CVE
stringlengths 13
16
| CVSS Score
float64 0
10
| CVSS_Vector
stringclasses 257
values | EPSS
float64 0
0.95
| Description
stringlengths 28
3.79k
| Published
stringdate 1990-08-14 00:00:00
2025-10-05 00:00:00
| Source
stringclasses 7
values | CPE
stringlengths 33
51k
⌀ |
|---|---|---|---|---|---|---|---|
CVE-2004-0326
| 0
| null | 0.79778
|
Buffer overflow in the web proxy for GateKeeper Pro 4.7 allows remote attackers to execute arbitrary code via a long GET request.
|
2004-11-23
|
Metasploit
|
cpe:2.3:a:proxy-pro:professional_gatekeeper:4.7:*:*:*:*:*:*:*
|
CVE-2004-0330
| 0
| null | 0.83139
|
Buffer overflow in Serv-U ftp before 5.0.0.4 allows remote authenticated users to execute arbitrary code via a long time zone argument to the MDTM command.
|
2004-11-23
|
Metasploit
|
cpe:2.3:a:solarwinds:serv-u_file_server:*:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:4.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.3:*:*:*:*:*:*:*
|
CVE-2004-0331
| 0
| null | 0.67532
|
Heap-based buffer overflow in Dell OpenManage Web Server 3.4.0 allows remote attackers to cause a denial of service (crash) via a HTTP POST with a long application variable.
|
2004-11-23
|
Metasploit
|
cpe:2.3:a:dell:openmanage:3.2:*:*:*:*:*:*:*;cpe:2.3:a:dell:openmanage:3.4:*:*:*:*:*:*:*;cpe:2.3:a:dell:openmanage:3.7.1:*:*:*:*:*:*:*;cpe:2.3:a:dell:openmanage:3.7:*:*:*:*:*:*:*
|
CVE-2004-0362
| 0
| null | 0.83404
|
Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.
|
2004-04-15
|
Metasploit
|
cpe:2.3:a:iss:blackice_agent_server:3.6ebz:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6eca:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6ecb:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6ecc:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6ecd:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6ece:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6ecf:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6cbz:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6cca:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6ccb:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6ccc:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6ccd:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6cce:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6ccf:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6cbz:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6cca:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6ccb:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6ccc:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6ccd:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6cce:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6ccf:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6ebz:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6eca:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6ecb:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6ecd:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6ece:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6ecf:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0eba:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebf:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebg:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebh:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebj:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebk:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebl:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ebz:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6eca:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ecb:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ecc:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ecd:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ece:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ecf:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_network_sensor:7.0:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_20.11:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_22.10:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_22.4:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_22.9:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ebz:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6eca:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ecb:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ecc:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ecd:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ece:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ecf:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.0.1_win_sr1.1:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.0:*:windows:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5:*:windows:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5:sr3.2:windows:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5:sr3.3:windows:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.10:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.1:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.4:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.5:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.6:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.7:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.8:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.9:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.10:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.11:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.1:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.2:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.3:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.4:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.5:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.6:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.7:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.8:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.9:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:20.11:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.10:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.1:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.2:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.3:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.4:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.5:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.6:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.7:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.8:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.9:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.10:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.11:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.1:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.2:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.3:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.4:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.5:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.6:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.7:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.8:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.9:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.1:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.2:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.3:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.4:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.5:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.6:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.7:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.8:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.9:*:*:*:*:*:*:*
|
CVE-2004-0363
| 0
| null | 0.72679
|
Stack-based buffer overflow in the SymSpamHelper ActiveX component (symspam.dll) in Norton AntiSpam 2004, as used in Norton Internet Security 2004, allows remote attackers to execute arbitrary code via a long parameter to the LaunchCustomRuleWizard method.
|
2004-04-15
|
Metasploit
|
cpe:2.3:a:symantec:norton_antispam:2004:*:*:*:*:*:*:*
|
CVE-2004-0397
| 0
| null | 0.86588
|
Stack-based buffer overflow during the apr_time_t data conversion in Subversion 1.0.2 and earlier allows remote attackers to execute arbitrary code via a (1) DAV2 REPORT query or (2) get-dated-rev svn-protocol command.
|
2004-07-07
|
Metasploit
|
cpe:2.3:a:subversion:subversion:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:subversion:subversion:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:subversion:subversion:1.0:*:*:*:*:*:*:*
|
CVE-2004-0430
| 0
| null | 0.80742
|
Stack-based buffer overflow in AppleFileServer for Mac OS X 10.3.3 and earlier allows remote attackers to execute arbitrary code via a LoginExt packet for a Cleartext Password User Authentication Method (UAM) request with a PathName argument that includes an AFPName type string that is longer than the associated length field.
|
2004-07-07
|
Metasploit
|
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
|
CVE-2004-0437
| 0
| null | 0.06794
|
Titan FTP Server version 3.01 build 163, and possibly other versions before build 169, allows remote authenticated users to cause a denial of service (crash) by disconnecting from the system during a "LIST -L" command, which causes Titan to access an invalid socket.
|
2004-07-07
|
Nuclei
|
cpe:2.3:a:south_river_technologies:titan_ftp_server:3.01_build_163:*:*:*:*:*:*:*
|
CVE-2004-0519
| 0
| null | 0.00124
|
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.
|
2004-08-18
|
Nuclei
|
cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*
|
CVE-2004-0541
| 0
| null | 0.78284
|
Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).
