialized objects from untrusted sources. IBM X-Force ID: 160445.,2019-05-17,Metasploit,cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:websphere_application_server:7.0.0.0:*:*:*:*:*:*:* CVE-2019-4716,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.78889,"IBM Planning Analytics 2.0.0 through 2.0.8 is vulnerable to a configuration overwrite that allows an unauthenticated user to login as ""admin"", and then execute code as root or SYSTEM via TM1 scripting. IBM X-Force ID: 172094.",2019-12-18,Metasploit/CISA,cpe:2.3:a:ibm:planning_analytics:*:*:*:*:*:*:*:* CVE-2019-5127,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93074,A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getImage.php is vulnerable to a command injection attack.,2019-10-25,Nuclei,cpe:2.3:a:youphptube:youphptube_encoder:2.3:*:*:*:*:*:*:* CVE-2019-5128,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.90293,A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getImageMP4.php is vulnerable to a command injection attack.,2019-10-25,Nuclei,cpe:2.3:a:youphptube:youphptube_encoder:2.3:*:*:*:*:*:*:* CVE-2019-5129,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.8988,A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getSpiritsFromVideo.php is vulnerable to a command injection attack.,2019-10-25,Nuclei,cpe:2.3:a:youphptube:youphptube_encoder:2.3:*:*:*:*:*:*:* CVE-2019-5418,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.94318,"There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.",2019-03-27,Metasploit/Nuclei/CISA,cpe:2.3:a:redhat:cloudforms:4.6:*:*:*:*:*:*:*;cpe:2.3:a:redhat:cloudforms:4.7:*:*:*:*:*:*:*;cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:* CVE-2019-5420,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93756,"A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.",2019-03-27,Metasploit,cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:6.0.0:beta1:*:*:*:*:*:*;cpe:2.3:a:rubyonrails:rails:6.0.0:beta2:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* CVE-2019-5434,0.0,,0.8809,"An attacker could send a specifically crafted payload to the XML-RPC invocation script and trigger the unserialize() call on the ""what"" parameter in the ""openads.spc"" RPC method. Such vulnerability could be used to perform various types of attacks, e.g. exploit serialize-related PHP vulnerabilities or PHP object injection. It is possible, although unconfirmed, that the vulnerability has been used by some attackers in order to gain access to some Revive Adserver instances and deliver malware through them to third party websites. This vulnerability was addressed in version 4.2.0.",2019-05-06,Nuclei,cpe:2.3:a:revive-sas:revive_adserver:*:*:*:*:*:*:*:* CVE-2019-5544,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93038,OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.,2019-12-06,Nuclei/CISA,cpe:2.3:a:openslp:openslp:*:*:*:*:*:*:*:*;cpe:2.3:a:vmware:horizon_daas:*:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201811001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.0:600-201811401:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:6.7:670-201911001:*:*:*:*:*:* CVE-2019-5591,6.5,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.02564,A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server.,2020-08-14,CISA,cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* CVE-2019-5620,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.79326,ABB MicroSCADA Pro SYS600 version 9.3 suffers from an instance of CWE-306: Missing Authentication for Critical Function.,2020-04-29,Metasploit,cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.3:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* CVE-2019-5645,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,0.87878,"By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being established, or cause a resource exhaustion on the Metasploit server.",2020-09-01,Metasploit,cpe:2.3:a:rapid7:metasploit:*:*:*:*:*:*:*:* CVE-2019-5736,8.6,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H,0.53407,"runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.",2019-02-11,Metasploit,cpe:2.3:a:apache:mesos:*:*:*:*:*:*:*:*;cpe:2.3:a:d2iq:kubernetes_engine:*:*:*:*:*:*:*:*;cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*;cpe:2.3:a:google:kubernetes_engine:-:*:*:*:*:*:*:*;cpe:2.3:a:hp:onesphere:-:*:*:*:*:*:*:*;cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*;cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*;cpe:2.3:a:microfocus:service_management_automation:2018.02:*:*:*:*:*:*:*;cpe:2.3:a:microfocus:service_management_automation:2018.05:*:*:*:*:*:*:*;cpe:2.3:a:microfocus:service_management_automation:2018.08:*:*:*:*:*:*:*;cpe:2.3:a:microfocus:service_management_automation:2018.11:*:*:*:*:*:*:*;cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*;cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*;cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*;cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*;cpe:2.3:a:redhat:container_development_kit:3.7:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openshift:3.4:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openshift:3.5:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openshift:3.6:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openshift:3.7:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*;cpe:2.3:o:d2iq:dc\/os:*:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* CVE-2019-5786,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,0.90519,Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.,2019-06-27,Metasploit/CISA,cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* CVE-2019-5825,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,0.73326,Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,2019-11-25,Metasploit/CISA,cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* CVE-2019-6112,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.30115,A Cross-site scripting (XSS) vulnerability in /inc/class-search.php in the Sell Media plugin v2.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the keyword parameter (aka $search_term or the Search field).,2020-08-14,Nuclei,cpe:2.3:a:graphpaperpress:sell_media:*:*:*:*:*:wordpress:*:* CVE-2019-6223,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.00451,"A logic issue existed in the handling of Group FaceTime calls. The issue was addressed with improved state management. This issue is fixed in iOS 12.1.4, macOS Mojave 10.14.3 Supplemental Update. The initiator of a Group FaceTime call may be able to cause the recipient to answer.",2019-03-05,CISA,cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* CVE-2019-6340,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94438,"Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)",2019-02-21,Metasploit/Nuclei/CISA,cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* CVE-2019-6447,8.1,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,0.80119,"The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.",2019-01-16,Metasploit,cpe:2.3:a:estrongs:es_file_explorer_file_manager:*:*:*:*:*:android:*:* CVE-2019-6693,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,0.74879,"Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS configuration backup file may allow an attacker with access to the backup file to decipher the