CVE
stringlengths 13
16
| CVSS Score
float64 0
10
| CVSS_Vector
stringclasses 257
values | EPSS
float64 0
0.95
| Description
stringlengths 28
3.79k
| Published
stringdate 1990-08-14 00:00:00
2025-10-05 00:00:00
| Source
stringclasses 7
values | CPE
stringlengths 33
51k
⌀ |
|---|---|---|---|---|---|---|---|
CVE-2005-2877
| 0
| null | 0.81668
|
The history (revision control) function in TWiki 02-Sep-2004 and earlier allows remote attackers to execute arbitrary code via shell metacharacters, as demonstrated via the rev parameter to TWikiUsers.
|
2005-09-16
|
Metasploit
|
cpe:2.3:a:twiki:twiki:2000-12-01:*:*:*:*:*:*:*;cpe:2.3:a:twiki:twiki:2001-12-01:*:*:*:*:*:*:*;cpe:2.3:a:twiki:twiki:2003-02-01:*:*:*:*:*:*:*;cpe:2.3:a:twiki:twiki:2004-09-01:*:*:*:*:*:*:*;cpe:2.3:a:twiki:twiki:2004-09-02:*:*:*:*:*:*:*
|
CVE-2005-3155
| 0
| null | 0.86484
|
Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote attackers to execute arbitrary code.
|
2005-10-05
|
Metasploit
|
cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*
|
CVE-2005-3190
| 0
| null | 0.78665
|
Buffer overflow in Computer Associates (CA) iGateway 3.0 and 4.0 before 4.0.050623, when running in debug mode, allows remote attackers to execute arbitrary code via HTTP GET requests.
|
2005-10-13
|
Metasploit
|
cpe:2.3:a:broadcom:igateway:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:igateway:4.0:*:*:*:*:*:*:*
|
CVE-2005-3252
| 0
| null | 0.83516
|
Stack-based buffer overflow in the Back Orifice (BO) preprocessor for Snort before 2.4.3 allows remote attackers to execute arbitrary code via a crafted UDP packet.
|
2005-10-18
|
Metasploit
|
cpe:2.3:a:sourcefire:snort:2.4.0:*:*:*:*:*:*:*;cpe:2.3:a:sourcefire:snort:2.4.1:*:*:*:*:*:*:*;cpe:2.3:a:sourcefire:snort:2.4.2:*:*:*:*:*:*:*
|
CVE-2005-3314
| 0
| null | 0.83419
|
Stack-based buffer overflow in the IMAP daemon in Novell Netmail 3.5.2 allows remote attackers to execute arbitrary code via "long verb arguments."
|
2005-11-18
|
Metasploit
|
cpe:2.3:a:novell:netmail:3.5.2:e-ftfl:*:*:*:*:*:*
|
CVE-2005-3344
| 0
| null | 0.1015
|
The default installation of Horde 3.0.4 contains an administrative account with a blank password, which allows remote attackers to gain access.
|
2005-11-16
|
Nuclei
|
cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
|
CVE-2005-3398
| 0
| null | 0.39542
|
The default configuration of the web server for the Solaris Management Console (SMC) in Solaris 8, 9, and 10 enables the HTTP TRACE method, which could allow remote attackers to obtain sensitive information such as cookies and authentication data from HTTP headers.
|
2005-11-01
|
Metasploit
|
cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
|
CVE-2005-3498
| 0
| null | 0.51951
|
IBM WebSphere Application Server 5.0.x before 5.02.15, 5.1.x before 5.1.1.8, and 6.x before fixpack V6.0.2.5, when session trace is enabled, records a full URL including the queryString in the trace logs when an application encodes a URL, which could allow attackers to obtain sensitive information.
|
2005-11-04
|
Metasploit
|
cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*
|
CVE-2005-3589
| 0
| null | 0.67665
|
Buffer overflow in FileZilla Server Terminal 0.9.4d may allow remote attackers to cause a denial of service (terminal crash) via a long USER ftp command.
|
2005-11-16
|
Metasploit
|
cpe:2.3:a:filezilla:filezilla_server_terminal:0.9.4d:*:*:*:*:*:*:*
|
CVE-2005-3634
| 0
| null | 0.0214
|
frameset.htm in the BSP runtime in SAP Web Application Server (WAS) 6.10 through 7.00 allows remote attackers to log users out and redirect them to arbitrary web sites via a close command in the sap-sessioncmd parameter and a URL in the sap-exiturl parameter.
|
2005-11-16
|
Nuclei
|
cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_web_application_server:6.20:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_web_application_server:6.40:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_web_application_server:7.0:*:*:*:*:*:*:*
|
CVE-2005-3683
| 0
| null | 0.84662
|
Stack-based buffer overflow in freeFTPd before 1.0.9 with Logging enabled, allows remote attackers to cause a denial of service (application crash), and possibly execute arbitrary code, via a long USER command.
|
2005-11-19
|
Metasploit
|
cpe:2.3:a:freeftpd:freeftpd:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:freeftpd:freeftpd:1.0:*:*:*:*:*:*:*
|
CVE-2005-3757
| 0
| null | 0.75746
|
The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.
|
2005-11-22
|
Metasploit
|
cpe:2.3:h:google:mini_search_appliance:*:*:*:*:*:*:*:*;cpe:2.3:h:google:search_appliance:*:*:*:*:*:*:*:*
|
CVE-2005-4085
| 0
| null | 0.77161
|
Buffer overflow in BlueCoat (a) WinProxy before 6.1a and (b) the web console access functionality in ProxyAV before 2.4.2.3 allows remote attackers to execute arbitrary code via a long Host: header.