|
2004-08-06
|
Metasploit
|
cpe:2.3:a:national_science_foundation:squid_web_proxy_cache:2.5_stable:*:*:*:*:*:*:*;cpe:2.3:a:national_science_foundation:squid_web_proxy_cache:3_pre:*:*:*:*:*:*:*
|
CVE-2004-0608
| 0
| null | 0.60179
|
The Unreal Engine, as used in DeusEx 1.112fm and earlier, Devastation 390 and earlier, Mobile Forces 20000 and earlier, Nerf Arena Blast 1.2 and earlier, Postal 2 1337 and earlier, Rune 107 and earlier, Tactical Ops 3.4.0 and earlier, Unreal 1 226f and earlier, Unreal II XMP 7710 and earlier, Unreal Tournament 451b and earlier, Unreal Tournament 2003 2225 and earlier, Unreal Tournament 2004 before 3236, Wheel of Time 333b and earlier, and X-com Enforcer, allows remote attackers to execute arbitrary code via a UDP packet containing a secure query with a long value, which overwrites memory.
|
2004-12-06
|
Metasploit
|
cpe:2.3:a:arush:devastation:390.0:*:*:*:*:*:*:*;cpe:2.3:a:dreamforge:tnn_outdoors_pro_hunter:*:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_engine:226f:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_engine:433:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_engine:436:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament:451b:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2003:2199_linux:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2003:2199_macos:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2003:2199_win32:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2003:2225_macos:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2003:2225_win32:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2004:macos:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2004:win32:*:*:*:*:*:*:*;cpe:2.3:a:infogrames:tacticalops:3.4:*:*:*:*:*:*:*;cpe:2.3:a:infogrames:x-com_enforcer:*:*:*:*:*:*:*:*;cpe:2.3:a:ion_storm:deusex:1.112_fm:*:*:*:*:*:*:*;cpe:2.3:a:nerf_arena_blast:nerf_arena_blast:1.2:*:*:*:*:*:*:*;cpe:2.3:a:rage_software:mobile_forces:20000.0:*:*:*:*:*:*:*;cpe:2.3:a:robert_jordan:wheel_of_time:333.0b:*:*:*:*:*:*:*;cpe:2.3:a:running_with_scissors:postal_2:1337:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*
|
CVE-2004-0636
| 0
| null | 0.78516
|
Buffer overflow in the goaway function in the aim:goaway URI handler for AOL Instant Messenger (AIM) 5.5, including 5.5.3595, allows remote attackers to execute arbitrary code via a long Away message.
|
2004-11-23
|
Metasploit
|
cpe:2.3:a:aol:instant_messenger:5.5.3415_beta:*:*:*:*:*:*:*;cpe:2.3:a:aol:instant_messenger:5.5.3595:*:*:*:*:*:*:*;cpe:2.3:a:aol:instant_messenger:5.5:*:*:*:*:*:*:*
|
CVE-2004-0656
| 0
| null | 0.00739
|
The accept_client function in PureFTPd 1.0.18 and earlier allows remote attackers to cause a denial of service by exceeding the maximum number of connections.
|
2004-08-06
|
Nuclei
|
cpe:2.3:a:pureftpd:pureftpd:0.96:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.11:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.12:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.13a:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.14:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.15:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.16:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.16a:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.16b:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.16c:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.17a:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.18:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0:*:*:*:*:*:*:*
|
CVE-2004-0695
| 0
| null | 0.7912
|
Stack-based buffer overflow in the FTP service for 4D WebSTAR 5.3.2 and earlier allows remote attackers to execute arbitrary code via a long FTP command.
|
2004-07-27
|
Metasploit
|
cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*
|
CVE-2004-0735
| 0
| null | 0.74364
|
Buffer overflow in Medal of Honor (1) Allied Assault 1.11v9 and earlier, (2) Breakthrough 2.40b and earlier, and (3) Spearhead 2.15 and earlier, when playing on a Local Area Network (LAN), allows remote attackers to execute arbitrary code via vectors such as (1) the getinfo query, (2) the connect packet, and other unknown vectors.
|
2004-07-27
|
Metasploit
|
cpe:2.3:a:electronic_arts:medal_of_honor_allied_assault:1.0:*:*:*:*:*:*:*;cpe:2.3:a:electronic_arts:medal_of_honor_allied_assault:1.11_v9:*:*:*:*:*:*:*;cpe:2.3:a:electronic_arts:medal_of_honor_allied_assault:1.1:*:*:*:*:*:*:*;cpe:2.3:a:electronic_arts:medal_of_honor_allied_assault:breakthrough_2.40_b:*:*:*:*:*:*:*;cpe:2.3:a:electronic_arts:medal_of_honor_allied_assault:spearhead_2.15:*:*:*:*:*:*:*
|
CVE-2004-0795
| 0
| null | 0.31914
|
DB2 8.1 remote command server (DB2RCMD.EXE) executes the db2rcmdc.exe program as the db2admin administrator, which allows local users to gain privileges via the DB2REMOTECMD named pipe.
|
2004-10-20
|
Metasploit
|
cpe:2.3:a:ibm:db2_universal_database:8.1:*:aix:*:*:*:*:*
|
CVE-2004-0798
| 0
| null | 0.72637
|
Buffer overflow in the _maincfgret.cgi script for Ipswitch WhatsUp Gold before 8.03 Hotfix 1 allows remote attackers to execute arbitrary code via a long instancename parameter.
|
2004-10-20
|
Metasploit
|
cpe:2.3:a:progress:whatsup_gold:7.03:*:*:*:*:*:*:*;cpe:2.3:a:progress:whatsup_gold:7.04:*:*:*:*:*:*:*;cpe:2.3:a:progress:whatsup_gold:7.0:*:*:*:*:*:*:*;cpe:2.3:a:progress:whatsup_gold:8.01:*:*:*:*:*:*:*;cpe:2.3:a:progress:whatsup_gold:8.03:*:*:*:*:*:*:*;cpe:2.3:a:progress:whatsup_gold:8.0:*:*:*:*:*:*:*
|
CVE-2004-0964
| 0
| null | 0.85695
|
Buffer overflow in Zinf 2.2.1 on Windows, and other older versions for Linux, allows remote attackers or local users to execute arbitrary code via certain values in a .pls file.
|
2005-02-09
|
Metasploit
|
cpe:2.3:a:zinf:zinf:2.2.1:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
|
CVE-2004-1037
| 0
| null | 0.85829
|
The search function in TWiki 20030201 allows remote attackers to execute arbitrary commands via shell metacharacters in a search string.