sensitive data, via knowledge of the hard-coded key. The aforementioned sensitive data includes users' passwords (except the administrator's password), private keys' passphrases and High Availability password (when set).",2019-11-21,CISA,cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:6.2.0:*:*:*:*:*:*:* CVE-2019-6703,0.0,,0.04819,"Incorrect access control in migla_ajax_functions.php in the Calmar Webmedia Total Donations plugin through 2.0.5 for WordPress allows unauthenticated attackers to update arbitrary WordPress option values, leading to site takeover. These attackers can send requests to wp-admin/admin-ajax.php to call the miglaA_update_me action to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator.",2019-01-27,Nuclei,cpe:2.3:a:calmar-webmedia:total_donations:*:*:*:*:*:wordpress:*:* CVE-2019-6715,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.92206,pub/sns.php in the W3 Total Cache plugin before 0.9.4 for WordPress allows remote attackers to read arbitrary files via the SubscribeURL field in SubscriptionConfirmation JSON data.,2019-04-01,Nuclei,cpe:2.3:a:boldgrid:w3_total_cache:*:*:*:*:*:wordpress:*:* CVE-2019-6793,7.0,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L,0.02826,"An issue was discovered in GitLab Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. The Jira integration feature is vulnerable to an unauthenticated blind SSRF issue.",2019-09-09,Nuclei,cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:* CVE-2019-6799,0.0,,0.70652,"An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of ""options(MYSQLI_OPT_LOCAL_INFILE"" calls.",2019-01-26,Nuclei,cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* CVE-2019-6802,0.0,,0.00846,CRLF Injection in pypiserver 1.2.5 and below allows attackers to set arbitrary HTTP headers and possibly conduct XSS attacks via a %0d%0a in a URI.,2019-01-25,Nuclei,cpe:2.3:a:python:pypiserver:*:*:*:*:*:*:*:* CVE-2019-6814,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.66933,"A CWE-287: Improper Authentication vulnerability exists in the NET55XX Encoder with firmware prior to version 2.1.9.7 which could cause impact to confidentiality, integrity, and availability when a remote attacker crafts a malicious request to the encoder webUI.",2019-05-22,Metasploit,cpe:2.3:h:schneider-electric:net5500:-:*:*:*:*:*:*:*;cpe:2.3:h:schneider-electric:net5501-i:-:*:*:*:*:*:*:*;cpe:2.3:h:schneider-electric:net5501-xt:-:*:*:*:*:*:*:*;cpe:2.3:h:schneider-electric:net5501:-:*:*:*:*:*:*:*;cpe:2.3:h:schneider-electric:net5504:-:*:*:*:*:*:*:*;cpe:2.3:h:schneider-electric:net5508:-:*:*:*:*:*:*:*;cpe:2.3:h:schneider-electric:net5516:-:*:*:*:*:*:*:*;cpe:2.3:o:schneider-electric:net5500_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:schneider-electric:net5501-i_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:schneider-electric:net5501-xt_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:schneider-electric:net5501_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:schneider-electric:net5504_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:schneider-electric:net5508_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:schneider-electric:net5516_firmware:*:*:*:*:*:*:*:* CVE-2019-7139,0.0,,0.36426,"An unauthenticated user can execute SQL statements that allow arbitrary read access to the underlying database, which causes sensitive data leakage. This issue is fixed in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2.",2019-04-10,Nuclei,cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*;cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:* CVE-2019-7192,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94071,"This improper access control vulnerability allows remote attackers to gain unauthorized access to the system. To fix these vulnerabilities, QNAP recommend updating Photo Station to their latest versions.",2019-12-05,Metasploit/Nuclei/CISA,cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:*:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.4.1:*:*:*:*:*:*:* CVE-2019-7193,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.44877,"This improper input validation vulnerability allows remote attackers to inject arbitrary code to the system. To fix the vulnerability, QNAP recommend updating QTS to their latest versions.",2019-12-05,CISA,cpe:2.3:o:qnap:qts:4.3.6.0895:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.3.6.0907:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.3.6.0923:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.3.6.0944:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.3.6.0959:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.3.6.0979:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.3.6.0993:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.3.6.1013:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.3.6.1033:-:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.4.1.0948:beta:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.4.1.0949:beta:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.4.1.0978:beta_2:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.4.1.0998:beta_3:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.4.1.0999:beta_3:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.4.1.1031:beta_4:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.4.1.1033:beta_4:*:*:*:*:*:* CVE-2019-7194,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93118,"This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.",2019-12-05,Metasploit/Nuclei/CISA,cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:*:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.4.1:*:*:*:*:*:*:* CVE-2019-7195,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93427,"This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.",2019-12-05,Metasploit/Nuclei/CISA,cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.2.6:*:*:*:*:*:*:*;cpe:2.3:o:qnap:qts:4.4.1:*:*:*:*:*:*:* CVE-2019-7214,0.0,,0.82904,SmarterTools SmarterMail 16.x before build 6985 allows deserialization of untrusted data. An unauthenticated attacker could run commands on the server when port 17001 was remotely accessible. This port is not accessible remotely by default after applying the Build 6985 patch.,2019-04-24,Metasploit,cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:* CVE-2019-7219,0.0,,0.36349,"Unauthenticated reflected cross-site scripting (XSS) exists in Zarafa Webapp 2.0.1.47791 and earlier. NOTE: this is a discontinued product. The issue was fixed in later Zarafa Webapp versions; however, some former Zarafa Webapp customers use the related Kopano product instead.",2019-04-11,Nuclei,cpe:2.3:a:zarafa:webaccess:7.2.0-48204:*:*:*:*:*:*:* CVE-2019-7238,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94184,Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control.,2019-03-21,Nuclei/CISA,cpe:2.3:a:sonatype:nexus:*:*:*:*:*:*:*:* CVE-2019-7254,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.86671,Linear eMerge E3-Series devices allow File Inclusion.,2019-07-02,Nuclei,cpe:2.3:h:nortekcontrol:linear_emerge_elite:-:*:*:*:*:*:*:*;cpe:2.3:h:nortekcontrol:linear_emerge_essential:-:*:*:*:*:*:*:*;cpe:2.3:o:nortekcontrol:linear_emerge_elite_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:nortekcontrol:linear_emerge_essential_firmware:*:*:*:*:*:*:*:* CVE-2019-7255,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.57323,Linear