|
2005-12-31
|
Metasploit
|
cpe:2.3:a:bluecoat:webproxy:4.0:r1a:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1b:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1c:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1e:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1f:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1h:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1k:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1m:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1n:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:4.0:r1p:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:5.0:r1a:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:5.0:r1b:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:5.0:r1c:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:5.1:r1a:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:5.1:r1d:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:5.1:r1e:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:5.2:r1a:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:6.0:r1a:*:*:*:*:*:*;cpe:2.3:a:bluecoat:webproxy:6.0:r1c:*:*:*:*:*:*;cpe:2.3:h:bluecoat:proxyav:*:*:*:*:*:*:*:*
|
CVE-2005-4145
| 0
| null | 0.6483
|
The MSDE version of Lyris ListManager 5.0 through 8.9b configures the sa account in the database to use a password with a small search space ("lyris" and up to 5 digits, possibly from the process ID), which allows remote attackers to gain access via a brute force attack.
|
2005-12-10
|
Metasploit
|
cpe:2.3:a:lyris_technologies_inc:listmanager:5.0:*:*:*:*:*:*:*;cpe:2.3:a:lyris_technologies_inc:listmanager:6.0:*:*:*:*:*:*:*;cpe:2.3:a:lyris_technologies_inc:listmanager:7.0:*:*:*:*:*:*:*;cpe:2.3:a:lyris_technologies_inc:listmanager:8.0:*:*:*:*:*:*:*;cpe:2.3:a:lyris_technologies_inc:listmanager:8.8a:*:*:*:*:*:*:*
|
CVE-2005-4267
| 0
| null | 0.76892
|
Stack-based buffer overflow in Qualcomm WorldMail 3.0 allows remote attackers to execute arbitrary code via a long IMAP command that ends with a "}" character, as demonstrated using long (1) LIST, (2) LSUB, (3) SEARCH TEXT, (4) STATUS INBOX, (5) AUTHENTICATE, (6) FETCH, (7) SELECT, and (8) COPY commands.
|
2005-12-21
|
Metasploit
|
cpe:2.3:a:qualcomm:worldmail:3.0:*:*:*:*:*:*:*
|
CVE-2005-4385
| 0
| null | 0.00231
|
Cross-site scripting (XSS) vulnerability in search.htm in Cofax 2.0 RC3 and earlier allows remote attackers to inject arbitrary web script or HTML via the searchstring parameter.
|
2005-12-20
|
Nuclei
|
cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*;cpe:2.3:a:cofax:cofax:1.9.9d:*:*:*:*:*:*:*;cpe:2.3:a:cofax:cofax:2.0_rc1:*:*:*:*:*:*:*;cpe:2.3:a:cofax:cofax:2.0_rc2:*:*:*:*:*:*:*;cpe:2.3:a:cofax:cofax:2.0_rc3:*:*:*:*:*:*:*
|
CVE-2005-4411
| 0
| null | 0.8155
|
Buffer overflow in Mercury Mail Transport System 4.01b allows remote attackers to execute arbitrary code via a long request to TCP port 105.
|
2005-12-20
|
Metasploit
|
cpe:2.3:a:david_harris:mercury_mail_transport_system:4.01b:*:*:*:*:*:*:*
|
CVE-2005-4560
| 0
| null | 0.90524
|
The Windows Graphical Device Interface library (GDI32.DLL) in Microsoft Windows allows remote attackers to execute arbitrary code via a Windows Metafile (WMF) format image with a crafted SETABORTPROC GDI Escape function call, related to the Windows Picture and Fax Viewer (SHIMGVW.DLL), a different vulnerability than CVE-2005-2123 and CVE-2005-2124, and as originally discovered in the wild on unionseek.com.
|
2005-12-28
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
|
CVE-2005-4734
| 0
| null | 0.7409
|
Stack-based buffer overflow in IISWebAgentIF.dll in RSA Authentication Agent for Web (aka SecurID Web Agent) 5.2 and 5.3 for IIS allows remote attackers to execute arbitrary code via a long url parameter in the Redirect method.
|
2005-12-31
|
Metasploit
|
cpe:2.3:a:rsa:authentication_agent_for_web:5.2:*:*:*:*:*:*:*;cpe:2.3:a:rsa:authentication_agent_for_web:5.3:*:*:*:*:*:*:*
|
CVE-2005-4797
| 0
| null | 0.73269
|
Directory traversal vulnerability in printd line printer daemon (lpd) in Solaris 7 through 10 allows remote attackers to delete arbitrary files via ".." sequences in an "Unlink data file" command.
|
2005-12-31
|
Metasploit
|
cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
|
CVE-2005-4832
| 0
| null | 0.52586
|
SQL injection vulnerability in the Oracle Database Server 10g allows remote authenticated users to execute arbitrary SQL commands with elevated privileges via the SUBSCRIPTION_NAME parameter in the (1) SYS.DBMS_CDC_SUBSCRIBE and (2) SYS.DBMS_CDC_ISUBSCRIBE packages, a different vector than CVE-2005-1197.
|
2005-12-31
|
Metasploit
|
cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:enterprise_10.2.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:enterprise_9.0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:enterprise_9.0.4_.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_10.1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_10.1.0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_10.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_10.1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_10.10.3.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_10.1_.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_10.2.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_9.0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:personal_9.0.4_.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.1.0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.1_.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_10.2.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_9.0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle10g:standard_9.0.4_.0:*:*:*:*:*:*:*
|
CVE-2006-0003
| 0
| null | 0.91596
|
Unspecified vulnerability in the RDS.Dataspace ActiveX control, which is contained in ActiveX Data Objects (ADO) and distributed in Microsoft Data Access Components (MDAC) 2.7 and 2.8, allows remote attackers to execute arbitrary code via unknown attack vectors.
|
2006-04-12
|
Metasploit
|
cpe:2.3:a:microsoft:data_access_components:2.5:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.7:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.8:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.8:sp2:*:*:*:*:*:*
|
CVE-2006-0027
| 0
| null | 0.87053
|
Unspecified vulnerability in Microsoft Exchange allows remote attackers to execute arbitrary code via e-mail messages with crafted (1) vCal or (2) iCal Calendar properties.
|
2006-05-10
|
Metasploit
|
cpe:2.3:a:microsoft:exchange_server:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2003:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
|
CVE-2006-0295
| 0
| null | 0.82372
|
Mozilla Firefox 1.5, Thunderbird 1.5 if Javascript is enabled in mail, and SeaMonkey before 1.0 might allow remote attackers to execute arbitrary code via the QueryInterface method of the built-in Location and Navigator objects, which leads to memory corruption.