|
2005-03-01
|
Metasploit
|
cpe:2.3:a:twiki:twiki:2003-02-01:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
|
CVE-2004-1080
| 0
| null | 0.89333
|
The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."
|
2005-01-10
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:2000:*:small_business_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:2003:*:small_business_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:terminal_server:*:*:*:*:*
|
CVE-2004-1134
| 0
| null | 0.8642
|
Buffer overflow in the Microsoft W3Who ISAPI (w3who.dll) allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long query string.
|
2005-01-10
|
Metasploit
|
cpe:2.3:a:microsoft:w3who.dll:*:*:*:*:*:*:*:*
|
CVE-2004-1135
| 0
| null | 0.31938
|
Multiple buffer overflows in WS_FTP Server 5.03 2004.10.14 allow remote attackers to cause a denial of service (service crash) via long (1) SITE, (2) XMKD, (3) MKD, and (4) RNFR commands.
|
2005-01-10
|
Metasploit
|
cpe:2.3:a:ipswitch:ws_ftp_server:5.03:*:*:*:*:*:*:*
|
CVE-2004-1172
| 0
| null | 0.78981
|
Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname.
|
2005-01-10
|
Metasploit
|
cpe:2.3:a:symantec_veritas:backup_exec:8.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:8.5:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:8.6:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*
|
CVE-2004-1211
| 0
| null | 0.80539
|
Multiple buffer overflows in the IMAP service in Mercury/32 4.01a allow remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via long arguments to the (1) EXAMINE, (2) SUBSCRIBE, (3) STATUS, (4) APPEND, (5) CHECK, (6) CLOSE, (7) EXPUNGE, (8) FETCH, (9) RENAME, (10) DELETE, (11) LIST, (12) SEARCH, (13) CREATE, or (14) UNSUBSCRIBE commands.
|
2005-01-10
|
Metasploit
|
cpe:2.3:a:david_harris:mercury:4.0.1a:*:win32:*:*:*:*:*
|
CVE-2004-1315
| 0
| null | 0.85909
|
viewtopic.php in phpBB 2.x before 2.0.11 improperly URL decodes the highlight parameter when extracting words and phrases to highlight, which allows remote attackers to execute arbitrary PHP code by double-encoding the highlight value so that special characters are inserted into the result, which is then processed by PHP exec, as exploited by the Santy.A worm.
|
2004-11-12
|
Metasploit
|
cpe:2.3:a:phpbb_group:phpbb:*:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.4.4:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.6c:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.6d:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.7a:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.8a:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0_beta1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0_rc1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0_rc2:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0_rc3:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0_rc4:*:*:*:*:*:*:*
|
CVE-2004-1317
| 0
| null | 0.78963
|
Stack-based buffer overflow in doexec.c in Netcat for Windows 1.1, when running with the -e option, allows remote attackers to execute arbitrary code via a long DNS command.
|
2004-12-27
|
Metasploit
|
cpe:2.3:a:netcat:netcat:1.1:*:*:*:*:*:*:*
|
CVE-2004-1373
| 0
| null | 0.86852
|
Format string vulnerability in SHOUTcast 1.9.4 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via format string specifiers in a content URL, as demonstrated in the filename portion of a .mp3 file.
|
2004-12-23
|
Metasploit
|
cpe:2.3:a:nullsoft:shoutcast_server:1.9.4:*:linux:*:*:*:*:*;cpe:2.3:a:nullsoft:shoutcast_server:1.9.4:*:mac_os_x:*:*:*:*:*;cpe:2.3:a:nullsoft:shoutcast_server:1.9.4:*:win32:*:*:*:*:*
|
CVE-2004-1388
| 0
| null | 0.74545
|
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.
|
2004-12-31
|
Metasploit
|
cpe:2.3:a:berlios:gps_daemon:1.25:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.26:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.91:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.92:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.93:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.94:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.95:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.96:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.97:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.98:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.0:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.1:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.2:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.3:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.4:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.7:*:*:*:*:*:*:*
|
CVE-2004-1389
| 0
| null | 0.35325
|
Unknown vulnerability in the Veritas NetBackup Administrative Assistant interface for NetBackup BusinesServer 3.4, 3.4.1, and 4.5, DataCenter 3.4, 3.4.1, and 4.5, Enterprise Server 5.1, and NetBackup Server 5.0 and 5.1, allows attackers to execute arbitrary commands via the bpjava-susvc process, possibly related to the call-back feature.
|
2004-12-31
|
Metasploit
|
cpe:2.3:a:veritas:netbackup:3.4.0:*:businessserver:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:3.4.0:*:datacenter:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:3.4.1:*:businessserver:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:3.4.1:*:datacenter:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:4.5.0:*:businessserver:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:4.5.0:*:datacenter:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:5.0:*:server:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:5.1:*:enterprise_server:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:5.1:*:server:*:*:*:*:*
|
CVE-2004-1464
| 5.9
|
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
| 0.01698
|
Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port.
|
2004-12-31
|
CISA
|
cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
|
CVE-2004-1520
| 0
| null | 0.88797
|
Stack-based buffer overflow in IPSwitch IMail 8.13 allows remote authenticated users to execute arbitrary code via a long IMAP DELETE command.
|
2004-12-31
|
Metasploit
|
cpe:2.3:a:ipswitch:imail:8.13:*:*:*:*:*:*:*
|
CVE-2004-1550
| 0
| null | 0.39501
|
Motorola Wireless Router WR850G running firmware 4.03 allows remote attackers to bypass authentication, log on as an administrator, and obtain sensitive information by repeatedly making an HTTP request for ver.asp until an administrator logs on.
|
2004-12-31
|
Metasploit
|
cpe:2.3:h:motorola:wr850g:4.0.3_firmware:*:*:*:*:*:*:*
|
CVE-2004-1558
| 0
| null | 0.86295
|
Multiple stack-based buffer overflows in YPOPs! (aka YahooPOPS) 0.4 through 0.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) POP3 USER command or (2) SMTP request.