eMerge E3-Series devices allow XSS.,2019-07-02,Nuclei,cpe:2.3:h:nortekcontrol:linear_emerge_elite:-:*:*:*:*:*:*:*;cpe:2.3:h:nortekcontrol:linear_emerge_essential:-:*:*:*:*:*:*:*;cpe:2.3:o:nortekcontrol:linear_emerge_elite_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:nortekcontrol:linear_emerge_essential_firmware:*:*:*:*:*:*:*:* CVE-2019-7256,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94406,Linear eMerge E3-Series devices allow Command Injections.,2019-07-02,Metasploit/Nuclei/CISA,cpe:2.3:h:nortekcontrol:linear_emerge_elite:-:*:*:*:*:*:*:*;cpe:2.3:h:nortekcontrol:linear_emerge_essential:-:*:*:*:*:*:*:*;cpe:2.3:o:nortekcontrol:linear_emerge_elite_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:nortekcontrol:linear_emerge_essential_firmware:*:*:*:*:*:*:*:* CVE-2019-7275,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.57113,Optergy Proton/Enterprise devices allow Open Redirect.,2019-07-01,Nuclei,cpe:2.3:a:optergy:enterprise:*:*:*:*:*:*:*:*;cpe:2.3:a:optergy:proton:*:*:*:*:*:*:*:* CVE-2019-7276,0.0,,0.91817,Optergy Proton/Enterprise devices allow Remote Root Code Execution via a Backdoor Console.,2019-07-01,Metasploit/Nuclei,cpe:2.3:a:optergy:enterprise:*:*:*:*:*:*:*:*;cpe:2.3:a:optergy:proton:*:*:*:*:*:*:*:* CVE-2019-7286,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.01433,"A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.4, macOS Mojave 10.14.3 Supplemental Update. An application may be able to gain elevated privileges.",2019-12-18,CISA,cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* CVE-2019-7287,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.03112,A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.4. An application may be able to execute arbitrary code with kernel privileges.,2019-12-18,CISA,cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* CVE-2019-7315,0.0,,0.52927,"Genie Access WIP3BVAF WISH IP 3MP IR Auto Focus Bullet Camera devices through 3.x are vulnerable to directory traversal via the web interface, as demonstrated by reading /etc/shadow. NOTE: this product is discontinued, and its final firmware version has this vulnerability (4.x versions exist only for other Genie Access products).",2019-06-17,Nuclei,cpe:2.3:h:genieaccess:wip3bvaf:-:*:*:*:*:*:*:*;cpe:2.3:o:genieaccess:wip3bvaf_firmware:*:*:*:*:*:*:*:* CVE-2019-7481,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.9438,Vulnerability in SonicWall SMA100 allow unauthenticated user to gain read-only access to unauthorized resources. This vulnerablity impacted SMA100 version 9.0.0.3 and earlier.,2019-12-17,Nuclei/CISA,cpe:2.3:h:sonicwall:sma_100:-:*:*:*:*:*:*:*;cpe:2.3:o:sonicwall:sma_100_firmware:*:*:*:*:*:*:*:* CVE-2019-7483,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.39938,"In SonicWall SMA100, an unauthenticated Directory Traversal vulnerability in the handleWAFRedirect CGI allows the user to test for the presence of a file on the server.",2019-12-19,CISA,cpe:2.3:h:sonicwall:sma_100:-:*:*:*:*:*:*:*;cpe:2.3:o:sonicwall:sma_100_firmware:*:*:*:*:*:*:*:* CVE-2019-7543,0.0,,0.0286,"In KindEditor 4.1.11, the php/demo.php content1 parameter has a reflected Cross-site Scripting (XSS) vulnerability.",2019-02-06,Nuclei,cpe:2.3:a:kindsoft:kindeditor:4.1.11:*:*:*:*:*:*:* CVE-2019-7609,10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,0.94423,Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.,2019-03-25,Metasploit/Nuclei/CISA,cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:* CVE-2019-8086,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.54798,"Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a xml external entity injection vulnerability. Successful exploitation could lead to sensitive information disclosure.",2019-10-25,Nuclei,cpe:2.3:a:adobe:experience_manager:6.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:experience_manager:6.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:experience_manager:6.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:experience_manager:6.5:*:*:*:*:*:*:* CVE-2019-8390,0.0,,0.02661,qdPM 9.1 suffers from Cross-site Scripting (XSS) in the search[keywords] parameter.,2019-05-14,Nuclei,cpe:2.3:a:qdpm:qdpm:9.1:*:*:*:*:*:*:* CVE-2019-8394,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,0.87936,Zoho ManageEngine ServiceDesk Plus (SDP) before 10.0 build 10012 allows remote attackers to upload arbitrary files via login page customization.,2019-02-17,CISA,cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:*:*:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:-:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:10000:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:10001:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:10002:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:10003:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:10004:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:10005:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:10006:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:10007:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:10008:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:10009:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:10010:*:*:*:*:*:*;cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:10011:*:*:*:*:*:* CVE-2019-8442,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.92613,"The CachingResourceDownloadRewriteRule class in Jira before version 7.13.4, and from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to access files in the Jira webroot under the META-INF directory via a lax path access check.",2019-05-22,Nuclei,cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*;cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* CVE-2019-8446,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.70181,The /rest/issueNav/1/issueTable resource in Jira before version 8.3.2 allows remote attackers to enumerate usernames via an incorrect authorisation check.,2019-08-23,Nuclei,cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* CVE-2019-8449,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,0.68722,The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability.,2019-09-11,Nuclei,cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:* CVE-2019-8451,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N,0.93059,The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.4.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class.,2019-09-11,Nuclei,cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* CVE-2019-8506,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.09339,"A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.",2019-12-18,CISA,cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*;cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*;cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2019-8513,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.11275,This issue was addressed with improved checks. This issue is fixed in macOS Mojave 10.14.4. A local user may be able to execute arbitrary shell commands.,2019-12-18,Metasploit,cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* CVE-2019-8526,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.00349,A use after free issue was addressed with improved memory management. This issue is fixed in macOS Mojave 10.14.4. An application may be able to gain elevated privileges.,2019-12-18,CISA,cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* CVE-2019-8565,7.0,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,0.28731,"A race condition was addressed with additional validation. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4. A malicious application may be able to gain root privileges.",2019-12-18,Metasploit,cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* CVE-2019-8605,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.11864,"A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1. A malicious application may be able to execute arbitrary code with system privileges.",2019-12-18,CISA,cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* CVE-2019-8720,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.08241,A vulnerability was found in WebKit. The flaw is triggered when processing maliciously crafted web content that may lead to arbitrary code execution. Improved memory handling addresses the multiple memory corruption issues.,2023-03-06,CISA,cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:codeready_linux_builder_eus:8.4:*:*:*:*:*:*:*;cpe:2.3:a:redhat:codeready_linux_builder_eus:8.6:*:*:*:*:*:*:*;cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:8.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:8.4:*:*:*:*:*:*:*;cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:8.6:*:*:*:*:*:*:*;cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:8.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*;cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:*;cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:8.0:*:*:*:*:*:*:*;cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*;cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:8.6:*:*:*:*:*:*:*;cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*;cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm64:8.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm64_eus:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_arm64_eus:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* CVE-2019-8903,0.0,,0.47439,index.js in Total.js Platform before 3.2.3 allows path traversal.,2019-02-18,Metasploit/Nuclei,cpe:2.3:a:totaljs:total.js:*:*:*:*:*:node.js:*:* CVE-2019-8937,0.0,,0.50859,"HotelDruid 2.3.0 has XSS affecting the nsextt, cambia1, mese_fine, origine, and anno parameters in creaprezzi.php, tabella3.php, personalizza.php, and visualizza_tabelle.php.",2019-05-17,Nuclei,cpe:2.3:a:digitaldruid:hoteldruid:2.3.0:*:*:*:*:*:*:* CVE-2019-8942,0.0,,0.92722,"WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.",2019-02-20,Metasploit,cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:5.0:-:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:5.0:beta1:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:5.0:beta2:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:5.0:beta3:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:5.0:beta4:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:5.0:beta5:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:5.0:rc1:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:5.0:rc2:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:5.0:rc3:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2019-8943,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,0.93913,"WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.",2019-02-20,Metasploit/Nuclei,cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* CVE-2019-8982,0.0,,0.81061,"com/wavemaker/studio/StudioService.java in WaveMaker Studio 6.6 mishandles the studioService.download?method=getContent&inUrl= value, leading to disclosure of local files and SSRF.",2019-02-21,Nuclei,cpe:2.3:a:wavemaker:wavemarker_studio:6.6:*:*:*:*:*:*:* CVE-2019-9041,0.0,,0.85674,"An issue was discovered in ZZZCMS zzzphp V1.6.1. In the inc/zzz_template.php file, the parserIfLabel() function's filtering is not strict, resulting in PHP code execution, as demonstrated by the if:assert substring.",2019-02-23,Nuclei,cpe:2.3:a:zzzcms:zzzphp:1.6.1:*:*:*:*:*:*:* CVE-2019-9055,0.0,,0.41254,"An issue was discovered in CMS Made Simple 2.2.8. In the module DesignManager (in the files action.admin_bulk_css.php and action.admin_bulk_template.php), with an unprivileged user with Designer permission, it is possible reach an unserialize call with a crafted value in the m1_allparms parameter, and achieve object injection.",2019-03-26,Metasploit,cpe:2.3:a:cmsmadesimple:cms_made_simple:*:*:*:*:*:*:*:* CVE-2019-9082,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.94139,"ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= followed by the command.",2019-02-24,Metasploit/CISA,cpe:2.3:a:opensourcebms:open_source_background_management_system:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*;cpe:2.3:a:zzzcms:zzzphp:1.6.1:*:*:*:*:*:*:* CVE-2019-9193,0.0,,0.93716,"In PostgreSQL 9.3 through 11.2, the ""COPY TO/FROM PROGRAM"" function allows superusers and users in the 'pg_execute_server_program' group to execute arbitrary code in the context of the database's operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. NOTE: Third parties claim/state this is not an issue because PostgreSQL functionality for ‘COPY TO/FROM PROGRAM’ is acting as intended. References state that in PostgreSQL, a superuser can execute commands as the server user without using the ‘COPY FROM PROGRAM’.",2019-04-01,Metasploit/Nuclei,cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* CVE-2019-9194,0.0,,0.90113,elFinder before 2.1.48 has a command injection vulnerability in the PHP connector.,2019-02-26,Metasploit/Nuclei,cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:* CVE-2019-9213,5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,0.05832,"In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.",2019-03-05,Metasploit,cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* CVE-2019-9618,0.0,,0.8082,"The GraceMedia Media Player plugin 1.0 for WordPress allows Local File Inclusion via the ""cfg"" parameter.",2019-05-13,Nuclei,cpe:2.3:a:gracemedia_media_player_project:gracemedia_media_player:1.0:*:*:*:*:wordpress:*:* CVE-2019-9621,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.93875,"Zimbra Collaboration Suite before 8.6 patch 13, 8.7.x before 8.7.11 patch 10, and 8.8.x before 8.8.10 patch 7 or 8.8.x before 8.8.11 patch 3 allows SSRF via the ProxyServlet