|
2006-02-02
|
Metasploit
|
cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*
|
CVE-2006-0395
| 0
| null | 0.64008
|
The Download Validation in Mail in Mac OS X 10.4 does not properly recognize attachment file types to warn a user of an unsafe type, which allows user-assisted remote attackers to execute arbitrary code via crafted file types.
|
2006-08-05
|
Metasploit
|
cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*
|
CVE-2006-0441
| 0
| null | 0.81125
|
Stack-based buffer overflow in Sami FTP Server 2.0.1 allows remote attackers to execute arbitrary code via a long USER command, which triggers the overflow when the log is viewed.
|
2006-01-26
|
Metasploit
|
cpe:2.3:a:karjasoft:sami_ftp_server:2.0.1:*:*:*:*:*:*:*
|
CVE-2006-0460
| 0
| null | 0.82218
|
Multiple buffer overflows in BomberClone before 0.11.6.2 allow remote attackers to execute arbitrary code via long error messages.
|
2006-02-17
|
Metasploit
|
cpe:2.3:a:bomberclone:bomberclone:0.10.0:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.11.3:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.11.4:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.11.5:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.11.6:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.1:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.2:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.3:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.4:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.5:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.6:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.7:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.8:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.9.5:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.9.6:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.9.7:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.9.8:*:*:*:*:*:*:*;cpe:2.3:a:bomberclone:bomberclone:0.9.9:*:*:*:*:*:*:*
|
CVE-2006-0476
| 0
| null | 0.88573
|
Buffer overflow in Nullsoft Winamp 5.12 allows remote attackers to execute arbitrary code via a playlist (pls) file with a long file name (File1 field).
|
2006-01-31
|
Metasploit
|
cpe:2.3:a:nullsoft:winamp:5.12:*:*:*:*:*:*:*
|
CVE-2006-0564
| 0
| null | 0.72006
|
Stack-based buffer overflow in Microsoft HTML Help Workshop 4.74.8702.0, and possibly earlier versions, and as included in the Microsoft HTML Help 1.4 SDK, allows context-dependent attackers to execute arbitrary code via a .hhp file with a long Contents file field.
|
2006-02-06
|
Metasploit
|
cpe:2.3:a:microsoft:html_help:1.4:*:sdk:*:*:*:*:*;cpe:2.3:a:microsoft:html_help_workshop:4.74.8702.0:*:*:*:*:*:*:*
|
CVE-2006-0848
| 0
| null | 0.83055
|
The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remote user-assisted attackers to execute arbitrary commands by tricking a user into downloading a __MACOSX folder that contains metadata (resource fork) that invokes the Terminal, which automatically interprets the script using bash, as demonstrated using a ZIP file that contains a script with a safe file extension.
|
2006-02-22
|
Metasploit
|
cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*
|
CVE-2006-0900
| 0
| null | 0.79325
|
nfsd in FreeBSD 6.0 kernel allows remote attackers to cause a denial of service via a crafted NFS mount request, as demonstrated by the ProtoVer NFS test suite.
|
2006-02-27
|
Metasploit
|
cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*
|
CVE-2006-0987
| 0
| null | 0.27831
|
The default configuration of ISC BIND before 9.4.1-P1, when configured as a caching name server, allows recursive queries and provides additional delegation information to arbitrary IP addresses, which allows remote attackers to cause a denial of service (traffic amplification) via DNS queries with spoofed source IP addresses.
|
2006-03-03
|
Metasploit
|
cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*
|
CVE-2006-0988
| 0
| null | 0.68044
|
The default configuration of the DNS Server service on Windows Server 2003 and Windows 2000, and the Microsoft DNS Server service on Windows NT 4.0, allows recursive queries and provides additional delegation information to arbitrary IP addresses, which allows remote attackers to cause a denial of service (traffic amplification) via DNS queries with spoofed source IP addresses.
|
2006-03-03
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
|
CVE-2006-0992
| 0
| null | 0.88808
|
Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2006-0092. This is the correct identifier.
|
2006-04-14
|
Metasploit
|
cpe:2.3:a:novell:groupwise_messenger:2.0:*:*:*:*:*:*:*
|
CVE-2006-1016
| 0
| null | 0.76517
|
Buffer overflow in the IsComponentInstalled method in Internet Explorer 6.0, when used on Windows 2000 before SP4 or Windows XP before SP1, allows remote attackers to execute arbitrary code via JavaScript that calls IsComponentInstalled with a long first argument.
|
2006-03-07
|
Metasploit
|
cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*
|
CVE-2006-1148
| 0
| null | 0.81711
|
Multiple stack-based buffer overflows in the procConnectArgs function in servmgr.cpp in PeerCast before 0.1217 allow remote attackers to execute arbitrary code via an HTTP GET request with a long (1) parameter name or (2) value in a URL, which triggers the overflow in the nextCGIarg function in servhs.cpp.
|
2006-03-10
|
Metasploit
|
cpe:2.3:a:peercast:peercast:*:*:*:*:*:*:*:*;cpe:2.3:a:peercast:peercast:0.1211:*:*:*:*:*:*:*;cpe:2.3:a:peercast:peercast:0.1212:*:*:*:*:*:*:*
|
CVE-2006-1255
| 0
| null | 0.86928
|
Stack-based buffer overflow in the IMAP service in Mercur Messaging 5.0 SP3 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long string to the (1) LOGIN or (2) SELECT command, a different set of attack vectors and possibly a different vulnerability than CVE-2003-1177.
|
2006-03-19
|
Metasploit
|
cpe:2.3:a:mercur:mercur_messaging:*:*:*:*:*:*:*:*
|
CVE-2006-1359
| 0
| null | 0.87602
|
Microsoft Internet Explorer 6 and 7 Beta 2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a certain createTextRange call on a checkbox object, which results in a dereference of an invalid table pointer.