|
2004-12-31
|
Metasploit
|
cpe:2.3:a:ypops:ypops:0.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4.3:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4.4:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4.5:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4.6:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.5:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.6:*:*:*:*:*:*:*
|
CVE-2004-1561
| 0
| null | 0.78571
|
Buffer overflow in Icecast 2.0.1 and earlier allows remote attackers to execute arbitrary code via an HTTP request with a large number of headers.
|
2004-12-31
|
Metasploit
|
cpe:2.3:a:icecast:icecast:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:icecast:icecast:2.0:*:*:*:*:*:*:*
|
CVE-2004-1595
| 0
| null | 0.79617
|
Buffer overflow in ShixxNote 6.net build 117 allows remote attackers to execute arbitrary code via a long font field.
|
2004-10-13
|
Metasploit
|
cpe:2.3:a:shixxnote:shixxnote:6.net:*:*:*:*:*:*:*
|
CVE-2004-1602
| 0
| null | 0.03636
|
ProFTPD 1.2.x, including 1.2.8 and 1.2.10, responds in a different amount of time when a given username exists, which allows remote attackers to identify valid usernames by timing the server response.
|
2004-10-15
|
Nuclei
|
cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*
|
CVE-2004-1626
| 0
| null | 0.73355
|
Buffer overflow in Ability Server 2.34, and possibly other versions, allows remote attackers to execute arbitrary code via a long STOR command.
|
2004-10-22
|
Metasploit
|
cpe:2.3:a:code-crafters:ability_server:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:code-crafters:ability_server:2.3.2:*:*:*:*:*:*:*;cpe:2.3:a:code-crafters:ability_server:2.3.4:*:*:*:*:*:*:*
|
CVE-2004-1638
| 0
| null | 0.79074
|
Buffer overflow in MailCarrier 2.51 allows remote attackers to execute arbitrary code via a long (1) EHLO and possibly (2) HELO command.
|
2004-10-16
|
Metasploit
|
cpe:2.3:a:tabs_laboratories:mailcarrier:2.51:*:*:*:*:*:*:*
|
CVE-2004-1641
| 0
| null | 0.07864
|
Heap-based buffer overflow in Titan FTP 3.21 and earlier allows remote attackers to cause a denial of service (crash) via a long FTP command such as (1) CWD, (2) STAT, or (3) LIST.
|
2004-08-29
|
Nuclei
|
cpe:2.3:a:south_river_technologies:titan_ftp_server:2.10:*:*:*:*:*:*:*;cpe:2.3:a:south_river_technologies:titan_ftp_server:2.2:*:*:*:*:*:*:*;cpe:2.3:a:south_river_technologies:titan_ftp_server:3.01:*:*:*:*:*:*:*;cpe:2.3:a:south_river_technologies:titan_ftp_server:3.10:*:*:*:*:*:*:*;cpe:2.3:a:south_river_technologies:titan_ftp_server:3.21:*:*:*:*:*:*:*
|
CVE-2004-1965
| 0
| null | 0.00265
|
Multiple cross-site scripting (XSS) vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) redirect parameter to member.php, (2) to parameter to myhome.php (3) TID parameter to post.php, or (4) redirect parameter to index.php.
|
2004-04-25
|
Nuclei
|
cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.0_rc1:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.0_rc2:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.0_rc3:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.8:*:*:*:*:*:*:*
|
CVE-2004-2074
| 0
| null | 0.55562
|
Format string vulnerability in Dream FTP 1.02 allows local users to cause a denial of service (crash) via format string specifiers in the (1) PASS or (2) RETR commands.
|
2004-12-31
|
Metasploit
|
cpe:2.3:a:bolintech:dream_ftp_server:1.02:*:*:*:*:*:*:*
|
CVE-2004-2086
| 0
| null | 0.68835
|
Stack-based buffer overflow in results.stm for Sambar Server before the 6.0 production release allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a long query parameter.
|
2004-02-06
|
Metasploit
|
cpe:2.3:a:sambar:sambar_server:6.0:*:*:*:*:*:*:*;cpe:2.3:a:sambar:sambar_server:6.0:beta3:*:*:*:*:*:*
|
CVE-2004-2111
| 0
| null | 0.8831
|
Stack-based buffer overflow in the site chmod command in Serv-U FTP Server before 4.2 allows remote attackers to execute arbitrary code via a long filename.
|
2004-12-31
|
Metasploit
|
cpe:2.3:a:solarwinds:serv-u_file_server:*:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:4.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.0:*:*:*:*:*:*:*
|
CVE-2004-2221
| 0
| null | 0.77421
|
Buffer overflow in SoftCart.exe in Mercantec SoftCart 4.00b allows remote attackers to execute arbitrary code via a long parameter in an HTTP GET request.
|
2004-12-31
|
Metasploit
|
cpe:2.3:a:mercantec:softcart:4.00b:*:*:*:*:*:*:*
|
CVE-2004-2271
| 0
| null | 0.81176
|
Buffer overflow in MiniShare 1.4.1 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request.
|
2004-12-31
|
Metasploit
|
cpe:2.3:a:minishare:minimal_http_server:*:*:*:*:*:*:*:*
|
CVE-2004-2416
| 0
| null | 0.75321
|
Buffer overflow in the logging component of CCProxy allows remote attackers to execute arbitrary code via a long HTTP GET request.
|
2004-12-31
|
Metasploit
|
cpe:2.3:a:youngzsoft:ccproxy:6.0:*:*:*:*:*:*:*
|
CVE-2004-2466
| 0
| null | 0.72511
|
chat.ghp in Easy Chat Server 1.2 allows remote attackers to cause a denial of service (server crash) via a long username parameter, possibly due to a buffer overflow. NOTE: it was later reported that 2.2 is also affected.