component.",2019-04-30,Metasploit/Nuclei/CISA,cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:-:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch10:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch11:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch12:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch1:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch2:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch3:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch4:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch5:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch6:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch7:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch8:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch9:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:-:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch10:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch1:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch2:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch3:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch4:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch5:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch6:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch7:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch8:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch9:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:-:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:patch1:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:patch2:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:patch3:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:patch4:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:patch6:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:patch7:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.11:-:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.11:patch1:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.11:patch2:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.11:patch3:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:-:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:p5:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch1:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch2:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch3:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch4:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch6:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch7:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch8:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch9:*:*:*:*:*:* CVE-2019-9624,0.0,,0.51667,"Webmin 1.900 allows remote attackers to execute arbitrary code by leveraging the ""Java file manager"" and ""Upload and Download"" privileges to upload a crafted .cgi file via the /updown/upload.cgi URI.",2019-03-07,Metasploit,cpe:2.3:a:webmin:webmin:1.900:*:*:*:*:*:*:* CVE-2019-9632,0.0,,0.591,ESAFENET CDG V3 and V5 has an arbitrary file download vulnerability via the fileName parameter in download.jsp because the InstallationPack parameter is mishandled in a /CDGServer3/ClientAjax request.,2019-03-08,Nuclei,cpe:2.3:a:esafenet:electronic_document_security_management_system:v3:*:*:*:*:*:*:*;cpe:2.3:a:esafenet:electronic_document_security_management_system:v5:*:*:*:*:*:*:* CVE-2019-9670,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.9443,"mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML External Entity injection (XXE) vulnerability, as demonstrated by Autodiscover/Autodiscover.xml.",2019-05-29,Metasploit/Nuclei/CISA,cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:-:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:p1:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:p2:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:p3:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:p4:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:p5:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:p6:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:p7:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:p8:*:*:*:*:*:*;cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:p9:*:*:*:*:*:* CVE-2019-9692,0.0,,0.54657,"class.showtime2_image.php in CMS Made Simple (CMSMS) before 2.2.10 does not ensure that a watermark file has a standard image file extension (GIF, JPG, JPEG, or PNG).",2019-03-11,Metasploit,cpe:2.3:a:cmsmadesimple:cms_made_simple:*:*:*:*:*:*:*:* CVE-2019-9726,0.0,,0.49616,Directory Traversal / Arbitrary File Read in eQ-3 AG Homematic CCU3 3.43.15 and earlier allows remote attackers to read arbitrary files of the device's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.,2019-05-13,Nuclei,cpe:2.3:h:eq-3:ccu3:-:*:*:*:*:*:*:*;cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:* CVE-2019-9733,0.0,,0.91857,"An issue was discovered in JFrog Artifactory 6.7.3. By default, the access-admin account is used to reset the password of the admin account in case an administrator gets locked out from the Artifactory console. This is only allowable from a connection directly from localhost, but providing a X-Forwarded-For HTTP header to the request allows an unauthenticated user to login with the default credentials of the access-admin account while bypassing the whitelist of allowed IP addresses. The access-admin account can use Artifactory's API to request authentication tokens for all users including the admin account and, in turn, assume full control of all artifacts and repositories managed by Artifactory.",2019-04-11,Nuclei,cpe:2.3:a:jfrog:artifactory:6.7.3:*:*:*:*:*:*:* CVE-2019-9757,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.74097,An issue was discovered in LabKey Server 19.1.0. Sending an SVG containing an XXE payload to the endpoint visualization-exportImage.view or visualization-exportPDF.view allows local files to be read.,2019-10-29,Nuclei,cpe:2.3:a:labkey:labkey_server:19.1.0:*:*:*:*:*:*:* CVE-2019-9762,0.0,,0.51435,A SQL Injection was discovered in PHPSHE 1.7 in include/plugin/payment/alipay/pay.php with the parameter id. The vulnerability does not need any authentication.,2019-03-14,Nuclei,cpe:2.3:a:phpshe:phpshe:1.7:*:*:*:*:*:*:* CVE-2019-9851,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.85954,"LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from document event script handers, e.g. mouse over. However LibreOffice also has a separate feature where documents can specify that pre-installed scripts can be executed on various global script events such as document-open, etc. In the fixed versions, global script event handlers are validated equivalently to document script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.",2019-08-15,Metasploit,cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* CVE-2019-9858,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.80409,"Remote code execution was discovered in Horde Groupware Webmail 5.2.22 and 5.2.17. Horde/Form/Type.php contains a vulnerable class that handles image upload in forms. When the Horde_Form_Type_image method onSubmit() is called on uploads, it invokes the functions getImage() and _getUpload(), which uses unsanitized user input as a path to save the image. The unsanitized POST parameter object[photo][img][file] is saved in the $upload[img][file] PHP variable, allowing an attacker to manipulate the $tmp_file passed to move_uploaded_file() to save the uploaded file. By setting the parameter to (for example) ../usr/share/horde/static/bd.php, one can write a PHP backdoor inside the web root. The static/ destination folder is a good candidate to drop the backdoor because it is always writable in Horde installations. (The unsanitized POST parameter went probably unnoticed because it's never submitted by the forms, which default to securely using a random path.)",2019-05-29,Metasploit,cpe:2.3:a:horde:groupware:5.2.17:*:*:*:webmail:*:*:*;cpe:2.3:a:horde:groupware:5.2.22:*:*:*:webmail:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* CVE-2019-9874,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.2505,Deserialization of Untrusted Data in the Sitecore.Security.AntiCSRF (aka anti CSRF) module