|
2006-03-23
|
Metasploit
|
cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:ie:7.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*
|
CVE-2006-1547
| 7.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| 0.13582
|
ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils.
|
2006-03-30
|
CISA
|
cpe:2.3:a:apache:commons_beanutils:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
|
CVE-2006-1551
| 0
| null | 0.72147
|
Eval injection vulnerability in pajax_call_dispatcher.php in PAJAX 0.5.1 and earlier allows remote attackers to execute arbitrary code via the (1) $method and (2) $args parameters.
|
2006-04-13
|
Metasploit
|
cpe:2.3:a:georges_auberger:pajax:0.5.0:*:*:*:*:*:*:*;cpe:2.3:a:georges_auberger:pajax:0.5.1:*:*:*:*:*:*:*
|
CVE-2006-1652
| 0
| null | 0.85939
|
Multiple buffer overflows in (a) UltraVNC (aka Ultr@VNC) 1.0.1 and earlier and (b) tabbed_viewer 1.29 (1) allow user-assisted remote attackers to execute arbitrary code via a malicious server that sends a long string to a client that connects on TCP port 5900, which triggers an overflow in Log::ReallyPrint; and (2) allow remote attackers to cause a denial of service (server crash) via a long HTTP GET request to TCP port 5800, which triggers an overflow in VNCLog::ReallyPrint.
|
2006-04-06
|
Metasploit
|
cpe:2.3:a:ultravnc:tabbed_viewer:1.29:*:*:*:*:*:*:*;cpe:2.3:a:ultravnc:vnc_viewer:1.0.1:*:*:*:*:*:*:*
|
CVE-2006-1681
| 0
| null | 0.00299
|
Cross-site scripting (XSS) vulnerability in Cherokee HTTPD 0.5 and earlier allows remote attackers to inject arbitrary web script or HTML via a malformed request that generates an HTTP 400 error, which is not properly handled when the error message is generated.
|
2006-04-11
|
Nuclei
|
cpe:2.3:a:cherokee:cherokee_httpd:0.1.5:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.1.6:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.2.5:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.2.6:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.2.7:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.2:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.4.17:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.4.6:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.4.7:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.4.8:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.4.9:*:*:*:*:*:*:*;cpe:2.3:a:cherokee:cherokee_httpd:0.5:*:*:*:*:*:*:*
|
CVE-2006-2081
| 0
| null | 0.58402
|
Oracle Database Server 10g Release 2 allows local users to execute arbitrary SQL queries via the GET_DOMAIN_INDEX_METADATA function in the DBMS_EXPORT_EXTENSION package. NOTE: this issue was originally linked to DB05 (CVE-2006-1870), but a reliable third party has claimed that it is not the same issue. Based on details of the problem, the primary issue appears to be insecure privileges that facilitate the introduction of SQL in a way that is not related to special characters, so this is not "SQL injection" per se.
|
2006-04-27
|
Metasploit
|
cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*
|
CVE-2006-2086
| 0
| null | 0.74928
|
Buffer overflow in JuniperSetupDLL.dll, loaded from JuniperSetup.ocx by the Juniper SSL-VPN Client when accessing a Juniper NetScreen IVE device running IVE OS before 4.2r8.1, 5.0 before 5.0r6.1, 5.1 before 5.1r8, 5.2 before 5.2r4.1, or 5.3 before 5.3r2.1, allows remote attackers to execute arbitrary code via a long argument in the ProductName parameter.
|
2006-04-29
|
Metasploit
|
cpe:2.3:a:juniper:junipersetup_control:*:*:*:*:*:*:*:*
|
CVE-2006-2173
| 0
| null | 0.04601
|
Buffer overflow in FileZilla FTP Server 2.2.22 allows remote authenticated attackers to cause a denial of service and possibly execute arbitrary code via a long (1) PORT or (2) PASS followed by the MLSD command, or (2) the remote server interface, as demonstrated by the Infigo FTPStress Fuzzer.
|
2006-05-04
|
Nuclei
|
cpe:2.3:a:filezilla:filezilla_server:*:*:*:*:*:*:*:*
|
CVE-2006-2212
| 0
| null | 0.71543
|
Buffer overflow in KarjaSoft Sami FTP Server 2.0.2 and earlier allows remote attackers to execute arbitrary code via a long (1) USER or (2) PASS command.
|
2006-05-05
|
Metasploit
|
cpe:2.3:a:karjasoft:sami_ftp_server:2.0.2:*:*:*:*:*:*:*
|
CVE-2006-2237
| 0
| null | 0.90596
|
The web interface for AWStats 6.4 and 6.5, when statistics updates are enabled, allows remote attackers to execute arbitrary code via shell metacharacters in the migrate parameter.
|
2006-05-08
|
Metasploit
|
cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*
|
CVE-2006-2369
| 0
| null | 0.91145
|
RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.
|
2006-05-15
|
Metasploit
|
cpe:2.3:a:vnc:realvnc:4.1.1:*:*:*:*:*:*:*
|
CVE-2006-2370
| 0
| null | 0.81642
|
Buffer overflow in the Routing and Remote Access service (RRAS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote unauthenticated or authenticated attackers to execute arbitrary code via certain crafted "RPC related requests," aka the "RRAS Memory Corruption Vulnerability."
|
2006-06-13
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition_64-bit:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition_64-bit:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:enterprise:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
|
CVE-2006-2407
| 0
| null | 0.79892
|
Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string.
|
2006-05-16
|
Metasploit
|
cpe:2.3:a:freeftpd:freeftpd:1.0.10:*:*:*:*:*:*:*;cpe:2.3:a:freesshd:freesshd:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:weonlydo:wodsshserver:1.2.7:*:*:*:*:*:*:*;cpe:2.3:a:weonlydo:wodsshserver:1.3.3_demo:*:*:*:*:*:*:*
|
CVE-2006-2447
| 0
| null | 0.744
|
SpamAssassin before 3.1.3, when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username.
|
2006-06-06
|
Metasploit
|
cpe:2.3:a:apache:spamassassin:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:spamassassin:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:spamassassin:3.1.2:*:*:*:*:*:*:*
|
CVE-2006-2492
| 8.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| 0.75259
|
Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object pointer, as originally reported by ISC on 20060519 for a zero-day attack.
|
2006-05-20
|
CISA
|
cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:works_suite:*:*:*:*:*:*:*:*
|
CVE-2006-2502
| 0
| null | 0.7701
|
Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
|
2006-05-22
|
Metasploit
|
cpe:2.3:a:cyrus:imapd:2.3.2:*:*:*:*:*:*:*
|
CVE-2006-2630
| 0
| null | 0.78935
|
Stack-based buffer overflow in Symantec Antivirus 10.1 and Client Security 3.1 allows remote attackers to execute arbitrary code via unknown attack vectors.
|
2006-05-27
|
Metasploit
|
cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*;cpe:2.3:a:symantec:norton_antivirus:10.0.2.2010:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:norton_antivirus:10.0.2.2020:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:norton_antivirus:10.0.2.2021:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:norton_antivirus:10.1.400:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:norton_antivirus:10.1:*:corporate:*:*:*:*:*
|
CVE-2006-2685
| 0
| null | 0.85605
|
PHP remote file inclusion vulnerability in Basic Analysis and Security Engine (BASE) 1.2.4 and earlier, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via a URL in the BASE_path parameter to (1) base_qry_common.php, (2) base_stat_common.php, and (3) includes/base_include.inc.php.
|
2006-05-31
|
Metasploit
|
cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:kevin_johnson:basic_analysis_and_security_engine:1.2.4:*:*:*:*:*:*:*
|
CVE-2006-2842
| 0
| null | 0.0094
|
PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable
|
2006-06-06
|
Nuclei
|
cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_r3:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.4_rc1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_rc1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*
|
CVE-2006-2926
| 0
| null | 0.84815
|
Stack-based buffer overflow in the WWW Proxy Server of Qbik WinGate 6.1.1.1077 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long URL HTTP request.
|
2006-06-09
|
Metasploit
|
cpe:2.3:a:qbik:wingate:6.1.1.1077:*:*:*:*:*:*:*
|
CVE-2006-2961
| 0
| null | 0.83469
|
Stack-based buffer overflow in CesarFTP 0.99g and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long MKD command. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
|
2006-06-12
|
Metasploit
|
cpe:2.3:a:aclogic:cesarftp:*:*:*:*:*:*:*:*
|
CVE-2006-3252
| 0
| null | 0.80048
|
Buffer overflow in the Online Registration Facility for Algorithmic Research PrivateWire VPN software up to 3.7 allows remote attackers to execute arbitrary code via a long GET request.
|
2006-06-27
|
Metasploit
|
cpe:2.3:a:algorithmic_research:privatewire_gateway:3.7:*:*:*:*:*:*:*
|
CVE-2006-3392
| 0
| null | 0.67141
|
Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.
|
2006-07-06
|
Metasploit
|
cpe:2.3:a:usermin:usermin:*:*:*:*:*:*:*:*;cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*
|
CVE-2006-3439
| 0
| null | 0.88792
|
Buffer overflow in the Server Service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers, including anonymous users, to execute arbitrary code via a crafted RPC message, a different vulnerability than CVE-2006-1314.
|
2006-08-09
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
|
CVE-2006-3459
| 0
| null | 0.69306
|
Multiple stack-based buffer overflows in the TIFF library (libtiff) before 3.8.2, as used in Adobe Reader 9.3.0 and other products, allow context-dependent attackers to execute arbitrary code or cause a denial of service via unspecified vectors, including a large tdir_count value in the TIFFFetchShortPair function in tif_dirread.c.
|
2006-08-03
|
Metasploit
|
cpe:2.3:a:adobe:acrobat_reader:9.3.0:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta18:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta24:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta28:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta29:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta31:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta32:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta34:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta35:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta36:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.4:beta37:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.6:beta:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.7:alpha2:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.7:alpha3:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.7:alpha4:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.7:alpha:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.5.7:beta:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.6.0:beta2:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.6.0:beta:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.0:alpha:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.0:beta2:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.0:beta:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.2:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.3:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.7.4:*:*:*:*:*:*:*;cpe:2.3:a:libtiff:libtiff:3.8.0:*:*:*:*:*:*:*
|
CVE-2006-3524
| 0
| null | 0.83969
|
Buffer overflow in SIPfoundry sipXtapi released before 20060324 allows remote attackers to execute arbitrary code via a long CSeq field value in an INVITE message.
|
2006-07-12
|
Metasploit
|
cpe:2.3:a:sipfoundry:sipxtapi:*:*:*:*:*:*:*:*
|
CVE-2006-3677
| 0
| null | 0.81109
|
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.
|
2006-07-27
|
Metasploit
|
cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*
|
CVE-2006-3726
| 0
| null | 0.80852
|
Buffer overflow in FileCOPA FTP Server before 1.01 released on 18th July 2006, allows remote authenticated attackers to execute arbitrary code via a long argument to the LIST command.
|
2006-07-21
|
Metasploit
|
cpe:2.3:a:intervations:filecopa:*:*:*:*:*:*:*:*
|
CVE-2006-3730
| 0
| null | 0.88442
|
Integer overflow in Microsoft Internet Explorer 6 on Windows XP SP2 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a 0x7fffffff argument to the setSlice method on a WebViewFolderIcon ActiveX object, which leads to an invalid memory copy.
|
2006-07-21
|
Metasploit
|
cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
|
CVE-2006-3747
| 0
| null | 0.92663
|
Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.
|
2006-07-28
|
Metasploit
|
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
|
CVE-2006-3838
| 0
| null | 0.7153
|
Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) before 2.5.0, as used in products including (a) Sidewinder, (b) iPolicy Security Manager, (c) Astaro Report Manager, (d) Fortinet FortiReporter, (e) Top Layer Network Security Analyzer, and possibly other products, allow remote attackers to execute arbitrary code via long (1) DELTAINTERVAL, (2) LOGFOLDER, (3) DELETELOGS, (4) FWASERVER, (5) SYSLOGPUBLICIP, (6) GETFWAIMPORTLOG, (7) GETFWADELTA, (8) DELETERDEPDEVICE, (9) COMPRESSRAWLOGFILE, (10) GETSYSLOGFIREWALLS, (11) ADDPOLICY, and (12) EDITPOLICY commands to the Syslog daemon (syslogserver.exe); (13) GUIADDDEVICE, (14) ADDDEVICE, and (15) DELETEDEVICE commands to the Topology server (Topology.exe); the (15) LICMGR_ADDLICENSE command to the License Manager (EnterpriseSecurityAnalyzer.exe); the (16) TRACE and (17) QUERYMONITOR commands to the Monitoring agent (Monitoring.exe); and possibly other vectors related to the Syslog daemon (syslogserver.exe).
|
2006-07-27
|
Metasploit
|
cpe:2.3:a:eiqnetworks:enterprise_security_analyzer:*:*:*:*:*:*:*:*
|
CVE-2006-3942
| 0
| null | 0.87271
|
The server driver (srv.sys) in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service (system crash) via an SMB_COM_TRANSACTION SMB message that contains a string without null character termination, which leads to a NULL dereference in the ExecuteTransaction function, possibly related to an "SMB PIPE," aka the "Mailslot DOS" vulnerability. NOTE: the name "Mailslot DOS" was derived from incomplete initial research; the vulnerability is not associated with a mailslot.
|
2006-07-31
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
|
CVE-2006-3952
| 0
| null | 0.87004
|
Stack-based buffer overflow in EFS Software Easy File Sharing FTP Server 2.0 allows remote attackers to execute arbitrary code via a long argument to the PASS command. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
|
2006-08-01
|
Metasploit
|
cpe:2.3:a:efs_software:efs_ftp_server:2.0:*:*:*:*:*:*:*
|
CVE-2006-3961
| 0
| null | 0.70793
|
Buffer overflow in McSubMgr ActiveX control (mcsubmgr.dll) in McAfee Security Center 6.0.23 for Internet Security Suite 2006, Wireless Home Network Security, Personal Firewall Plus, VirusScan, Privacy Service, SpamKiller, AntiSpyware, and QuickClean allows remote user-assisted attackers to execute arbitrary commands via long string parameters, which are later used in vsprintf.
|
2006-08-01
|
Metasploit
|
cpe:2.3:a:mcafee:antispyware:2005:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:antispyware:2006:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:internet_security_suite:2004:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:internet_security_suite:2005:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:internet_security_suite:2006:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:personal_firewall_plus:2004:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:personal_firewall_plus:2005:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:personal_firewall_plus:2006:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:privacy_service:2004:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:privacy_service:2005:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:privacy_service:2006:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:quickclean:2004:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:quickclean:2005:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:quickclean:2006:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:security_center:4.3:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:security_center:6.0.22:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:security_center:6.0.23:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:security_center:6.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:spamkiller:5.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:spamkiller:6.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:spamkiller:7.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:virusscan:2004:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:virusscan:2005:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:virusscan:2006:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:wireless_home_network_security:2006:*:*:*:*:*:*:*
|
CVE-2006-4305
| 0
| null | 0.71142
|
Buffer overflow in SAP DB and MaxDB before 7.6.00.30 allows remote attackers to execute arbitrary code via a long database name when connecting via a WebDBM client.
|
2006-08-30
|
Metasploit
|
cpe:2.3:a:mysql:maxdb:*:*:*:*:*:*:*:*;cpe:2.3:a:sap-db:sap-db:*:*:*:*:*:*:*:*
|
CVE-2006-4313
| 0
| null | 0.67665
|
Multiple unspecified vulnerabilities in Cisco VPN 3000 series concentrators before 4.1, 4.1.x up to 4.1(7)L, and 4.7.x up to 4.7(2)F allow attackers to execute the (1) CWD, (2) MKD, (3) CDUP, (4) RNFR, (5) SIZE, and (6) RMD FTP commands to modify files or create and delete directories via unknown vectors.
|
2006-08-23
|
Metasploit
|
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.5.b:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.5.b:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.a:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.b:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.l:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.1.f:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.2.f:*:*:*:*:*:*:*;cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7:*:*:*:*:*:*:*
|
CVE-2006-4318
| 0
| null | 0.7975
|
Buffer overflow in WFTPD Server 3.23 allows remote attackers to execute arbitrary code via long SIZE commands.
|
2006-08-24
|
Metasploit
|
cpe:2.3:a:texas_imperial_software:wftpd:3.23:*:*:*:*:*:*:*
|
CVE-2006-4602
| 0
| null | 0.83363
|
Unrestricted file upload vulnerability in jhot.php in TikiWiki 1.9.4 Sirius and earlier allows remote attackers to execute arbitrary PHP code via a filepath parameter that contains a filename with a .php extension, which is uploaded to the img/wiki/ directory.
|
2006-09-07
|
Metasploit
|
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.4:*:*:*:*:*:*:*
|
CVE-2006-4688
| 0
| null | 0.82092
|
Buffer overflow in Client Service for NetWare (CSNW) in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via crafted messages, aka "Client Service for NetWare Memory Corruption Vulnerability."
|
2006-11-14
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
|
CVE-2006-4691
| 0
| null | 0.88274
|
Stack-based buffer overflow in the NetpManageIPCConnect function in the Workstation service (wkssvc.dll) in Microsoft Windows 2000 SP4 and XP SP2 allows remote attackers to execute arbitrary code via NetrJoinDomain2 RPC messages with a long hostname.
|
2006-11-14
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
|
CVE-2006-4704
| 0
| null | 0.73165
|
Cross-zone scripting vulnerability in the WMI Object Broker (WMIScriptUtils.WMIObjectBroker2) ActiveX control (WmiScriptUtils.dll) in Microsoft Visual Studio 2005 allows remote attackers to bypass Internet zone restrictions and execute arbitrary code by instantiating dangerous objects, aka "WMI Object Broker Vulnerability."
|
2006-11-01
|
Metasploit
|
cpe:2.3:a:microsoft:visual_studio_.net:2005:*:*:*:*:*:*:*
|
CVE-2006-4777
| 0
| null | 0.87569
|
Heap-based buffer overflow in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) for Internet Explorer 6.0 SP1, on Chinese and possibly other Windows distributions, allows remote attackers to execute arbitrary code via unknown manipulations in arguments to the KeyFrame method, possibly related to an integer overflow, as demonstrated by daxctle2, and a different vulnerability than CVE-2006-4446.
|
2006-09-14
|
Metasploit
|
cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*
|
CVE-2006-4842
| 0
| null | 0.10698
|
The Netscape Portable Runtime (NSPR) API 4.6.1 and 4.6.2, as used in Sun Solaris 10, trusts user-specified environment variables for specifying log files even when running from setuid programs, which allows local users to create or overwrite arbitrary files.
|
2006-10-12
|
Metasploit
|
cpe:2.3:a:netscape:portable_runtime_api:4.6.1:*:*:*:*:*:*:*;cpe:2.3:a:netscape:portable_runtime_api:4.6.2:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*
|
CVE-2006-4847
| 0
| null | 0.89526
|
Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands.
|
2006-09-19
|
Metasploit
|
cpe:2.3:a:ipswitch:ws_ftp_server:1.0.1eval:*:*:*:*:*:*:*;cpe:2.3:a:ipswitch:ws_ftp_server:1.0.2eval:*:*:*:*:*:*:*;cpe:2.3:a:ipswitch:ws_ftp_server:3.0_1:*:*:*:*:*:*:*;cpe:2.3:a:ipswitch:ws_ftp_server:4.01:*:*:*:*:*:*:*;cpe:2.3:a:ipswitch:ws_ftp_server:5.02:*:*:*:*:*:*:*;cpe:2.3:a:ipswitch:ws_ftp_server:5.03:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*
|
CVE-2006-4868
| 0
| null | 0.63976
|
Stack-based buffer overflow in the Vector Graphics Rendering engine (vgx.dll), as used in Microsoft Outlook and Internet Explorer 6.0 on Windows XP SP2, and possibly other versions, allows remote attackers to execute arbitrary code via a Vector Markup Language (VML) file with a long fill parameter within a rect tag.
|
2006-09-19
|
Metasploit
|
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2003:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
|
CVE-2006-4948
| 0
| null | 0.76985
|
Stack-based buffer overflow in tftpd.exe in ProSysInfo TFTP Server TFTPDWIN 0.4.2 and earlier allows remote attackers to execute arbitrary code or cause a denial of service via a long file name. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
|
2006-09-23
|
Metasploit
|
cpe:2.3:a:prosysinfo:tftp_server_tftpdwin:*:*:*:*:*:*:*:*
|
CVE-2006-5112
| 0
| null | 0.82279
|
Buffer overflow in InterVations NaviCOPA Web Server 2.01 allows remote attackers to execute arbitrary code via a long HTTP GET request.
|
2006-10-03
|
Metasploit
|
cpe:2.3:a:intervations:navicopa_web_server:2.01:*:*:*:*:*:*:*
|
CVE-2006-5143
| 0
| null | 0.84629
|
Multiple buffer overflows in CA BrightStor ARCserve Backup r11.5 SP1 and earlier, r11.1, and 9.01; BrightStor ARCserve Backup for Windows r11; BrightStor Enterprise Backup 10.5; Server Protection Suite r2; and Business Protection Suite r2 allow remote attackers to execute arbitrary code via crafted data on TCP port 6071 to the Backup Agent RPC Server (DBASVR.exe) using the RPC routines with opcode (1) 0x01, (2) 0x02, or (3) 0x18; invalid stub data on TCP port 6503 to the RPC routines with opcode (4) 0x2b or (5) 0x2d in ASCORE.dll in the Message Engine RPC Server (msgeng.exe); (6) a long hostname on TCP port 41523 to ASBRDCST.DLL in the Discovery Service (casdscsvc.exe); or unspecified vectors related to the (7) Job Engine Service.
|
2006-10-10
|
Metasploit
|
cpe:2.3:a:broadcom:brightstor_arcserve_backup:*:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:server_protection_suite:2:*:*:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:*
|
CVE-2006-5156
| 0
| null | 0.82959
|
Buffer overflow in McAfee ePolicy Orchestrator before 3.5.0.720 and ProtectionPilot before 1.1.1.126 allows remote attackers to execute arbitrary code via a request to /spipe/pkg/ with a long source header.
|
2006-10-05
|
Metasploit
|
cpe:2.3:a:mcafee:epolicy_orchestrator:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:epolicy_orchestrator:3.0:sp2a:*:*:*:*:*:*;cpe:2.3:a:mcafee:epolicy_orchestrator:3.5.0:*:*:*:*:*:*:*;cpe:2.3:a:mcafee:protectionpilot:1.1.1:*:*:*:*:*:*:*
|
CVE-2006-5198
| 0
| null | 0.73442
|
The WZFILEVIEW.FileViewCtrl.61 ActiveX control (aka Sky Software "FileView" ActiveX control) for WinZip 10.0 before build 7245 allows remote attackers to execute arbitrary code via unspecified "unsafe methods."
|
2006-11-14
|
Metasploit
|
cpe:2.3:a:winzip:winzip:10.0:*:*:*:*:*:*:*
|
CVE-2006-5216
| 0
| null | 0.81799
|
Stack-based buffer overflow in Sergey Lyubka Simple HTTPD (shttpd) 1.34 allows remote attackers to execute arbitrary code via a long URI.
|
2006-10-10
|
Metasploit
|
cpe:2.3:a:sergey_lyubka:simple_httpd:1.34:*:*:*:*:*:*:*
|
CVE-2006-5229
| 0
| null | 0.37831
|
OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as demonstrated by sshtime. NOTE: as of 20061014, it appears that this issue is dependent on the use of manually-set passwords that causes delays when processing /etc/shadow due to an increased number of rounds.
|
2006-10-10
|
Metasploit
|
cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*;cpe:2.3:o:novell:suse_linux:*:*:*:*:*:*:*:*
|
CVE-2006-5276
| 0
| null | 0.87695
|
Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 before beta 2; and Sourcefire Intrusion Sensor; allows remote attackers to execute arbitrary code via crafted SMB traffic.
|
2007-02-20
|
Metasploit
|
cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*;cpe:2.3:a:snort:snort:2.6.1.1:*:*:*:*:*:*:*;cpe:2.3:a:snort:snort:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:snort:snort:2.7_beta1:*:*:*:*:*:*:*;cpe:2.3:a:sourcefire:intrusion_sensor:4.1:*:*:*:*:*:*:*;cpe:2.3:a:sourcefire:intrusion_sensor:4.1:*:crossbeam:*:*:*:*:*;cpe:2.3:a:sourcefire:intrusion_sensor:4.5:*:*:*:*:*:*:*;cpe:2.3:a:sourcefire:intrusion_sensor:4.5:*:crossbeam:*:*:*:*:*;cpe:2.3:a:sourcefire:intrusion_sensor:4.6:*:*:*:*:*:*:*;cpe:2.3:a:sourcefire:intrusion_sensor:4.6:*:crossbeam:*:*:*:*:*
|
CVE-2006-5478
| 0
| null | 0.90702
|
Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.
|
2006-10-24
|
Metasploit
|
cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.3.8_presp9:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.3:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*
|
CVE-2006-5614
| 0
| null | 0.88425
|
Microsoft Windows NAT Helper Components (ipnathlp.dll) on Windows XP SP2, when Internet Connection Sharing is enabled, allows remote attackers to cause a denial of service (svchost.exe crash) via a malformed DNS query, which results in a null pointer dereference.
|
2006-10-31
|
Metasploit
|
cpe:2.3:a:microsoft:windows_nt_helper_components:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
|
CVE-2006-5650
| 0
| null | 0.82608
|
The ICQPhone.SipxPhoneManager ActiveX control in America Online ICQ 5.1 allows remote attackers to download and execute arbitrary code via the DownloadAgent function, as demonstrated using an ICQ avatar.
|
2006-11-07
|
Metasploit
|
cpe:2.3:a:aol:icq:5.1:*:*:*:*:*:*:*
|
CVE-2006-5702
| 0
| null | 0.53418
|
Tikiwiki 1.9.5 allows remote attackers to obtain sensitive information (MySQL username and password) via an empty sort_mode parameter in (1) tiki-listpages.php, (2) tiki-lastchanges.php, (3) messu-archive.php, (4) messu-mailbox.php, (5) messu-sent.php, (6) tiki-directory_add_site.php, (7) tiki-directory_ranking.php, (8) tiki-directory_search.php, (9) tiki-forums.php, (10) tiki-view_forum.php, (11) tiki-friends.php, (12) tiki-list_blogs.php, (13) tiki-list_faqs.php, (14) tiki-list_trackers.php, (15) tiki-list_users.php, (16) tiki-my_tiki.php, (17) tiki-notepad_list.php, (18) tiki-orphan_pages.php, (19) tiki-shoutbox.php, (20) tiki-usermenu.php, and (21) tiki-webmail_contacts.php, which reveal the information in certain database error messages.
|
2006-11-04
|
Metasploit
|
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.5:*:*:*:*:*:*:*
|
CVE-2006-5745
| 0
| null | 0.87269
|
Unspecified vulnerability in the setRequestHeader method in the XMLHTTP (XML HTTP) ActiveX Control 4.0 in Microsoft XML Core Services 4.0 on Windows, when accessed by Internet Explorer, allows remote attackers to execute arbitrary code via crafted arguments that lead to memory corruption, a different vulnerability than CVE-2006-4685. NOTE: some of these details are obtained from third party information.
|
2006-11-06
|
Metasploit
|
cpe:2.3:a:microsoft:xml_core_services:4.0:*:*:*:*:*:*:*
|
CVE-2006-5780
| 0
| null | 0.7828
|
Stack-based buffer overflow in nfsd.exe in XLink Omni-NFS Server 5.2 allows remote attackers to execute arbitrary code via a crafted TCP packet to port 2049 (nfsd), as demonstrated by vd_xlink.pm.
|
2006-11-07
|
Metasploit
|
cpe:2.3:a:xlink_technology:omni-nfs_server:5.2:*:*:*:*:*:*:*
|
CVE-2006-5792
| 0
| null | 0.71383
|
Unspecified vulnerability in XLink Omni-NFS Enterprise allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by vd_xlink2.pm, an "Omni-NFS Enterprise remote exploit." NOTE: this is probably a different vulnerability than CVE-2006-5780. As of 20061107, this disclosure has no actionable information. However, since it is from a reliable researcher, it is being assigned a CVE identifier for tracking purposes.
|
2006-11-07
|
Metasploit
|
cpe:2.3:a:xlink_technology:omni-nfs_x_enterprise:*:*:*:*:*:*:*:*
|
CVE-2006-5815
| 0
| null | 0.59834
|
Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."
|
2006-11-08
|
Metasploit
|
cpe:2.3:a:proftpd_project:proftpd:*:*:*:*:*:*:*:*
|
CVE-2006-6010
| 0
| null | 0.20146
|
SAP allows remote attackers to obtain potentially sensitive information such as operating system and SAP version via an RFC_SYSTEM_INFO RfcCallReceive request, a different vulnerability than CVE-2003-0747.
|
2006-11-21
|
Metasploit
|
cpe:2.3:a:sap:sap_web_application_server:*:*:*:*:*:*:*:*
|
CVE-2006-6063
| 0
| null | 0.79349
|
Stack-based buffer overflow in Un4seen XMPlay 3.3.0.5 and earlier allows remote attackers to execute arbitrary code via a M3U file containing a long (1) FileName, and cause a crash via a long (2) DisplayName.
|
2006-11-22
|
Metasploit
|
cpe:2.3:a:un4seen:xmplay:*:*:*:*:*:*:*:*
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.