|
2004-12-31
|
Metasploit
|
cpe:2.3:a:efs_software:easy_chat_server:1.2:*:*:*:*:*:*:*;cpe:2.3:a:efs_software:easy_chat_server:2.2:*:*:*:*:*:*:*
|
CVE-2004-2687
| 0
| null | 0.8951
|
distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks.
|
2004-12-31
|
Metasploit/Nuclei
|
cpe:2.3:a:apple:xcode:1.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
|
CVE-2004-2691
| 0
| null | 0.77285
|
Unspecified vulnerability in 3Com SuperStack 3 4400 switches with firmware version before 3.31 allows remote attackers to cause a denial of service (device reset) via a crafted request to the web management interface. NOTE: the provenance of this information is unknown; details are obtained from third party reports.
|
2004-12-31
|
Metasploit
|
cpe:2.3:h:3com:3c17205-us:*:firmware_3.30:*:*:*:*:*:*;cpe:2.3:h:3com:3c17210-us:*:firmware_3.30:*:*:*:*:*:*;cpe:2.3:h:3com:superstack_3_switch:4400:firmware_3.30:*:*:*:*:*:*;cpe:2.3:h:3com:superstack_3_switch:4400_se:firmware_3.30:*:*:*:*:*:*
|
CVE-2005-0043
| 0
| null | 0.7991
|
Buffer overflow in Apple iTunes 4.7 allows remote attackers to execute arbitrary code via a long URL in (1) .m3u or (2) .pls playlist files.
|
2005-05-02
|
Metasploit
|
cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*
|
CVE-2005-0059
| 0
| null | 0.89115
|
Buffer overflow in the Message Queuing component of Microsoft Windows 2000 and Windows XP SP1 allows remote attackers to execute arbitrary code via a crafted message.
|
2005-05-02
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:embedded:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
|
CVE-2005-0116
| 0
| null | 0.91763
|
AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl.
|
2005-01-18
|
Metasploit
|
cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
|
CVE-2005-0260
| 0
| null | 0.81028
|
Stack-based buffer overflow in the Discovery Service for BrightStor ARCserve Backup 11.1 and earlier allows remote attackers to execute arbitrary code via a long packet to UDP port 41524, which is not properly handled in a recvfrom call.
|
2005-05-02
|
Metasploit
|
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*
|
CVE-2005-0277
| 0
| null | 0.79303
|
Buffer overflow in the FTP service in 3Com 3CDaemon 2.0 revision 10 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via (1) a long username in the USER command or (2) an FTP command that contains a long argument, such as cd, send, or ls.
|
2005-05-02
|
Metasploit
|
cpe:2.3:a:3com:3cdaemon:2.0:revision_10:*:*:*:*:*:*
|
CVE-2005-0308
| 0
| null | 0.78115
|
Buffer overflow in the wsprintf function in W32Dasm 8.93 and earlier allows remote attackers to execute arbitrary code via a large import or export function name.
|
2005-01-24
|
Metasploit
|
cpe:2.3:a:ursoftware:w32dasm:8.94:*:*:*:*:*:*:*
|
CVE-2005-0353
| 0
| null | 0.78339
|
Buffer overflow in the Sentinel LM (Lservnt) service in the Sentinel License Manager 7.2.0.2 allows remote attackers to execute arbitrary code by sending a large amount of data to UDP port 5093.
|
2005-05-02
|
Metasploit
|
cpe:2.3:a:safenet:sentinel_license_manager:7.2_.0.2:*:*:*:*:*:*:*
|
CVE-2005-0455
| 0
| null | 0.75424
|
Stack-based buffer overflow in the CSmil1Parser::testAttributeFailed function in smlparse.cpp for RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1 allows remote attackers to execute arbitrary code via a .SMIL file with a large system-screen-size value.
|
2005-05-02
|
Metasploit
|
cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0_6.0.12.690:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0_beta:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1016_beta:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1053:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:8.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:*
|
CVE-2005-0478
| 0
| null | 0.65476
|
Multiple buffer overflows in TrackerCam 5.12 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) an HTTP request with a long User-Agent header or (2) a long argument to an arbitrary PHP script.
|
2005-03-30
|
Metasploit
|
cpe:2.3:a:trackercam:trackercam:*:*:*:*:*:*:*:*
|
CVE-2005-0491
| 0
| null | 0.84329
|
Stack-based buffer overflow in Knox Arkeia Server Backup 5.3.x allows remote attackers to execute arbitrary code via a long type 77 request.
|
2005-05-02
|
Metasploit
|
cpe:2.3:a:knox_software:arkeia_server_backup:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.0_rc1:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.0_rc2:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.0_rc3:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.0_rc4:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.4:*:*:*:*:*:*:*
|
CVE-2005-0511
| 0
| null | 0.82752
|
misc.php for vBulletin 3.0.6 and earlier, when "Add Template Name in HTML Comments" is enabled, allows remote attackers to execute arbitrary PHP code via nested variables in the template parameter.
|
2005-02-21
|
Metasploit
|
cpe:2.3:a:jelsoft:vbulletin:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.0:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.0_beta_2:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.0_beta_3:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.9_can:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.0_beta_2:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.0_can4:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.0_rc4:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*
|
CVE-2005-0581
| 0
| null | 0.72663
|
Multiple buffer overflows in Computer Associates (CA) License Client and Server 0.1.0.15 allow remote attackers to execute arbitrary code via (1) certain long fields in the Checksum item in a GCR request, (2) a long IP address, hostname, or netmask values in a GCR request, (3) a long last parameter in a GETCONFIG packet, or (4) long values in a request with an invalid format.
|
2005-05-02
|
Metasploit
|
cpe:2.3:a:broadcom:license_software:0.1.0.15:*:*:*:*:*:*:*
|
CVE-2005-0595
| 0
| null | 0.78362
|
Buffer overflow in ext.dll in BadBlue 2.55 allows remote attackers to execute arbitrary code via a long mfcisapicommand parameter.
|
2005-05-02
|
Metasploit
|
cpe:2.3:a:working_resources_inc.:badblue:2.55:*:*:*:*:*:*:*
|
CVE-2005-0684
| 0
| null | 0.71813
|
Multiple buffer overflows in the web tool for MySQL MaxDB before 7.5.00.26 allows remote attackers to execute arbitrary code via (1) an HTTP GET request with a long file parameter after a percent ("%") sign or (2) a long Lock-Token string to the WebDAV functionality, which is not properly handled by the getLockTokenHeader function in WDVHandler_CommonUtils.c.
|
2005-04-25
|
Metasploit
|
cpe:2.3:a:mysql:maxdb:7.5.00.08:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.11:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.12:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.14:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.15:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.16:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.18:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.19:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.23:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00:*:*:*:*:*:*:*
|
CVE-2005-0768
| 0
| null | 0.75364
|
Buffer overflow in the administration web server for GoodTech Telnet Server 4.0 and 5.0, and possibly all versions before 5.0.7, allows remote attackers to execute arbitrary code via a long string to port 2380.
|
2005-05-02
|
Metasploit
|
cpe:2.3:a:goodtech_systems:goodtech_telnet_server:4.0:*:windows_nt:*:*:*:*:*;cpe:2.3:a:goodtech_systems:goodtech_telnet_server:5.0:*:windows_nt:*:*:*:*:*
|
CVE-2005-0771
| 0
| null | 0.81368
|
VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106.
|
2005-06-23
|
Metasploit
|
cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*
|
CVE-2005-0773
| 0
| null | 0.75181
|
Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument.
|
2005-06-18
|
Metasploit
|
cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0.4019:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0.4170:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0.4172:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0.4174:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0.4202:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.3:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1127.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1151.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152.4:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1154:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.306:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.307:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691_sp2:*:*:*:*:*:*:*
|
CVE-2005-0850
| 0
| null | 0.01037
|
FileZilla FTP server before 0.9.6 allows remote attackers to cause a denial of service via a request for a filename containing an MS-DOS device name such as CON, NUL, COM1, LPT1, and others.
|
2005-05-02
|
Nuclei
|
cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*
|
CVE-2005-0851
| 0
| null | 0.01037
|
FileZilla FTP server before 0.9.6, when using MODE Z (zlib compression), allows remote attackers to cause a denial of service (infinite loop) via certain file uploads or directory listings.
|
2005-05-02
|
Nuclei
|
cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*
|
CVE-2005-1009
| 0
| null | 0.83516
|
Multiple buffer overflows in BakBone NetVault 6.x and 7.x allow (1) remote attackers to execute arbitrary code via a modified computer name and length that leads to a heap-based buffer overflow, or (2) local users to execute arbitrary code via a long Name entry in the configure.cfg file.
|
2005-05-02
|
Metasploit
|
cpe:2.3:a:bakbone:netvault:7.0:*:*:*:*:*:*:*;cpe:2.3:a:bakbone:netvault:7.1:*:*:*:*:*:*:*
|
CVE-2005-1018
| 0
| null | 0.71743
|
Buffer overflow in the UniversalAgent for Computer Associates (CA) BrightStor ARCserve Backup allows remote authenticated users to cause a denial of service or execute arbitrary code via an agent request to TCP port 6050 with a large argument before the option field.
|
2005-05-02
|
Metasploit
|
cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*
|
CVE-2005-1099
| 0
| null | 0.79026
|
Multiple buffer overflows in the HandleChild function in server.c in Greylisting daemon (GLD) 1.3 and 1.4, when GLD is listening on a network interface, allow remote attackers to execute arbitrary code.
|
2005-04-12
|
Metasploit
|
cpe:2.3:a:salim_gasmi:gld:1.0:*:*:*:*:*:*:*;cpe:2.3:a:salim_gasmi:gld:1.1:*:*:*:*:*:*:*;cpe:2.3:a:salim_gasmi:gld:1.2:*:*:*:*:*:*:*;cpe:2.3:a:salim_gasmi:gld:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:salim_gasmi:gld:1.3:*:*:*:*:*:*:*;cpe:2.3:a:salim_gasmi:gld:1.4:*:*:*:*:*:*:*
|
CVE-2005-1213
| 0
| null | 0.83908
|
Stack-based buffer overflow in the news reader for Microsoft Outlook Express (MSOE.DLL) 5.5 SP2, 6, and 6 SP1 allows remote malicious NNTP servers to execute arbitrary code via a LIST response with a long second field.
|
2005-06-14
|
Metasploit
|
cpe:2.3:a:microsoft:outlook_express:5.5:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook_express:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook_express:6.0:sp1:*:*:*:*:*:*
|
CVE-2005-1272
| 0
| null | 0.78265
|
Stack-based buffer overflow in the Backup Agent for Microsoft SQL Server in BrightStor ARCserve Backup Agent for SQL Server 11.0 allows remote attackers to execute arbitrary code via a long string sent to port (1) 6070 or (2) 6050.
|
2005-08-05
|
Metasploit
|
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11.0:*:oracle:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:oracle:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:9.0_1:*:oracle:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.0:*:sap:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.0:*:sql:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:exchange:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:sap:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:sql:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11:*:exchange:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:9.0.1:*:exchange:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:9.0.1:*:sap:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:9.0.1:*:sql:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.0:*:oracle:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.0:*:sap:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.0:*:sql:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.5:*:oracle:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.5:*:sap:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.5:*:sql:*:*:*:*:*
|
CVE-2005-1323
| 0
| null | 0.78183
|
Buffer overflow in NetFtpd for NetTerm 5.1.1 and earlier allows remote attackers to execute arbitrary code via a long USER command.
|
2005-05-02
|
Metasploit
|
cpe:2.3:a:intersoft:netterm:4.2.2:*:*:*:*:*:*:*
|
CVE-2005-1348
| 0
| null | 0.91095
|
Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header.
|
2005-05-02
|
Metasploit
|
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*
|
CVE-2005-1415
| 0
| null | 0.70623
|
Buffer overflow in GlobalSCAPE Secure FTP Server 3.0.2 allows remote authenticated users to execute arbitrary code via a long FTP command.
|
2005-05-03
|
Metasploit
|
cpe:2.3:a:globalscape:secure_ftp_server:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:globalscape:secure_ftp_server:3.0:*:*:*:*:*:*:*
|
CVE-2005-1543
| 0
| null | 0.80369
|
Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests.
|
2005-05-25
|
Metasploit
|
cpe:2.3:a:novell:zenworks:6.5:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_desktops:3.2:sp2:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_desktops:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_desktops:4.0:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_remote_management:*:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_server_management:6.5:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_servers:3.2:*:*:*:*:*:*:*
|
CVE-2005-1790
| 0
| null | 0.78794
|
Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
|
2005-06-01
|
Metasploit
|
cpe:2.3:a:microsoft:internet_explorer:6.0.2800.1106:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0.2900.2180:*:*:*:*:*:*:*
|
CVE-2005-1812
| 0
| null | 0.82151
|
Multiple stack-based buffer overflows in FutureSoft TFTP Server Evaluation Version 1.0.0.1 allow remote attackers to execute arbitrary code via a long (1) filename or (2) transfer mode string in a Read Request (RRQ) or Write Request (WRQ) packet.
|
2005-06-01
|
Metasploit
|
cpe:2.3:a:futuresoft:tftp_server_2000:1.0.0.1:*:*:*:*:*:*:*
|
CVE-2005-1815
| 0
| null | 0.62867
|
Multiple buffer overflows in Hummingbird Connectivity inetD 10.0.0.1 and 9.0.0.4 allows attackers to cause a denial of service and possibly execute arbitrary code via (1) an FTP command with a long argument to FTPD (ftpdw.exe) or (2) a large amount of data to LPD (Lpdw.exe).
|
2005-06-01
|
Metasploit
|
cpe:2.3:a:hummingbird:connectivity:10.0:*:*:*:*:*:*:*;cpe:2.3:a:hummingbird:connectivity:7.1:*:*:*:*:*:*:*;cpe:2.3:a:hummingbird:connectivity:9.0:*:*:*:*:*:*:*
|
CVE-2005-1921
| 0
| null | 0.86898
|
Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.
|
2005-07-05
|
Metasploit
|
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*;cpe:2.3:a:gggeek:phpxmlrpc:*:*:*:*:*:*:*:*;cpe:2.3:a:php:xml_rpc:*:*:*:*:*:pear:*:*;cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
|
CVE-2005-1983
| 0
| null | 0.87719
|
Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by the Zotob (aka Mytob) worm.
|
2005-08-10
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
|
CVE-2005-2086
| 0
| null | 0.86512
|
PHP remote file inclusion vulnerability in viewtopic.php in phpBB 2.0.15 and earlier allows remote attackers to execute arbitrary PHP code.
|
2005-07-05
|
Metasploit
|
cpe:2.3:a:phpbb_group:phpbb:2.0.15:*:*:*:*:*:*:*
|
CVE-2005-2120
| 0
| null | 0.76202
|
Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.
|
2005-10-13
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
|
CVE-2005-2265
| 0
| null | 0.82043
|
Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 allows remote attackers to cause a denial of service (access violation and crash), and possibly execute arbitrary code, by calling InstallVersion.compareTo with an object instead of a string.
|
2005-07-13
|
Metasploit
|
cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.5:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.5:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.5:rc2:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.6:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.6:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:rc2:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*
|
CVE-2005-2278
| 0
| null | 0.85437
|
Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.
|
2005-07-18
|
Metasploit
|
cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*
|
CVE-2005-2287
| 0
| null | 0.79843
|
SoftiaCom wMailServer 1.0 and 2.0 allows remote attackers to cause a denial of service (application crash) via a large TCP packet with a leading space, possibly triggering a buffer overflow.
|
2005-07-18
|
Metasploit
|
cpe:2.3:a:softiacom:wmailserver:1.0:*:*:*:*:*:*:*;cpe:2.3:a:softiacom:wmailserver:2.0:*:*:*:*:*:*:*
|
CVE-2005-2297
| 0
| null | 0.71529
|
Stack-based buffer overflow in TreeAction.do in Sybase EAServer 4.2.5 through 5.2 allows remote authenticated users to execute arbitrary code via a large javascript parameter.
|
2005-07-19
|
Metasploit
|
cpe:2.3:a:sybase:easerver:4.2.5:*:*:*:*:*:*:*;cpe:2.3:a:sybase:easerver:5.0:*:*:*:*:*:*:*;cpe:2.3:a:sybase:easerver:5.1:*:*:*:*:*:*:*;cpe:2.3:a:sybase:easerver:5.2:*:*:*:*:*:*:*
|
CVE-2005-2373
| 0
| null | 0.37407
|
Buffer overflow in SlimFTPd 3.15 and 3.16 allows remote authenticated users to execute arbitrary code via a long directory name to (1) LIST, (2) DELE or (3) RNFR commands.
|
2005-07-26
|
Metasploit
|
cpe:2.3:a:whitsoft_development:slimftpd:3.15:*:*:*:*:*:*:*;cpe:2.3:a:whitsoft_development:slimftpd:3.16:*:*:*:*:*:*:*
|
CVE-2005-2428
| 0
| null | 0.06321
|
Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.
|
2005-08-03
|
Nuclei
|
cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:6.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:6.5:*:*:*:*:*:*:*
|
CVE-2005-2535
| 0
| null | 0.82941
|
Buffer overflow in the Discovery Service in BrightStor ARCserve Backup 9.0 through 11.1 allows remote attackers to execute arbitrary commands via a large packet to TCP port 41523, a different vulnerability than CVE-2005-0260.
|
2005-08-10
|
Metasploit
|
cpe:2.3:a:broadcom:arcserve_backup_2000:r16.5:*:windows:ja:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:aix:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:linux:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:macintosh:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:netware:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:solaris:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:tru64:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:7.0:*:linux:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:ja:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:netware:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup_hp:11.1:*:hp:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:aix:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:hpux:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:mainframe_linux:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:aix:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:hp:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:solaris:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:tru64:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:windows:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10:*:solaris:*:*:*:*:*
|
CVE-2005-2551
| 0
| null | 0.71755
|
Buffer overflow in dhost.exe in iMonitor for Novell eDirectory 8.7.3 on Windows allows attackers to cause a denial of service (crash) and obtain access to files via unknown vectors.
|
2005-08-12
|
Metasploit
|
cpe:2.3:a:novell:edirectory:8.7.3:*:*:*:*:*:*:*
|
CVE-2005-2611
| 0
| null | 0.78897
|
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
|
2005-08-17
|
Metasploit
|
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4019:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4170:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4172:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4174:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4202:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.3:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1127_.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1151_.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152_.4:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1154:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1156:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.306:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.307:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5520:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_8.6:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691_sp2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:unix_linux_server:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp3:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp4:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp5:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp6:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp7:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp8:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp3:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp4:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp5:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp6:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp7:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp8:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp3:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp4:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp5:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp3:*:*:*:*:*:*:*
|
CVE-2005-2612
| 0
| null | 0.73416
|
Direct code injection vulnerability in WordPress 1.5.1.3 and earlier allows remote attackers to execute arbitrary PHP code via the cache_lastpostdate[server] cookie.
|
2005-08-17
|
Metasploit
|
cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
|
CVE-2005-2668
| 0
| null | 0.82851
|
Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors.
|
2005-08-23
|
Metasploit
|
cpe:2.3:a:broadcom:advantage_data_transport:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:adviseit:2.4:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_portal:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_san_manager:1.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp2:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_san_manager:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:cleverpath_aion:10.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:cleverpath_ecm:3.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:cleverpath_olap:5.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_admin:8.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_admin:8.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:messaging:1.11:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:messaging:1.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:messaging:1.7:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_asset_management:3.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_asset_management:3.2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp2:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_data_transport_option:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_jasmine:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_management_portal:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_management_portal:3.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_nsm_wireless_network_management_option:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_performance_management:2.4:sp3:openvms:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_service_level_management:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_service_level_management:3.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_software_delivery:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp2:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_software_delivery:4.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_tng:2.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_tng:2.2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_tng:2.4.2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_tng:2.4:*:*:*:*:*:*:*;cpe:2.3:a:ca:etrust_admin:2.1:*:*:*:*:*:*:*;cpe:2.3:a:ca:etrust_admin:2.4:*:*:*:*:*:*:*;cpe:2.3:a:ca:etrust_admin:2.7:*:*:*:*:*:*:*;cpe:2.3:a:ca:etrust_admin:2.9:*:*:*:*:*:*:*;cpe:2.3:a:ca:unicenter_asset_management:4.0:sp1:*:*:*:*:*:*;cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp1:*:*:*:*:*:*;cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp2:*:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:3.5:*:websphere_mq:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:4.0:*:lotus_notes_domino:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:4.0:*:microsoft_exchange:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:4.1:*:microsoft_exchange:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:5.0.1:*:web_servers:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:5.0:*:web_servers:*:*:*:*:*;cpe:2.3:a:ca:unicenter_software_delivery:4.0:sp1:*:*:*:*:*:*;cpe:2.3:a:ca:unicenter_tng:2.2:*:*:ja:*:*:*:*
|
CVE-2005-2733
| 0
| null | 0.80569
|
upload_img_cgi.php in Simple PHP Blog (SPHPBlog) does not properly restrict file extensions of uploaded files, which could allow remote attackers to execute arbitrary code.
|
2005-08-30
|
Metasploit
|
cpe:2.3:a:alexander_palmo:simple_php_blog:0.4.0:*:*:*:*:*:*:*
|
CVE-2005-2773
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.89823
|
HP OpenView Network Node Manager 6.2 through 7.50 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) node parameter to connectedNodes.ovpl, (2) cdpView.ovpl, (3) freeIPaddrs.ovpl, and (4) ecscmg.ovpl.
|
2005-09-02
|
Metasploit/CISA
|
cpe:2.3:a:hp:openview_network_node_manager:*:*:*:*:*:*:*:*
|
CVE-2005-2799
| 0
| null | 0.85392
|
Buffer overflow in apply.cgi in Linksys WRT54G 3.01.03, 3.03.6, and possibly other versions before 4.20.7, allows remote attackers to execute arbitrary code via a long HTTP POST request.
|
2005-09-15
|
Metasploit
|
cpe:2.3:h:linksys:wrt54g:3.01.3:*:*:*:*:*:*:*;cpe:2.3:h:linksys:wrt54g:3.03.6:*:*:*:*:*:*:*
|
CVE-2005-2847
| 0
| null | 0.87047
|
img.pl in Barracuda Spam Firewall running firmware 3.1.16 and 3.1.17 allows remote attackers to execute arbitrary commands via shell metacharacters in the f parameter.
|
2005-09-08
|
Metasploit
|
cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.1.16:*:*:*:*:*:*:*;cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.1.17:*:*:*:*:*:*:*
|
CVE-2005-2852
| 0
| null | 0.60379
|
Unknown vulnerability in CIFS.NLM in Novell Netware 6.5 SP2 and SP3, 5.1, and 6.0 allows remote attackers to cause a denial of service (ABEND) via an incorrect password length, as exploited by the "worm.rbot.ccc" worm.
|
2005-09-08
|
Metasploit
|
cpe:2.3:o:novell:netware:5.1:*:*:*:*:*:*:*;cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*;cpe:2.3:o:novell:netware:6.5:sp2:*:*:*:*:*:*;cpe:2.3:o:novell:netware:6.5:sp3:*:*:*:*:*:*
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.