in Sitecore CMS 7.0 to 7.2 and Sitecore XP 7.5 to 8.2 allows an unauthenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN.,2019-05-31,CISA,cpe:2.3:a:sitecore:cms:*:*:*:*:*:*:*:*;cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:* CVE-2019-9875,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.13639,Deserialization of Untrusted Data in the anti CSRF module in Sitecore through 9.1 allows an authenticated attacker to execute arbitrary code by sending a serialized .NET object in an HTTP POST parameter.,2019-05-31,CISA,cpe:2.3:a:sitecore:cms:*:*:*:*:*:*:*:* CVE-2019-9879,0.0,,0.60924,"The WPGraphQL 0.2.3 plugin for WordPress allows remote attackers to register a new user with admin privileges, whenever new user registrations are allowed. This is related to the registerUser mutation.",2019-06-10,Nuclei,cpe:2.3:a:wpengine:wpgraphql:0.2.3:*:*:*:*:wordpress:*:* CVE-2019-9880,0.0,,0.48585,"An issue was discovered in the WPGraphQL 0.2.3 plugin for WordPress. By querying the 'users' RootQuery, it is possible, for an unauthenticated attacker, to retrieve all WordPress users details such as email address, role, and username.",2019-06-10,Nuclei,cpe:2.3:a:wpengine:wpgraphql:0.2.3:*:*:*:*:wordpress:*:* CVE-2019-9881,0.0,,0.1924,"The createComment mutation in the WPGraphQL 0.2.3 plugin for WordPress allows unauthenticated users to post comments on any article, even when 'allow comment' is disabled.",2019-06-10,Nuclei,cpe:2.3:a:wpengine:wpgraphql:0.2.3:*:*:*:*:wordpress:*:* CVE-2019-9912,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.00753,The wp-google-maps plugin before 7.10.43 for WordPress has XSS via the wp-admin/admin.php PATH_INFO.,2019-03-22,Nuclei,cpe:2.3:a:codecabin:wp_go_maps:*:*:*:*:*:wordpress:*:* CVE-2019-9915,0.0,,0.08964,GetSimpleCMS 3.3.13 has an Open Redirect via the admin/index.php redirect parameter.,2019-03-22,Nuclei,cpe:2.3:a:get-simple.:getsimplecms:3.3.13:*:*:*:*:*:*:* CVE-2019-9922,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.87141,An issue was discovered in the Harmis JE Messenger component 1.2.2 for Joomla!. Directory Traversal allows read access to arbitrary files.,2019-03-29,Nuclei,cpe:2.3:a:harmistechnology:je_messenger:1.2.2:*:*:*:*:joomla\!:*:* CVE-2019-9955,0.0,,0.17999,"On Zyxel ATP200, ATP500, ATP800, USG20-VPN, USG20W-VPN, USG40, USG40W, USG60, USG60W, USG110, USG210, USG310, USG1100, USG1900, USG2200-VPN, ZyWALL 110, ZyWALL 310, ZyWALL 1100 devices, the security firewall login page is vulnerable to Reflected XSS via the unsanitized 'mp_idx' parameter.",2019-04-22,Nuclei,cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg1100:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg110:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg1900:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg20w-vpn:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg210:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg2200-vpn:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg310:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg40:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg40w:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg60:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:usg60w:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:zywall_1100:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:zywall_110:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:zywall_310:-:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:atp200_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:atp500_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:atp800_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg1100_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg110_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg1900_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg20-vpn_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg20w-vpn_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg210_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg2200-vpn_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg310_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg40_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg40w_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg60_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:usg60w_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:vpn100_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:vpn300_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:vpn50_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:zywall_1100_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:zywall_110_firmware:4.31:*:*:*:*:*:*:*;cpe:2.3:o:zyxel:zywall_310_firmware:4.31:*:*:*:*:*:*:* CVE-2019-9960,0.0,,0.70082,The downloadZip function in application/controllers/admin/export.php in LimeSurvey through 3.16.1+190225 allows a relative path.,2019-03-24,Metasploit,cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:* CVE-2019-9978,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,0.88097,"The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro.",2019-03-24,Nuclei/CISA,cpe:2.3:a:warfareplugins:social_warfare:*:*:*:*:*:wordpress:*:*;cpe:2.3:a:warfareplugins:social_warfare_pro:*:*:*:*:*:wordpress:*:* CVE-2020-0041,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.23881,"In binder_transaction of binder.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-145988638References: Upstream kernel",2020-03-10,CISA,cpe:2.3:o:google:android:-:*:*:*:*:*:*:* CVE-2020-0069,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.00736,"In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754",2020-03-10,CISA,cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:columbia-al10b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:columbia-tl00b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:columbia-tl00d:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:cornell-al00a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:cornell-tl10b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:dura-al00a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:jakarta-al00a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:katyusha-al00a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:katyusha-al10a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:madrid-al00a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:nova_4:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:paris-l29b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:sydney-tl00:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*;cpe:2.3:h:huawei:yalep-al10b:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:columbia-al10b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:columbia-tl00b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:columbia-tl00d_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:cornell-al00a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:jakarta-al00a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:katyusha-al00a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:katyusha-al10a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:madrid-al00a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:nova_3_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:nova_4_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:paris-l29b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:princeton-al10b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:sydney-al00_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:sydney-tl00_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:sydneym-al00_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:tony-al00b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:tony-tl00b_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:yale-al00a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:huawei:yalep-al10b_firmware:*:*:*:*:*:*:*:* CVE-2020-0601,8.