CVE
stringlengths
13
16
CVSS Score
float64
0
10
CVSS_Vector
stringclasses
257 values
EPSS
float64
0
0.95
Description
stringlengths
28
3.79k
Published
stringdate
1990-08-14 00:00:00
2025-10-05 00:00:00
Source
stringclasses
7 values
CPE
stringlengths
33
51k
CVE-2004-0326
0
null
0.79778
Buffer overflow in the web proxy for GateKeeper Pro 4.7 allows remote attackers to execute arbitrary code via a long GET request.
2004-11-23
Metasploit
cpe:2.3:a:proxy-pro:professional_gatekeeper:4.7:*:*:*:*:*:*:*
CVE-2004-0330
0
null
0.83139
Buffer overflow in Serv-U ftp before 5.0.0.4 allows remote authenticated users to execute arbitrary code via a long time zone argument to the MDTM command.
2004-11-23
Metasploit
cpe:2.3:a:solarwinds:serv-u_file_server:*:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:4.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.3:*:*:*:*:*:*:*
CVE-2004-0331
0
null
0.67532
Heap-based buffer overflow in Dell OpenManage Web Server 3.4.0 allows remote attackers to cause a denial of service (crash) via a HTTP POST with a long application variable.
2004-11-23
Metasploit
cpe:2.3:a:dell:openmanage:3.2:*:*:*:*:*:*:*;cpe:2.3:a:dell:openmanage:3.4:*:*:*:*:*:*:*;cpe:2.3:a:dell:openmanage:3.7.1:*:*:*:*:*:*:*;cpe:2.3:a:dell:openmanage:3.7:*:*:*:*:*:*:*
CVE-2004-0362
0
null
0.83404
Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.
2004-04-15
Metasploit
cpe:2.3:a:iss:blackice_agent_server:3.6ebz:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6eca:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6ecb:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6ecc:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6ecd:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6ece:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_agent_server:3.6ecf:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6cbz:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6cca:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6ccb:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6ccc:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6ccd:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6cce:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_pc_protection:3.6ccf:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6cbz:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6cca:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6ccb:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6ccc:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6ccd:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6cce:*:*:*:*:*:*:*;cpe:2.3:a:iss:blackice_server_protection:3.6ccf:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6ebz:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6eca:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6ecb:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6ecd:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6ece:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:3.6ecf:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0eba:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebf:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebg:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebh:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebj:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebk:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_desktop:7.0ebl:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ebz:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6eca:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ecb:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ecc:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ecd:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ece:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_guard:3.6ecf:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_network_sensor:7.0:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_20.11:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_22.10:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_22.4:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_22.9:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ebz:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6eca:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ecb:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ecc:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ecd:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ece:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_sentry:3.6ecf:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.0.1_win_sr1.1:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.0:*:windows:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5:*:windows:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5:sr3.2:windows:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5:sr3.3:windows:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.10:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.1:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.4:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.5:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.6:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.7:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.8:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.9:*:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.10:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.11:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.1:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.2:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.3:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.4:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.5:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.6:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.7:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.8:*:*:*:*:*:*;cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.9:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:20.11:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.10:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.1:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.2:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.3:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.4:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.5:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.6:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.7:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.8:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_a_series_xpu:22.9:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.10:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.11:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.1:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.2:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.3:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.4:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.5:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.6:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.7:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.8:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_g_series_xpu:22.9:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.1:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.2:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.3:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.4:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.5:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.6:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.7:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.8:*:*:*:*:*:*:*;cpe:2.3:h:iss:proventia_m_series_xpu:1.9:*:*:*:*:*:*:*
CVE-2004-0363
0
null
0.72679
Stack-based buffer overflow in the SymSpamHelper ActiveX component (symspam.dll) in Norton AntiSpam 2004, as used in Norton Internet Security 2004, allows remote attackers to execute arbitrary code via a long parameter to the LaunchCustomRuleWizard method.
2004-04-15
Metasploit
cpe:2.3:a:symantec:norton_antispam:2004:*:*:*:*:*:*:*
CVE-2004-0397
0
null
0.86588
Stack-based buffer overflow during the apr_time_t data conversion in Subversion 1.0.2 and earlier allows remote attackers to execute arbitrary code via a (1) DAV2 REPORT query or (2) get-dated-rev svn-protocol command.
2004-07-07
Metasploit
cpe:2.3:a:subversion:subversion:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:subversion:subversion:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:subversion:subversion:1.0:*:*:*:*:*:*:*
CVE-2004-0430
0
null
0.80742
Stack-based buffer overflow in AppleFileServer for Mac OS X 10.3.3 and earlier allows remote attackers to execute arbitrary code via a LoginExt packet for a Cleartext Password User Authentication Method (UAM) request with a PathName argument that includes an AFPName type string that is longer than the associated length field.
2004-07-07
Metasploit
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
CVE-2004-0437
0
null
0.06794
Titan FTP Server version 3.01 build 163, and possibly other versions before build 169, allows remote authenticated users to cause a denial of service (crash) by disconnecting from the system during a "LIST -L" command, which causes Titan to access an invalid socket.
2004-07-07
Nuclei
cpe:2.3:a:south_river_technologies:titan_ftp_server:3.01_build_163:*:*:*:*:*:*:*
CVE-2004-0519
0
null
0.00124
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.
2004-08-18
Nuclei
cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*
CVE-2004-0541
0
null
0.78284
Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).
2004-08-06
Metasploit
cpe:2.3:a:national_science_foundation:squid_web_proxy_cache:2.5_stable:*:*:*:*:*:*:*;cpe:2.3:a:national_science_foundation:squid_web_proxy_cache:3_pre:*:*:*:*:*:*:*
CVE-2004-0608
0
null
0.60179
The Unreal Engine, as used in DeusEx 1.112fm and earlier, Devastation 390 and earlier, Mobile Forces 20000 and earlier, Nerf Arena Blast 1.2 and earlier, Postal 2 1337 and earlier, Rune 107 and earlier, Tactical Ops 3.4.0 and earlier, Unreal 1 226f and earlier, Unreal II XMP 7710 and earlier, Unreal Tournament 451b and earlier, Unreal Tournament 2003 2225 and earlier, Unreal Tournament 2004 before 3236, Wheel of Time 333b and earlier, and X-com Enforcer, allows remote attackers to execute arbitrary code via a UDP packet containing a secure query with a long value, which overwrites memory.
2004-12-06
Metasploit
cpe:2.3:a:arush:devastation:390.0:*:*:*:*:*:*:*;cpe:2.3:a:dreamforge:tnn_outdoors_pro_hunter:*:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_engine:226f:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_engine:433:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_engine:436:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament:451b:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2003:2199_linux:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2003:2199_macos:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2003:2199_win32:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2003:2225_macos:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2003:2225_win32:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2004:macos:*:*:*:*:*:*:*;cpe:2.3:a:epic_games:unreal_tournament_2004:win32:*:*:*:*:*:*:*;cpe:2.3:a:infogrames:tacticalops:3.4:*:*:*:*:*:*:*;cpe:2.3:a:infogrames:x-com_enforcer:*:*:*:*:*:*:*:*;cpe:2.3:a:ion_storm:deusex:1.112_fm:*:*:*:*:*:*:*;cpe:2.3:a:nerf_arena_blast:nerf_arena_blast:1.2:*:*:*:*:*:*:*;cpe:2.3:a:rage_software:mobile_forces:20000.0:*:*:*:*:*:*:*;cpe:2.3:a:robert_jordan:wheel_of_time:333.0b:*:*:*:*:*:*:*;cpe:2.3:a:running_with_scissors:postal_2:1337:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*
CVE-2004-0636
0
null
0.78516
Buffer overflow in the goaway function in the aim:goaway URI handler for AOL Instant Messenger (AIM) 5.5, including 5.5.3595, allows remote attackers to execute arbitrary code via a long Away message.
2004-11-23
Metasploit
cpe:2.3:a:aol:instant_messenger:5.5.3415_beta:*:*:*:*:*:*:*;cpe:2.3:a:aol:instant_messenger:5.5.3595:*:*:*:*:*:*:*;cpe:2.3:a:aol:instant_messenger:5.5:*:*:*:*:*:*:*
CVE-2004-0656
0
null
0.00739
The accept_client function in PureFTPd 1.0.18 and earlier allows remote attackers to cause a denial of service by exceeding the maximum number of connections.
2004-08-06
Nuclei
cpe:2.3:a:pureftpd:pureftpd:0.96:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.11:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.12:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.13a:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.14:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.15:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.16:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.16a:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.16b:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.16c:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.17a:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.18:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pureftpd:1.0:*:*:*:*:*:*:*
CVE-2004-0695
0
null
0.7912
Stack-based buffer overflow in the FTP service for 4D WebSTAR 5.3.2 and earlier allows remote attackers to execute arbitrary code via a long FTP command.
2004-07-27
Metasploit
cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*
CVE-2004-0735
0
null
0.74364
Buffer overflow in Medal of Honor (1) Allied Assault 1.11v9 and earlier, (2) Breakthrough 2.40b and earlier, and (3) Spearhead 2.15 and earlier, when playing on a Local Area Network (LAN), allows remote attackers to execute arbitrary code via vectors such as (1) the getinfo query, (2) the connect packet, and other unknown vectors.
2004-07-27
Metasploit
cpe:2.3:a:electronic_arts:medal_of_honor_allied_assault:1.0:*:*:*:*:*:*:*;cpe:2.3:a:electronic_arts:medal_of_honor_allied_assault:1.11_v9:*:*:*:*:*:*:*;cpe:2.3:a:electronic_arts:medal_of_honor_allied_assault:1.1:*:*:*:*:*:*:*;cpe:2.3:a:electronic_arts:medal_of_honor_allied_assault:breakthrough_2.40_b:*:*:*:*:*:*:*;cpe:2.3:a:electronic_arts:medal_of_honor_allied_assault:spearhead_2.15:*:*:*:*:*:*:*
CVE-2004-0795
0
null
0.31914
DB2 8.1 remote command server (DB2RCMD.EXE) executes the db2rcmdc.exe program as the db2admin administrator, which allows local users to gain privileges via the DB2REMOTECMD named pipe.
2004-10-20
Metasploit
cpe:2.3:a:ibm:db2_universal_database:8.1:*:aix:*:*:*:*:*
CVE-2004-0798
0
null
0.72637
Buffer overflow in the _maincfgret.cgi script for Ipswitch WhatsUp Gold before 8.03 Hotfix 1 allows remote attackers to execute arbitrary code via a long instancename parameter.
2004-10-20
Metasploit
cpe:2.3:a:progress:whatsup_gold:7.03:*:*:*:*:*:*:*;cpe:2.3:a:progress:whatsup_gold:7.04:*:*:*:*:*:*:*;cpe:2.3:a:progress:whatsup_gold:7.0:*:*:*:*:*:*:*;cpe:2.3:a:progress:whatsup_gold:8.01:*:*:*:*:*:*:*;cpe:2.3:a:progress:whatsup_gold:8.03:*:*:*:*:*:*:*;cpe:2.3:a:progress:whatsup_gold:8.0:*:*:*:*:*:*:*
CVE-2004-0964
0
null
0.85695
Buffer overflow in Zinf 2.2.1 on Windows, and other older versions for Linux, allows remote attackers or local users to execute arbitrary code via certain values in a .pls file.
2005-02-09
Metasploit
cpe:2.3:a:zinf:zinf:2.2.1:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
CVE-2004-1037
0
null
0.85829
The search function in TWiki 20030201 allows remote attackers to execute arbitrary commands via shell metacharacters in a search string.
2005-03-01
Metasploit
cpe:2.3:a:twiki:twiki:2003-02-01:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
CVE-2004-1080
0
null
0.89333
The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."
2005-01-10
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:2000:*:small_business_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:2003:*:small_business_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:terminal_server:*:*:*:*:*
CVE-2004-1134
0
null
0.8642
Buffer overflow in the Microsoft W3Who ISAPI (w3who.dll) allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long query string.
2005-01-10
Metasploit
cpe:2.3:a:microsoft:w3who.dll:*:*:*:*:*:*:*:*
CVE-2004-1135
0
null
0.31938
Multiple buffer overflows in WS_FTP Server 5.03 2004.10.14 allow remote attackers to cause a denial of service (service crash) via long (1) SITE, (2) XMKD, (3) MKD, and (4) RNFR commands.
2005-01-10
Metasploit
cpe:2.3:a:ipswitch:ws_ftp_server:5.03:*:*:*:*:*:*:*
CVE-2004-1172
0
null
0.78981
Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname.
2005-01-10
Metasploit
cpe:2.3:a:symantec_veritas:backup_exec:8.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:8.5:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:8.6:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*
CVE-2004-1211
0
null
0.80539
Multiple buffer overflows in the IMAP service in Mercury/32 4.01a allow remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via long arguments to the (1) EXAMINE, (2) SUBSCRIBE, (3) STATUS, (4) APPEND, (5) CHECK, (6) CLOSE, (7) EXPUNGE, (8) FETCH, (9) RENAME, (10) DELETE, (11) LIST, (12) SEARCH, (13) CREATE, or (14) UNSUBSCRIBE commands.
2005-01-10
Metasploit
cpe:2.3:a:david_harris:mercury:4.0.1a:*:win32:*:*:*:*:*
CVE-2004-1315
0
null
0.85909
viewtopic.php in phpBB 2.x before 2.0.11 improperly URL decodes the highlight parameter when extracting words and phrases to highlight, which allows remote attackers to execute arbitrary PHP code by double-encoding the highlight value so that special characters are inserted into the result, which is then processed by PHP exec, as exploited by the Santy.A worm.
2004-11-12
Metasploit
cpe:2.3:a:phpbb_group:phpbb:*:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:1.4.4:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.6c:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.6d:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.7a:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.8a:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0_beta1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0_rc1:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0_rc2:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0_rc3:*:*:*:*:*:*:*;cpe:2.3:a:phpbb_group:phpbb:2.0_rc4:*:*:*:*:*:*:*
CVE-2004-1317
0
null
0.78963
Stack-based buffer overflow in doexec.c in Netcat for Windows 1.1, when running with the -e option, allows remote attackers to execute arbitrary code via a long DNS command.
2004-12-27
Metasploit
cpe:2.3:a:netcat:netcat:1.1:*:*:*:*:*:*:*
CVE-2004-1373
0
null
0.86852
Format string vulnerability in SHOUTcast 1.9.4 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via format string specifiers in a content URL, as demonstrated in the filename portion of a .mp3 file.
2004-12-23
Metasploit
cpe:2.3:a:nullsoft:shoutcast_server:1.9.4:*:linux:*:*:*:*:*;cpe:2.3:a:nullsoft:shoutcast_server:1.9.4:*:mac_os_x:*:*:*:*:*;cpe:2.3:a:nullsoft:shoutcast_server:1.9.4:*:win32:*:*:*:*:*
CVE-2004-1388
0
null
0.74545
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.
2004-12-31
Metasploit
cpe:2.3:a:berlios:gps_daemon:1.25:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.26:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.91:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.92:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.93:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.94:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.95:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.96:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.97:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:1.98:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.0:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.1:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.2:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.3:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.4:*:*:*:*:*:*:*;cpe:2.3:a:berlios:gps_daemon:2.7:*:*:*:*:*:*:*
CVE-2004-1389
0
null
0.35325
Unknown vulnerability in the Veritas NetBackup Administrative Assistant interface for NetBackup BusinesServer 3.4, 3.4.1, and 4.5, DataCenter 3.4, 3.4.1, and 4.5, Enterprise Server 5.1, and NetBackup Server 5.0 and 5.1, allows attackers to execute arbitrary commands via the bpjava-susvc process, possibly related to the call-back feature.
2004-12-31
Metasploit
cpe:2.3:a:veritas:netbackup:3.4.0:*:businessserver:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:3.4.0:*:datacenter:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:3.4.1:*:businessserver:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:3.4.1:*:datacenter:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:4.5.0:*:businessserver:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:4.5.0:*:datacenter:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:5.0:*:server:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:5.1:*:enterprise_server:*:*:*:*:*;cpe:2.3:a:veritas:netbackup:5.1:*:server:*:*:*:*:*
CVE-2004-1464
5.9
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
0.01698
Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port.
2004-12-31
CISA
cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
CVE-2004-1520
0
null
0.88797
Stack-based buffer overflow in IPSwitch IMail 8.13 allows remote authenticated users to execute arbitrary code via a long IMAP DELETE command.
2004-12-31
Metasploit
cpe:2.3:a:ipswitch:imail:8.13:*:*:*:*:*:*:*
CVE-2004-1550
0
null
0.39501
Motorola Wireless Router WR850G running firmware 4.03 allows remote attackers to bypass authentication, log on as an administrator, and obtain sensitive information by repeatedly making an HTTP request for ver.asp until an administrator logs on.
2004-12-31
Metasploit
cpe:2.3:h:motorola:wr850g:4.0.3_firmware:*:*:*:*:*:*:*
CVE-2004-1558
0
null
0.86295
Multiple stack-based buffer overflows in YPOPs! (aka YahooPOPS) 0.4 through 0.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) POP3 USER command or (2) SMTP request.
2004-12-31
Metasploit
cpe:2.3:a:ypops:ypops:0.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4.3:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4.4:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4.5:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4.6:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.4:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.5:*:*:*:*:*:*:*;cpe:2.3:a:ypops:ypops:0.6:*:*:*:*:*:*:*
CVE-2004-1561
0
null
0.78571
Buffer overflow in Icecast 2.0.1 and earlier allows remote attackers to execute arbitrary code via an HTTP request with a large number of headers.
2004-12-31
Metasploit
cpe:2.3:a:icecast:icecast:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:icecast:icecast:2.0:*:*:*:*:*:*:*
CVE-2004-1595
0
null
0.79617
Buffer overflow in ShixxNote 6.net build 117 allows remote attackers to execute arbitrary code via a long font field.
2004-10-13
Metasploit
cpe:2.3:a:shixxnote:shixxnote:6.net:*:*:*:*:*:*:*
CVE-2004-1602
0
null
0.03636
ProFTPD 1.2.x, including 1.2.8 and 1.2.10, responds in a different amount of time when a given username exists, which allows remote attackers to identify valid usernames by timing the server response.
2004-10-15
Nuclei
cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*
CVE-2004-1626
0
null
0.73355
Buffer overflow in Ability Server 2.34, and possibly other versions, allows remote attackers to execute arbitrary code via a long STOR command.
2004-10-22
Metasploit
cpe:2.3:a:code-crafters:ability_server:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:code-crafters:ability_server:2.3.2:*:*:*:*:*:*:*;cpe:2.3:a:code-crafters:ability_server:2.3.4:*:*:*:*:*:*:*
CVE-2004-1638
0
null
0.79074
Buffer overflow in MailCarrier 2.51 allows remote attackers to execute arbitrary code via a long (1) EHLO and possibly (2) HELO command.
2004-10-16
Metasploit
cpe:2.3:a:tabs_laboratories:mailcarrier:2.51:*:*:*:*:*:*:*
CVE-2004-1641
0
null
0.07864
Heap-based buffer overflow in Titan FTP 3.21 and earlier allows remote attackers to cause a denial of service (crash) via a long FTP command such as (1) CWD, (2) STAT, or (3) LIST.
2004-08-29
Nuclei
cpe:2.3:a:south_river_technologies:titan_ftp_server:2.10:*:*:*:*:*:*:*;cpe:2.3:a:south_river_technologies:titan_ftp_server:2.2:*:*:*:*:*:*:*;cpe:2.3:a:south_river_technologies:titan_ftp_server:3.01:*:*:*:*:*:*:*;cpe:2.3:a:south_river_technologies:titan_ftp_server:3.10:*:*:*:*:*:*:*;cpe:2.3:a:south_river_technologies:titan_ftp_server:3.21:*:*:*:*:*:*:*
CVE-2004-1965
0
null
0.00265
Multiple cross-site scripting (XSS) vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) redirect parameter to member.php, (2) to parameter to myhome.php (3) TID parameter to post.php, or (4) redirect parameter to index.php.
2004-04-25
Nuclei
cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.0_rc1:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.0_rc2:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.0_rc3:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:openbb:openbb:1.0.8:*:*:*:*:*:*:*
CVE-2004-2074
0
null
0.55562
Format string vulnerability in Dream FTP 1.02 allows local users to cause a denial of service (crash) via format string specifiers in the (1) PASS or (2) RETR commands.
2004-12-31
Metasploit
cpe:2.3:a:bolintech:dream_ftp_server:1.02:*:*:*:*:*:*:*
CVE-2004-2086
0
null
0.68835
Stack-based buffer overflow in results.stm for Sambar Server before the 6.0 production release allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a long query parameter.
2004-02-06
Metasploit
cpe:2.3:a:sambar:sambar_server:6.0:*:*:*:*:*:*:*;cpe:2.3:a:sambar:sambar_server:6.0:beta3:*:*:*:*:*:*
CVE-2004-2111
0
null
0.8831
Stack-based buffer overflow in the site chmod command in Serv-U FTP Server before 4.2 allows remote attackers to execute arbitrary code via a long filename.
2004-12-31
Metasploit
cpe:2.3:a:solarwinds:serv-u_file_server:*:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:4.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.0:*:*:*:*:*:*:*
CVE-2004-2221
0
null
0.77421
Buffer overflow in SoftCart.exe in Mercantec SoftCart 4.00b allows remote attackers to execute arbitrary code via a long parameter in an HTTP GET request.
2004-12-31
Metasploit
cpe:2.3:a:mercantec:softcart:4.00b:*:*:*:*:*:*:*
CVE-2004-2271
0
null
0.81176
Buffer overflow in MiniShare 1.4.1 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request.
2004-12-31
Metasploit
cpe:2.3:a:minishare:minimal_http_server:*:*:*:*:*:*:*:*
CVE-2004-2416
0
null
0.75321
Buffer overflow in the logging component of CCProxy allows remote attackers to execute arbitrary code via a long HTTP GET request.
2004-12-31
Metasploit
cpe:2.3:a:youngzsoft:ccproxy:6.0:*:*:*:*:*:*:*
CVE-2004-2466
0
null
0.72511
chat.ghp in Easy Chat Server 1.2 allows remote attackers to cause a denial of service (server crash) via a long username parameter, possibly due to a buffer overflow. NOTE: it was later reported that 2.2 is also affected.
2004-12-31
Metasploit
cpe:2.3:a:efs_software:easy_chat_server:1.2:*:*:*:*:*:*:*;cpe:2.3:a:efs_software:easy_chat_server:2.2:*:*:*:*:*:*:*
CVE-2004-2687
0
null
0.8951
distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks.
2004-12-31
Metasploit/Nuclei
cpe:2.3:a:apple:xcode:1.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
CVE-2004-2691
0
null
0.77285
Unspecified vulnerability in 3Com SuperStack 3 4400 switches with firmware version before 3.31 allows remote attackers to cause a denial of service (device reset) via a crafted request to the web management interface. NOTE: the provenance of this information is unknown; details are obtained from third party reports.
2004-12-31
Metasploit
cpe:2.3:h:3com:3c17205-us:*:firmware_3.30:*:*:*:*:*:*;cpe:2.3:h:3com:3c17210-us:*:firmware_3.30:*:*:*:*:*:*;cpe:2.3:h:3com:superstack_3_switch:4400:firmware_3.30:*:*:*:*:*:*;cpe:2.3:h:3com:superstack_3_switch:4400_se:firmware_3.30:*:*:*:*:*:*
CVE-2005-0043
0
null
0.7991
Buffer overflow in Apple iTunes 4.7 allows remote attackers to execute arbitrary code via a long URL in (1) .m3u or (2) .pls playlist files.
2005-05-02
Metasploit
cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*
CVE-2005-0059
0
null
0.89115
Buffer overflow in the Message Queuing component of Microsoft Windows 2000 and Windows XP SP1 allows remote attackers to execute arbitrary code via a crafted message.
2005-05-02
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:embedded:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
CVE-2005-0116
0
null
0.91763
AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl.
2005-01-18
Metasploit
cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
CVE-2005-0260
0
null
0.81028
Stack-based buffer overflow in the Discovery Service for BrightStor ARCserve Backup 11.1 and earlier allows remote attackers to execute arbitrary code via a long packet to UDP port 41524, which is not properly handled in a recvfrom call.
2005-05-02
Metasploit
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*
CVE-2005-0277
0
null
0.79303
Buffer overflow in the FTP service in 3Com 3CDaemon 2.0 revision 10 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via (1) a long username in the USER command or (2) an FTP command that contains a long argument, such as cd, send, or ls.
2005-05-02
Metasploit
cpe:2.3:a:3com:3cdaemon:2.0:revision_10:*:*:*:*:*:*
CVE-2005-0308
0
null
0.78115
Buffer overflow in the wsprintf function in W32Dasm 8.93 and earlier allows remote attackers to execute arbitrary code via a large import or export function name.
2005-01-24
Metasploit
cpe:2.3:a:ursoftware:w32dasm:8.94:*:*:*:*:*:*:*
CVE-2005-0353
0
null
0.78339
Buffer overflow in the Sentinel LM (Lservnt) service in the Sentinel License Manager 7.2.0.2 allows remote attackers to execute arbitrary code by sending a large amount of data to UDP port 5093.
2005-05-02
Metasploit
cpe:2.3:a:safenet:sentinel_license_manager:7.2_.0.2:*:*:*:*:*:*:*
CVE-2005-0455
0
null
0.75424
Stack-based buffer overflow in the CSmil1Parser::testAttributeFailed function in smlparse.cpp for RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1 allows remote attackers to execute arbitrary code via a .SMIL file with a large system-screen-size value.
2005-05-02
Metasploit
cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0_6.0.12.690:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0_beta:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1016_beta:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1053:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:8.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:*
CVE-2005-0478
0
null
0.65476
Multiple buffer overflows in TrackerCam 5.12 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) an HTTP request with a long User-Agent header or (2) a long argument to an arbitrary PHP script.
2005-03-30
Metasploit
cpe:2.3:a:trackercam:trackercam:*:*:*:*:*:*:*:*
CVE-2005-0491
0
null
0.84329
Stack-based buffer overflow in Knox Arkeia Server Backup 5.3.x allows remote attackers to execute arbitrary code via a long type 77 request.
2005-05-02
Metasploit
cpe:2.3:a:knox_software:arkeia_server_backup:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.0_rc1:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.0_rc2:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.0_rc3:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.0_rc4:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:knox_software:arkeia_server_backup:5.3.4:*:*:*:*:*:*:*
CVE-2005-0511
0
null
0.82752
misc.php for vBulletin 3.0.6 and earlier, when "Add Template Name in HTML Comments" is enabled, allows remote attackers to execute arbitrary PHP code via nested variables in the template parameter.
2005-02-21
Metasploit
cpe:2.3:a:jelsoft:vbulletin:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.0:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.0_beta_2:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.0_beta_3:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.2.9_can:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.0_beta_2:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.0_can4:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.0_rc4:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*
CVE-2005-0581
0
null
0.72663
Multiple buffer overflows in Computer Associates (CA) License Client and Server 0.1.0.15 allow remote attackers to execute arbitrary code via (1) certain long fields in the Checksum item in a GCR request, (2) a long IP address, hostname, or netmask values in a GCR request, (3) a long last parameter in a GETCONFIG packet, or (4) long values in a request with an invalid format.
2005-05-02
Metasploit
cpe:2.3:a:broadcom:license_software:0.1.0.15:*:*:*:*:*:*:*
CVE-2005-0595
0
null
0.78362
Buffer overflow in ext.dll in BadBlue 2.55 allows remote attackers to execute arbitrary code via a long mfcisapicommand parameter.
2005-05-02
Metasploit
cpe:2.3:a:working_resources_inc.:badblue:2.55:*:*:*:*:*:*:*
CVE-2005-0684
0
null
0.71813
Multiple buffer overflows in the web tool for MySQL MaxDB before 7.5.00.26 allows remote attackers to execute arbitrary code via (1) an HTTP GET request with a long file parameter after a percent ("%") sign or (2) a long Lock-Token string to the WebDAV functionality, which is not properly handled by the getLockTokenHeader function in WDVHandler_CommonUtils.c.
2005-04-25
Metasploit
cpe:2.3:a:mysql:maxdb:7.5.00.08:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.11:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.12:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.14:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.15:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.16:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.18:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.19:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00.23:*:*:*:*:*:*:*;cpe:2.3:a:mysql:maxdb:7.5.00:*:*:*:*:*:*:*
CVE-2005-0768
0
null
0.75364
Buffer overflow in the administration web server for GoodTech Telnet Server 4.0 and 5.0, and possibly all versions before 5.0.7, allows remote attackers to execute arbitrary code via a long string to port 2380.
2005-05-02
Metasploit
cpe:2.3:a:goodtech_systems:goodtech_telnet_server:4.0:*:windows_nt:*:*:*:*:*;cpe:2.3:a:goodtech_systems:goodtech_telnet_server:5.0:*:windows_nt:*:*:*:*:*
CVE-2005-0771
0
null
0.81368
VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106.
2005-06-23
Metasploit
cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*
CVE-2005-0773
0
null
0.75181
Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument.
2005-06-18
Metasploit
cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0.4019:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0.4170:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0.4172:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0.4174:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0.4202:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.3:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1127.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1151.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152.4:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.1154:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.306:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1.307:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691_sp2:*:*:*:*:*:*:*
CVE-2005-0850
0
null
0.01037
FileZilla FTP server before 0.9.6 allows remote attackers to cause a denial of service via a request for a filename containing an MS-DOS device name such as CON, NUL, COM1, LPT1, and others.
2005-05-02
Nuclei
cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*
CVE-2005-0851
0
null
0.01037
FileZilla FTP server before 0.9.6, when using MODE Z (zlib compression), allows remote attackers to cause a denial of service (infinite loop) via certain file uploads or directory listings.
2005-05-02
Nuclei
cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*
CVE-2005-1009
0
null
0.83516
Multiple buffer overflows in BakBone NetVault 6.x and 7.x allow (1) remote attackers to execute arbitrary code via a modified computer name and length that leads to a heap-based buffer overflow, or (2) local users to execute arbitrary code via a long Name entry in the configure.cfg file.
2005-05-02
Metasploit
cpe:2.3:a:bakbone:netvault:7.0:*:*:*:*:*:*:*;cpe:2.3:a:bakbone:netvault:7.1:*:*:*:*:*:*:*
CVE-2005-1018
0
null
0.71743
Buffer overflow in the UniversalAgent for Computer Associates (CA) BrightStor ARCserve Backup allows remote authenticated users to cause a denial of service or execute arbitrary code via an agent request to TCP port 6050 with a large argument before the option field.
2005-05-02
Metasploit
cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*
CVE-2005-1099
0
null
0.79026
Multiple buffer overflows in the HandleChild function in server.c in Greylisting daemon (GLD) 1.3 and 1.4, when GLD is listening on a network interface, allow remote attackers to execute arbitrary code.
2005-04-12
Metasploit
cpe:2.3:a:salim_gasmi:gld:1.0:*:*:*:*:*:*:*;cpe:2.3:a:salim_gasmi:gld:1.1:*:*:*:*:*:*:*;cpe:2.3:a:salim_gasmi:gld:1.2:*:*:*:*:*:*:*;cpe:2.3:a:salim_gasmi:gld:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:salim_gasmi:gld:1.3:*:*:*:*:*:*:*;cpe:2.3:a:salim_gasmi:gld:1.4:*:*:*:*:*:*:*
CVE-2005-1213
0
null
0.83908
Stack-based buffer overflow in the news reader for Microsoft Outlook Express (MSOE.DLL) 5.5 SP2, 6, and 6 SP1 allows remote malicious NNTP servers to execute arbitrary code via a LIST response with a long second field.
2005-06-14
Metasploit
cpe:2.3:a:microsoft:outlook_express:5.5:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook_express:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook_express:6.0:sp1:*:*:*:*:*:*
CVE-2005-1272
0
null
0.78265
Stack-based buffer overflow in the Backup Agent for Microsoft SQL Server in BrightStor ARCserve Backup Agent for SQL Server 11.0 allows remote attackers to execute arbitrary code via a long string sent to port (1) 6070 or (2) 6050.
2005-08-05
Metasploit
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11.0:*:oracle:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:oracle:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:9.0_1:*:oracle:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.0:*:sap:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.0:*:sql:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:exchange:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:sap:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:sql:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11:*:exchange:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:9.0.1:*:exchange:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:9.0.1:*:sap:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:9.0.1:*:sql:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.0:*:oracle:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.0:*:sap:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.0:*:sql:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.5:*:oracle:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.5:*:sap:*:*:*:*:*;cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.5:*:sql:*:*:*:*:*
CVE-2005-1323
0
null
0.78183
Buffer overflow in NetFtpd for NetTerm 5.1.1 and earlier allows remote attackers to execute arbitrary code via a long USER command.
2005-05-02
Metasploit
cpe:2.3:a:intersoft:netterm:4.2.2:*:*:*:*:*:*:*
CVE-2005-1348
0
null
0.91095
Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header.
2005-05-02
Metasploit
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*
CVE-2005-1415
0
null
0.70623
Buffer overflow in GlobalSCAPE Secure FTP Server 3.0.2 allows remote authenticated users to execute arbitrary code via a long FTP command.
2005-05-03
Metasploit
cpe:2.3:a:globalscape:secure_ftp_server:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:globalscape:secure_ftp_server:3.0:*:*:*:*:*:*:*
CVE-2005-1543
0
null
0.80369
Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests.
2005-05-25
Metasploit
cpe:2.3:a:novell:zenworks:6.5:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_desktops:3.2:sp2:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_desktops:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_desktops:4.0:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_remote_management:*:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_server_management:6.5:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_servers:3.2:*:*:*:*:*:*:*
CVE-2005-1790
0
null
0.78794
Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
2005-06-01
Metasploit
cpe:2.3:a:microsoft:internet_explorer:6.0.2800.1106:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0.2900.2180:*:*:*:*:*:*:*
CVE-2005-1812
0
null
0.82151
Multiple stack-based buffer overflows in FutureSoft TFTP Server Evaluation Version 1.0.0.1 allow remote attackers to execute arbitrary code via a long (1) filename or (2) transfer mode string in a Read Request (RRQ) or Write Request (WRQ) packet.
2005-06-01
Metasploit
cpe:2.3:a:futuresoft:tftp_server_2000:1.0.0.1:*:*:*:*:*:*:*
CVE-2005-1815
0
null
0.62867
Multiple buffer overflows in Hummingbird Connectivity inetD 10.0.0.1 and 9.0.0.4 allows attackers to cause a denial of service and possibly execute arbitrary code via (1) an FTP command with a long argument to FTPD (ftpdw.exe) or (2) a large amount of data to LPD (Lpdw.exe).
2005-06-01
Metasploit
cpe:2.3:a:hummingbird:connectivity:10.0:*:*:*:*:*:*:*;cpe:2.3:a:hummingbird:connectivity:7.1:*:*:*:*:*:*:*;cpe:2.3:a:hummingbird:connectivity:9.0:*:*:*:*:*:*:*
CVE-2005-1921
0
null
0.86898
Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.
2005-07-05
Metasploit
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*;cpe:2.3:a:gggeek:phpxmlrpc:*:*:*:*:*:*:*:*;cpe:2.3:a:php:xml_rpc:*:*:*:*:*:pear:*:*;cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
CVE-2005-1983
0
null
0.87719
Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by the Zotob (aka Mytob) worm.
2005-08-10
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
CVE-2005-2086
0
null
0.86512
PHP remote file inclusion vulnerability in viewtopic.php in phpBB 2.0.15 and earlier allows remote attackers to execute arbitrary PHP code.
2005-07-05
Metasploit
cpe:2.3:a:phpbb_group:phpbb:2.0.15:*:*:*:*:*:*:*
CVE-2005-2120
0
null
0.76202
Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.
2005-10-13
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
CVE-2005-2265
0
null
0.82043
Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 allows remote attackers to cause a denial of service (access violation and crash), and possibly execute arbitrary code, by calling InstallVersion.compareTo with an object instead of a string.
2005-07-13
Metasploit
cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.5:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.5:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.5:rc2:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.6:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.6:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:rc2:*:*:*:*:*:*;cpe:2.3:a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*
CVE-2005-2278
0
null
0.85437
Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.
2005-07-18
Metasploit
cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*
CVE-2005-2287
0
null
0.79843
SoftiaCom wMailServer 1.0 and 2.0 allows remote attackers to cause a denial of service (application crash) via a large TCP packet with a leading space, possibly triggering a buffer overflow.
2005-07-18
Metasploit
cpe:2.3:a:softiacom:wmailserver:1.0:*:*:*:*:*:*:*;cpe:2.3:a:softiacom:wmailserver:2.0:*:*:*:*:*:*:*
CVE-2005-2297
0
null
0.71529
Stack-based buffer overflow in TreeAction.do in Sybase EAServer 4.2.5 through 5.2 allows remote authenticated users to execute arbitrary code via a large javascript parameter.
2005-07-19
Metasploit
cpe:2.3:a:sybase:easerver:4.2.5:*:*:*:*:*:*:*;cpe:2.3:a:sybase:easerver:5.0:*:*:*:*:*:*:*;cpe:2.3:a:sybase:easerver:5.1:*:*:*:*:*:*:*;cpe:2.3:a:sybase:easerver:5.2:*:*:*:*:*:*:*
CVE-2005-2373
0
null
0.37407
Buffer overflow in SlimFTPd 3.15 and 3.16 allows remote authenticated users to execute arbitrary code via a long directory name to (1) LIST, (2) DELE or (3) RNFR commands.
2005-07-26
Metasploit
cpe:2.3:a:whitsoft_development:slimftpd:3.15:*:*:*:*:*:*:*;cpe:2.3:a:whitsoft_development:slimftpd:3.16:*:*:*:*:*:*:*
CVE-2005-2428
0
null
0.06321
Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.
2005-08-03
Nuclei
cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:6.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:6.5:*:*:*:*:*:*:*
CVE-2005-2535
0
null
0.82941
Buffer overflow in the Discovery Service in BrightStor ARCserve Backup 9.0 through 11.1 allows remote attackers to execute arbitrary commands via a large packet to TCP port 41523, a different vulnerability than CVE-2005-0260.
2005-08-10
Metasploit
cpe:2.3:a:broadcom:arcserve_backup_2000:r16.5:*:windows:ja:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:aix:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:linux:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:macintosh:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:netware:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:solaris:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:tru64:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:7.0:*:linux:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:ja:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:netware:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup_hp:11.1:*:hp:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:aix:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:hpux:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:mainframe_linux:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:aix:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:hp:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:solaris:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:tru64:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:windows:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10:*:solaris:*:*:*:*:*
CVE-2005-2551
0
null
0.71755
Buffer overflow in dhost.exe in iMonitor for Novell eDirectory 8.7.3 on Windows allows attackers to cause a denial of service (crash) and obtain access to files via unknown vectors.
2005-08-12
Metasploit
cpe:2.3:a:novell:edirectory:8.7.3:*:*:*:*:*:*:*
CVE-2005-2611
0
null
0.78897
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
2005-08-17
Metasploit
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4019:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4170:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4172:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4174:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4202:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.3:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1127_.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1151_.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152_.4:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1154:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1156:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.306:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.307:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5520:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_8.6:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454_sp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691_sp2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:unix_linux_server:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp3:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp4:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp5:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp6:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp7:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp8:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp3:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp4:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp5:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp6:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp7:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp8:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp3:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp4:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp5:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp1:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp2:*:*:*:*:*:*:*;cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp3:*:*:*:*:*:*:*
CVE-2005-2612
0
null
0.73416
Direct code injection vulnerability in WordPress 1.5.1.3 and earlier allows remote attackers to execute arbitrary PHP code via the cache_lastpostdate[server] cookie.
2005-08-17
Metasploit
cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
CVE-2005-2668
0
null
0.82851
Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors.
2005-08-23
Metasploit
cpe:2.3:a:broadcom:advantage_data_transport:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:adviseit:2.4:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_portal:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_san_manager:1.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp2:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_san_manager:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:cleverpath_aion:10.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:cleverpath_ecm:3.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:cleverpath_olap:5.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_admin:8.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_admin:8.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:messaging:1.11:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:messaging:1.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:messaging:1.7:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_asset_management:3.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_asset_management:3.2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp2:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_data_transport_option:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_jasmine:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_management_portal:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_management_portal:3.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_nsm_wireless_network_management_option:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_performance_management:2.4:sp3:openvms:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_service_level_management:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_service_level_management:3.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_software_delivery:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp2:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_software_delivery:4.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_tng:2.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_tng:2.2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_tng:2.4.2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_tng:2.4:*:*:*:*:*:*:*;cpe:2.3:a:ca:etrust_admin:2.1:*:*:*:*:*:*:*;cpe:2.3:a:ca:etrust_admin:2.4:*:*:*:*:*:*:*;cpe:2.3:a:ca:etrust_admin:2.7:*:*:*:*:*:*:*;cpe:2.3:a:ca:etrust_admin:2.9:*:*:*:*:*:*:*;cpe:2.3:a:ca:unicenter_asset_management:4.0:sp1:*:*:*:*:*:*;cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp1:*:*:*:*:*:*;cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp2:*:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:3.5:*:websphere_mq:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:4.0:*:lotus_notes_domino:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:4.0:*:microsoft_exchange:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:4.1:*:microsoft_exchange:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:5.0.1:*:web_servers:*:*:*:*:*;cpe:2.3:a:ca:unicenter_management:5.0:*:web_servers:*:*:*:*:*;cpe:2.3:a:ca:unicenter_software_delivery:4.0:sp1:*:*:*:*:*:*;cpe:2.3:a:ca:unicenter_tng:2.2:*:*:ja:*:*:*:*
CVE-2005-2733
0
null
0.80569
upload_img_cgi.php in Simple PHP Blog (SPHPBlog) does not properly restrict file extensions of uploaded files, which could allow remote attackers to execute arbitrary code.
2005-08-30
Metasploit
cpe:2.3:a:alexander_palmo:simple_php_blog:0.4.0:*:*:*:*:*:*:*
CVE-2005-2773
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.89823
HP OpenView Network Node Manager 6.2 through 7.50 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) node parameter to connectedNodes.ovpl, (2) cdpView.ovpl, (3) freeIPaddrs.ovpl, and (4) ecscmg.ovpl.
2005-09-02
Metasploit/CISA
cpe:2.3:a:hp:openview_network_node_manager:*:*:*:*:*:*:*:*
CVE-2005-2799
0
null
0.85392
Buffer overflow in apply.cgi in Linksys WRT54G 3.01.03, 3.03.6, and possibly other versions before 4.20.7, allows remote attackers to execute arbitrary code via a long HTTP POST request.
2005-09-15
Metasploit
cpe:2.3:h:linksys:wrt54g:3.01.3:*:*:*:*:*:*:*;cpe:2.3:h:linksys:wrt54g:3.03.6:*:*:*:*:*:*:*
CVE-2005-2847
0
null
0.87047
img.pl in Barracuda Spam Firewall running firmware 3.1.16 and 3.1.17 allows remote attackers to execute arbitrary commands via shell metacharacters in the f parameter.
2005-09-08
Metasploit
cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.1.16:*:*:*:*:*:*:*;cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.1.17:*:*:*:*:*:*:*
CVE-2005-2852
0
null
0.60379
Unknown vulnerability in CIFS.NLM in Novell Netware 6.5 SP2 and SP3, 5.1, and 6.0 allows remote attackers to cause a denial of service (ABEND) via an incorrect password length, as exploited by the "worm.rbot.ccc" worm.
2005-09-08
Metasploit
cpe:2.3:o:novell:netware:5.1:*:*:*:*:*:*:*;cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*;cpe:2.3:o:novell:netware:6.5:sp2:*:*:*:*:*:*;cpe:2.3:o:novell:netware:6.5:sp3:*:*:*:*:*:*