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N,0.94044,"A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.",2020-01-14,CISA,cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2020-0618,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.94252,"A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests, aka 'Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability'.",2020-02-11,Metasploit/Nuclei/CISA,cpe:2.3:a:microsoft:sql_server:2012:sp4:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2014:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2016:sp2:*:*:*:*:x64:* CVE-2020-0638,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.07845,"An elevation of privilege vulnerability exists in the way the Update Notification Manager handles files.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Update Notification Manager Elevation of Privilege Vulnerability'.",2020-01-14,CISA,cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2020-0646,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93121,"A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.",2020-01-14,Metasploit/CISA,cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* CVE-2020-0668,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.79394,"An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0669, CVE-2020-0670, CVE-2020-0671, CVE-2020-0672.",2020-02-11,Metasploit,cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2020-0674,7.5,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,0.93744,"A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.",2020-02-11,CISA,cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2020-0683,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.24843,"An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0686.",2020-02-11,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2020-0688,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.94378,"A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'.",2020-02-11,Metasploit/CISA,cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_30:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_14:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_15:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_3:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_4:*:*:*:*:*:* CVE-2020-0787,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.59747,"An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.",2020-03-12,Metasploit/CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2020-0796,10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,0.94438,"A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.",2020-03-12,Metasploit/Nuclei/CISA,cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:x64:* CVE-2020-0878,4.2,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N,0.26832,"

A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, the attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

An attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft browsers, and then convince a user to view the website. The attacker could also take advantage of compromised websites, or websites that accept or host user-provided content or advertisements, by adding specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically via an enticement in email or instant message, or by getting them to open an email attachment.

The security update addresses the vulnerability by modifying how Microsoft browsers handle objects in memory.

",2020-09-11,CISA,cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2020-0938,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.87837,"A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1020.",2020-04-15,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2020-0968,7.5,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,0.49813,"A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0970.",2020-04-15,CISA,cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2020-0986,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.19295,"An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.",2020-06-09,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2004:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2020-10148,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94345,"The SolarWinds Orion API is vulnerable to an authentication bypass that could allow a remote attacker to execute API commands. This vulnerability could allow a remote attacker to bypass authentication and execute API commands which may result in a compromise of the SolarWinds instance. SolarWinds Orion Platform versions 2019.4 HF 5, 2020.2 with no hotfix installed, and 2020.2 HF 1 are affected.",2020-12-29,Nuclei/CISA,cpe:2.3:a:solarwinds:orion_platform:2019.4:hotfix5:*:*:*:*:*:*;cpe:2.3:a:solarwinds:orion_platform:2020.2.1:hotfix1:*:*:*:*:*:*;cpe:2.3:a:solarwinds:orion_platform:2020.2:-:*:*:*:*:*:* CVE-2020-10181,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.29896,"goform/formEMR30 in Sumavision Enhanced Multimedia Router (EMR) 3.0.4.27 allows creation of arbitrary users with elevated privileges (administrator) on a device, as demonstrated by a setString=new_user<*1*>administrator<*1*>123456 request.",2020-03-11,CISA,cpe:2.3:h:sumavision:enhanced_multimedia_router:-:*:*:*:*:*:*:*;cpe:2.3:o:sumavision:enhanced_multimedia_router_firmware:3.0.4.27:*:*:*:*:*:*:* CVE-2020-10189,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94248,Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet and MDMLogUploaderServlet servlets.,2020-03-06,Metasploit/Nuclei/CISA,cpe:2.3:a:zohocorp:manageengine_desktop_central:*:*:*:*:*:*:*:* CVE-2020-10199,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.94379,Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).,2020-04-01,Metasploit/Nuclei/CISA,cpe:2.3:a:sonatype:nexus:*:*:*:*:*:*:*:* CVE-2020-1020,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,0.88706,"A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0938.",2020-04-15,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2020-10220,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.94024,An issue was discovered in rConfig through 3.9.4. The web interface is prone to a SQL injection via the commands.inc.php searchColumn parameter.,2020-03-07,Metasploit/Nuclei,cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:* CVE-2020-10221,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.9106,lib/ajaxHandlers/ajaxAddTemplate.php in rConfig through 3.94 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the fileName POST parameter.,2020-03-08,CISA,cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:* CVE-2020-1027,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.14351,"An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0913, CVE-2020-1000, CVE-2020-1003.",2020-04-15,CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2020-1040,9.0,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,0.00431,"A remote code execution vulnerability exists when Hyper-V RemoteFX vGPU on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1032, CVE-2020-1036, CVE-2020-1041, CVE-2020-1042, CVE-2020-1043.",2020-07-14,CISA,cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* CVE-2020-1048,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.749,"An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1070.",2020-05-21,Metasploit,cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2020-1054,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.75455,"An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1143.",2020-05-21,Metasploit/CISA,cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* CVE-2020-10546,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.91387,"rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.",2020-06-04,Nuclei,cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:* CVE-2020-10547,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.89969,"rConfig 3.9.4 and previous versions has unauthenticated compliancepolicyelements.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.",2020-06-04,Nuclei,cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:* CVE-2020-10548,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.89969,"rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.",2020-06-04,Nuclei,cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:* CVE-2020-10549,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.91617,"rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.",2020-06-04,Nuclei,cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:* CVE-2020-10644,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.20891,"The affected product lacks proper validation of user-supplied data, which can result in deserialization of untrusted data on the Ignition 8 Gateway (versions prior to 8.0.10) and Ignition 7 Gateway (versions prior to 7.9.14), allowing an attacker to obtain sensitive information.",2020-06-09,Metasploit,cpe:2.3:a:inductiveautomation:ignition_gateway:*:*:*:*:*:*:*:* CVE-2020-10770,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,0.92282,"A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.",2020-12-15,Nuclei,cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:* CVE-2020-10808,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.86469,"Vesta Control Panel (VestaCP) through 0.9.8-26 allows Command Injection via the schedule/backup Backup Listing Endpoint. The attacker must be able to create a crafted filename on the server, as demonstrated by an FTP session that renames .bash_logout to a .bash_logout' substring followed by shell metacharacters.",2020-03-22,Metasploit,cpe:2.3:a:vestacp:vesta_control_panel:*:*:*:*:*:*:*:* CVE-2020-10882,8.8,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.45816,"This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the tdpServer service, which listens on UDP port 20002 by default. When parsing the slave_mac parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the root user. Was ZDI-CAN-9650.",2020-03-25,Metasploit,cpe:2.3:h:tp-link:ac1750:-:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:ac1750_firmware:190726:*:*:*:*:*:*:* CVE-2020-10883,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,0.02605,This vulnerability allows local attackers to escalate privileges on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the file system. The issue lies in the lack of proper permissions set on the file system. An attacker can leverage this vulnerability to escalate privileges. Was ZDI-CAN-9651.,2020-03-25,Metasploit,cpe:2.3:h:tp-link:ac1750:-:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:ac1750_firmware:190726:*:*:*:*:*:*:* CVE-2020-10884,8.8,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.29001,"This vulnerability allows network-adjacent attackers execute arbitrary code on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the tdpServer service, which listens on UDP port 20002 by default. This issue results from the use of hard-coded encryption key. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-9652.",2020-03-25,Metasploit,cpe:2.3:h:tp-link:ac1750:-:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:ac1750_firmware:190726:*:*:*:*:*:*:* CVE-2020-10914,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.79592,"This vulnerability allows remote attackers to execute arbitrary code on affected installations of VEEAM One Agent 9.5.4.4587. Authentication is not required to exploit this vulnerability. The specific flaw exists within the PerformHandshake method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-10400.",2020-04-22,Metasploit,cpe:2.3:a:veeam:one:9.5.4.4587:*:*:*:*:*:*:* CVE-2020-10915,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.83865,"This vulnerability allows remote attackers to execute arbitrary code on affected installations of VEEAM One Agent 9.5.4.4587. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HandshakeResult method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-10401.",2020-04-22,Metasploit,cpe:2.3:a:veeam:one:9.5.4.4587:*:*:*:*:*:*:* CVE-2020-10923,8.8,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.43601,"This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000. A crafted UPnP message can be used to bypass authentication. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-9642.",2020-07-28,Metasploit,cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r6700_firmware:1.0.4.84_10.0.58:*:*:*:*:*:*:* CVE-2020-10924,8.8,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.51955,"This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9643.",2020-07-28,Metasploit,cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:r6700_firmware:1.0.4.84_10.0.58:*:*:*:*:*:*:* CVE-2020-10973,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,0.25226,"An issue was discovered in Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 affecting /cgi-bin/ExportAllSettings.sh where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available.",2020-05-07,Nuclei,cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*;cpe:2.3:h:wavlink:wn531g3:-:*:*:*:*:*:*:*;cpe:2.3:h:wavlink:wn533a8:-:*:*:*:*:*:*:*;cpe:2.3:h:wavlink:wn551k1:-:*:*:*:*:*:*:*;cpe:2.3:o:wavlink:wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:*;cpe:2.3:o:wavlink:wn531g3_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:wavlink:wn533a8_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:wavlink:wn551k1_firmware:-:*:*:*:*:*:*:* CVE-2020-10977,5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,0.05872,GitLab EE/CE 8.5 to 12.9 is vulnerable to a an path traversal when moving an issue between projects.,2020-04-08,Metasploit,cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*;cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:* CVE-2020-10987,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,0.93271,The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.,2020-07-13,Nuclei/CISA,cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*;cpe:2.3:o:tenda:ac15_firmware:15.03.05.19:*:*:*:*:*:*:* CVE-2020-11023,6.9,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N,0.21319,"In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing