CVE
stringlengths 13
16
| CVSS Score
float64 0
10
| CVSS_Vector
stringclasses 257
values | EPSS
float64 0
0.95
| Description
stringlengths 28
3.79k
| Published
stringdate 1990-08-14 00:00:00
2025-10-05 00:00:00
| Source
stringclasses 7
values | CPE
stringlengths 33
51k
⌀ |
|---|---|---|---|---|---|---|---|
CVE-2006-6076
| 0
| null | 0.7604
|
Buffer overflow in the Tape Engine (tapeeng.exe) in CA (formerly Computer Associates) BrightStor ARCserve Backup 11.5 and earlier allows remote attackers to execute arbitrary code via certain RPC requests to TCP port 6502.
|
2006-11-24
|
Metasploit
|
cpe:2.3:a:broadcom:brightstor_arcserve_backup:*:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:sp1:*:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.0:*:sql:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:sql:*:*:*:*:*
|
CVE-2006-6183
| 0
| null | 0.47508
|
Multiple stack-based buffer overflows in 3Com 3CTftpSvc 2.0.1, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long mode field (aka transporting mode) in a (1) GET or (2) PUT command.
|
2006-12-01
|
Metasploit
|
cpe:2.3:a:3com:3ctftpsvc:*:*:*:*:*:*:*:*
|
CVE-2006-6184
| 0
| null | 0.80575
|
Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long filename in a (1) GET or (2) PUT command.
|
2006-12-01
|
Metasploit
|
cpe:2.3:a:alliedtelesyn:at-tftp:*:*:*:*:*:*:*:*
|
CVE-2006-6199
| 0
| null | 0.84024
|
Stack-based buffer overflow in BlazeVideo BlazeDVD Standard and Professional 5.0, and possibly earlier, allows remote attackers to execute arbitrary code via a long filename in a PLF playlist.
|
2006-12-01
|
Metasploit
|
cpe:2.3:a:blazevideo:blaze_dvd:5.0:*:pro:*:*:*:*:*;cpe:2.3:a:blazevideo:blaze_dvd:5.0:*:standard:*:*:*:*:*
|
CVE-2006-6251
| 0
| null | 0.78545
|
Stack-based buffer overflow in VUPlayer 2.44 and earlier allows remote attackers to execute arbitrary code via a long string in an M3U file, aka an "M3U UNC Name" attack.
|
2006-12-04
|
Metasploit
|
cpe:2.3:a:vuplayer:vuplayer:*:*:*:*:*:*:*:*
|
CVE-2006-6423
| 0
| null | 0.39215
|
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix.
|
2006-12-12
|
Metasploit
|
cpe:2.3:a:mailenable:mailenable_enterprise:1.11:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.12:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.13:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.14:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.15:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.16:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.17:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.18:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.19:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.22:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.23:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.24:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.25:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.26:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.27:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.28:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.29:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.30:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.31:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.32:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.33:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.34:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.35:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.36:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.37:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.38:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.39:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.40:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_enterprise:2.35:*:*:*:*:*:*:*;cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*
|
CVE-2006-6424
| 0
| null | 0.64126
|
Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow; and (2) via crafted arguments to the STOR command to the Network Messaging Application Protocol (NMAP) daemon, resulting in a stack overflow.
|
2006-12-27
|
Metasploit
|
cpe:2.3:a:novell:netmail:*:e-ftfl:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.0.3a:a:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.0.3a:b:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:*:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:a:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:b:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:c:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:d:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:e:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:f:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:g:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:h:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.1:f:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.5:*:*:*:*:*:*:*
|
CVE-2006-6425
| 0
| null | 0.76472
|
Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command.
|
2006-12-27
|
Metasploit
|
cpe:2.3:a:novell:netmail:*:e-ftfl:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.0.3a:a:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.0.3a:b:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:*:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:a:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:b:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:c:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:d:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:e:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:f:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:g:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.10:h:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.1:f:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.5:*:*:*:*:*:*:*
|
CVE-2006-6565
| 0
| null | 0.5735
|
FileZilla Server before 0.9.22 allows remote attackers to cause a denial of service (crash) via a wildcard argument to the (1) LIST or (2) NLST commands, which results in a NULL pointer dereference, a different set of vectors than CVE-2006-6564. NOTE: CVE analysis suggests that the problem might be due to a malformed PORT command.
|
2006-12-15
|
Metasploit/Nuclei
|
cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*
|
CVE-2006-6576
| 0
| null | 0.88576
|
Heap-based buffer overflow in Golden FTP Server (goldenftpd) 1.92 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long PASS command. NOTE: it was later reported that 4.70 is also affected. NOTE: the USER vector is already covered by CVE-2005-0634.
|
2006-12-15
|
Metasploit
|
cpe:2.3:a:goldenftpserver:golden_ftp_server:1.92:*:*:*:*:*:*:*
|
CVE-2006-6665
| 0
| null | 0.75657
|
Buffer overflow in Astonsoft DeepBurner Pro and Free 1.8.0 and earlier allows user-assisted remote attackers to execute arbitrary code via a long file name tag in a dbr file.
|
2006-12-20
|
Metasploit
|
cpe:2.3:a:astonsoft:deepburner:*:*:free:*:*:*:*:*;cpe:2.3:a:astonsoft:deepburner:*:*:pro:*:*:*:*:*
|
CVE-2006-6707
| 0
| null | 0.74943
|
Stack-based buffer overflow in the NeoTraceExplorer.NeoTraceLoader ActiveX control (NeoTraceExplorer.dll) in NeoTrace Express 3.25 and NeoTrace Pro (aka McAfee Visual Trace) 3.25 allows remote attackers to execute arbitrary code via a long argument string to the TraceTarget method. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
|
2006-12-23
|
Metasploit
|
cpe:2.3:a:mcafee:neotrace:3.25:*:express:*:*:*:*:*;cpe:2.3:a:mcafee:neotrace:3.25:*:professional:*:*:*:*:*;cpe:2.3:a:mcafee:visual_trace:3.25:*:*:*:*:*:*:*
|
CVE-2006-6761
| 0
| null | 0.53596
|
Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
|
2006-12-27
|
Metasploit
|
cpe:2.3:a:novell:netmail:3.5.2:a:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.5.2:b:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.5.2:c1:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.5.2:c:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.5.2:d:*:*:*:*:*:*;cpe:2.3:a:novell:netmail:3.5.2:e-ftfl:*:*:*:*:*:*
|
CVE-2007-0015
| 0
| null | 0.85981
|
Buffer overflow in Apple QuickTime 7.1.3 allows remote attackers to execute arbitrary code via a long rtsp:// URI.
|
2007-01-01
|
Metasploit
|
cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*
|
CVE-2007-0018
| 0
| null | 0.72473
|
Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote attackers to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the products include (1) NCTsoft NCTAudioStudio, NCTAudioEditor, and NCTDialogicVoice; (2) Magic Audio Recorder, Music Editor, and Audio Converter; (3) Aurora Media Workshop; DB Audio Mixer And Editor; (4) J. Hepple Products including Fx Audio Editor and others; (5) EXPStudio Audio Editor; (6) iMesh; (7) Quikscribe; (8) RMBSoft AudioConvert and SoundEdit Pro 2.1; (9) CDBurnerXP; (10) Code-it Software Wave MP3 Editor and aBasic Editor; (11) Movavi VideoMessage, DVD to iPod, and others; (12) SoftDiv Software Dexster, iVideoMAX, and others; (13) Sienzo Digital Music Mentor (DMM); (14) MP3 Normalizer; (15) Roemer Software FREE and Easy Hi-Q Recorder, and Easy Hi-Q Converter; (16) Audio Edit Magic; (17) Joshua Video and Audio Converter; (18) Virtual CD; (19) Cheetah CD and DVD Burner; (20) Mystik Media AudioEdit Deluxe, Blaze Media, and others; (21) Power Audio Editor; (22) DanDans Digital Media Full Audio Converter, Music Editing Master, and others; (23) Xrlly Software Text to Speech Makerand Arial Sound Recorder / Audio Converter; (24) Absolute Sound Recorder, Video to Audio Converter, and MP3 Splitter; (25) Easy Ringtone Maker; (26) RecordNRip; (27) McFunSoft iPod Audio Studio, Audio Recorder for Free, and others; (28) MP3 WAV Converter; (29) BearShare 6.0.2.26789; and (30) Oracle Siebel SimBuilder and CRM 7.x.
|
2007-01-24
|
Metasploit
|
cpe:2.3:a:altdo:convert_mp3_master:1.1:*:*:*:*:*:*:*;cpe:2.3:a:altdo:mp3_record_and_edit_audio_master:1.2:*:*:*:*:*:*:*;cpe:2.3:a:americanshareware:mp3_wav_converter:3.1.8:*:*:*:*:*:*:*;cpe:2.3:a:audio_edit_magic:audio_edit_magic:9.2.3_389:*:*:*:*:*:*:*;cpe:2.3:a:bearshare:bearshare:6.0.2.26789:*:*:*:*:*:*:*;cpe:2.3:a:cdburnerxp:cdburnerxp_pro:3.0.116:*:*:*:*:*:*:*;cpe:2.3:a:cheetahburner:cheetah_cd_burner:3.56:*:*:*:*:*:*:*;cpe:2.3:a:cheetahburner:cheetah_dvd_burner:1.79:*:*:*:*:*:*:*;cpe:2.3:a:code-it_softare:abasic_editor:10.1:*:*:*:*:*:*:*;cpe:2.3:a:code-it_softare:wave_mp3_editor:10.1:*:*:*:*:*:*:*;cpe:2.3:a:dandans_digital_media_products:easy_audio_editor:7.4:*:*:*:*:*:*:*;cpe:2.3:a:dandans_digital_media_products:full_audio_converter:4.2:*:*:*:*:*:*:*;cpe:2.3:a:dandans_digital_media_products:music_editing_master:5.2:*:*:*:*:*:*:*;cpe:2.3:a:dandans_digital_media_products:visual_video_converter:4.4:*:*:*:*:*:*:*;cpe:2.3:a:digital_borneo:audio_mixer_and_editor:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:easy_ringtone_maker:easy_ringtone_maker:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:expstudio:audio_editor:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:iaudiosoft.com:absolute_mp3_splitter:2.5.4:*:*:*:*:*:*:*;cpe:2.3:a:iaudiosoft.com:absolute_sound_recorder:3.4.5:*:*:*:*:*:*:*;cpe:2.3:a:iaudiosoft.com:absolute_video_to_audio_converter:2.7.9:*:*:*:*:*:*:*;cpe:2.3:a:imesh.com:imesh:7.0.2.26789:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_audio_concat:1.2.0_beta:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_audio_editor:4.7.11:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_audio_tools:7.3.4:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_magic_music:5.7.7:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_movie_joiner:6.2.8:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_movie_joiner_and_splitter:6.2.8:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_movie_splitter:6.4.7:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_new_sound:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:j_hepple_products:fx_video_converter:7.51.21:*:*:*:*:*:*:*;cpe:2.3:a:joshua_mediasoft:audio_convertor_plus:2.2:*:*:*:*:*:*:*;cpe:2.3:a:joshua_mediasoft:video_converter_plus:3.01:*:*:*:*:*:*:*;cpe:2.3:a:magicvideosoftare:magic_audio_converter:8.2.6_build_719:*:*:*:*:*:*:*;cpe:2.3:a:magicvideosoftare:magic_audio_recorder:5.3.7:*:*:*:*:*:*:*;cpe:2.3:a:magicvideosoftare:magic_music_editor:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:mcfunsoft:audio_editor:6.3.3_build_489:*:*:*:*:*:*:*;cpe:2.3:a:mcfunsoft:audio_recorder_for_free:6.1:*:*:*:*:*:*:*;cpe:2.3:a:mcfunsoft:audio_studio:6.6.3_build_479:*:*:*:*:*:*:*;cpe:2.3:a:mcfunsoft:ipod_audio_studio:6.2.4:*:*:*:*:*:*:*;cpe:2.3:a:mcfunsoft:ipod_music_converter:5.1:*:*:*:*:*:*:*;cpe:2.3:a:mcfunsoft:recording_to_ipod_solution:5.1:*:*:*:*:*:*:*;cpe:2.3:a:mediatox:aurora_media_workshop:3.3.25:*:*:*:*:*:*:*;cpe:2.3:a:movavi:chiliburner:2.3:*:*:*:*:*:*:*;cpe:2.3:a:movavi:convertmovie:4.4:*:*:*:*:*:*:*;cpe:2.3:a:movavi:dvd_to_ipod:1.0:*:*:*:*:*:*:*;cpe:2.3:a:movavi:splitmovie:1.4:*:*:*:*:*:*:*;cpe:2.3:a:movavi:suite:3.5:*:*:*:*:*:*:*;cpe:2.3:a:movavi:videomessage:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mp3-soft:mp3_normalizer:1.03:*:*:*:*:*:*:*;cpe:2.3:a:mystik_media_products:audioedit_deluxe:4.10:*:*:*:*:*:*:*;cpe:2.3:a:mystik_media_products:blaze_media_pro:7.0:*:*:*:*:*:*:*;cpe:2.3:a:mystik_media_products:blaze_mediaconvert:3.4:*:*:*:*:*:*:*;cpe:2.3:a:mystik_media_products:contextconvert_pro:3.1:*:*:*:*:*:*:*;cpe:2.3:a:nctsoft_products:nctaudioeditor:2.7.1:*:*:*:*:*:*:*;cpe:2.3:a:nctsoft_products:nctaudiofile2:*:*:*:*:*:*:*:*;cpe:2.3:a:nctsoft_products:nctaudiostudio:2.7.1:*:*:*:*:*:*:*;cpe:2.3:a:nctsoft_products:nctdialogicvoice:2.7.1:*:*:*:*:*:*:*;cpe:2.3:a:nextlevel_systems:audio_editor_gold:9.2.5_build_424:*:*:*:*:*:*:*;cpe:2.3:a:nextlevel_systems:audio_studio_gold:7.0.1.1_build_500:*:*:*:*:*:*:*;cpe:2.3:a:quikscribe:quikscribe_player:5.022.05:*:*:*:*:*:*:*;cpe:2.3:a:quikscribe:quikscribe_recorder:5.021.29:*:*:*:*:*:*:*;cpe:2.3:a:recordnrip:recordnrip:1.0:*:*:*:*:*:*:*;cpe:2.3:a:rmbsoft:audioconvert:3.1.0.125:*:*:*:*:*:*:*;cpe:2.3:a:rmbsoft:soundedit_pro:2.1:*:*:*:*:*:*:*;cpe:2.3:a:roemer_software:easy_hi-q_converter:1.7:*:*:*:*:*:*:*;cpe:2.3:a:roemer_software:easy_hi-q_recorder:2.0:*:*:*:*:*:*:*;cpe:2.3:a:roemer_software:free_hi-q_recorder:1.9:*:*:*:*:*:*:*;cpe:2.3:a:sienzo:digital_music_mentor:2.6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:smart_media_systems:power_audio_editor:11.0.1:*:*:*:*:*:*:*;cpe:2.3:a:softdiv_softare:dexster:3.0:*:*:*:*:*:*:*;cpe:2.3:a:softdiv_softare:ivideomax:3.9:*:*:*:*:*:*:*;cpe:2.3:a:softdiv_softare:mp3_to_wav_converter:3.0:*:*:*:*:*:*:*;cpe:2.3:a:softdiv_softare:snosh:1.4:*:*:*:*:*:*:*;cpe:2.3:a:softdiv_softare:videozilla:2.5:*:*:*:*:*:*:*;cpe:2.3:a:virtual_cd:virtual_cd:6.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:virtual_cd:virtual_cd:7.1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:virtual_cd:virtual_cd:8.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:virtual_cd:virtual_cd_file_server:7.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:xrlly_software:arial_audio_converter:2.3.40:*:*:*:*:*:*:*;cpe:2.3:a:xrlly_software:arial_sound_recorder:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:xrlly_software:text_to_speech_maker:1.3.8:*:*:*:*:*:*:*;cpe:2.3:a:xwaver.com:magic_audio_editor_pro:10.3.1_build_476:*:*:*:*:*:*:*;cpe:2.3:a:xwaver.com:magic_music_studio_pro:7.0.2.1_build_500:*:*:*:*:*:*:*
|
CVE-2007-0038
| 0
| null | 0.88342
|
Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons, a variant of CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this might be a duplicate of CVE-2007-1765; if so, then CVE-2007-0038 should be preferred.
|
2007-03-30
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:gold:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:gold:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:gold:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:gold:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional_x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*
|
CVE-2007-0169
| 0
| null | 0.77509
|
Multiple buffer overflows in Computer Associates (CA) BrightStor ARCserve Backup 9.01 through 11.5, Enterprise Backup 10.5, and CA Server/Business Protection Suite r2 allow remote attackers to execute arbitrary code via RPC requests with crafted data for opnums (1) 0x2F and (2) 0x75 in the (a) Message Engine RPC service, or opnum (3) 0xCF in the Tape Engine service.
|
2007-01-11
|
Metasploit
|
cpe:2.3:a:broadcom:brightstor_arcserve_backup:*:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*
|
CVE-2007-0325
| 0
| null | 0.73581
|
Multiple buffer overflows in the Trend Micro OfficeScan Web-Deployment SetupINICtrl ActiveX control in OfficeScanSetupINI.dll, as used in OfficeScan 7.0 before Build 1344, OfficeScan 7.3 before Build 1241, and Client / Server / Messaging Security 3.0 before Build 1197, allow remote attackers to execute arbitrary code via a crafted HTML document.
|
2007-02-20
|
Metasploit
|
cpe:2.3:a:trend_micro:client-server-messaging_security:3.0:*:*:*:*:*:*:*;cpe:2.3:a:trend_micro:officescan_corporate_edition:7.0:*:*:*:*:*:*:*;cpe:2.3:a:trend_micro:officescan_corporate_edition:7.3:*:*:*:*:*:*:*
|
CVE-2007-0348
| 0
| null | 0.74294
|
Stack-based buffer overflow in the IASystemInfo.dll ActiveX control in (1) InterActual Player 2.60.12.0717, (2) Roxio CinePlayer 3.2, (3) WinDVD 7.0.27.172, and possibly other products, allows remote attackers to execute arbitrary code via a long ApplicationType property.
|
2007-03-21
|
Metasploit
|
cpe:2.3:a:interactual_technologies:interactual_player:2.60.12.0717:*:*:*:*:*:*:*;cpe:2.3:a:intervideo:windvd:7.0.27.172:*:*:*:*:*:*:*;cpe:2.3:a:roxio:cineplayer:3.2:*:*:*:*:*:*:*
|
CVE-2007-0449
| 0
| null | 0.82011
|
Multiple buffer overflows in LGSERVER.EXE in CA BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.1 SP1, Mobile Backup r4.0, Desktop and Business Protection Suite r2, and Desktop Management Suite (DMS) r11.0 and r11.1 allow remote attackers to execute arbitrary code via crafted packets to TCP port (1) 1900 or (2) 2200.
|
2007-01-23
|
Metasploit
|
cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_mobile_backup:r4.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:desktop_management_suite:11.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:desktop_management_suite:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:desktop_protection_suite:2.0:*:*:*:*:*:*:*
|
CVE-2007-0671
| 8.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| 0.68363
|
Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonstrated by Exploit-MSExcel.h in targeted zero-day attacks.
|
2007-02-03
|
CISA
|
cpe:2.3:a:microsoft:access:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:access:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:access:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2004:*:mac:*:*:*:*:*;cpe:2.3:a:microsoft:excel_viewer:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:frontpage:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:frontpage:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:frontpage:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:infopath:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:onenote:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:powerpoint:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:powerpoint:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:powerpoint:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:powerpoint:2004:*:mac:*:*:*:*:*;cpe:2.3:a:microsoft:project:2000:sr1:*:*:*:*:*:*;cpe:2.3:a:microsoft:project:2002:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:project:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:publisher:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:publisher:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:publisher:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:visio:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:word:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:word_viewer:2003:*:*:*:*:*:*:*
|
CVE-2007-0774
| 0
| null | 0.86753
|
Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.
|
2007-03-04
|
Metasploit
|
cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.20:*:*:*:*:*:*:*
|
CVE-2007-0882
| 0
| null | 0.91063
|
Argument injection vulnerability in the telnet daemon (in.telnetd) in Solaris 10 and 11 (SunOS 5.10 and 5.11) misinterprets certain client "-f" sequences as valid requests for the login program to skip authentication, which allows remote attackers to log into certain accounts, as demonstrated by the bin account.
|
2007-02-12
|
Metasploit
|
cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*
|
CVE-2007-0885
| 0
| null | 0.02133
|
Cross-site scripting (XSS) vulnerability in jira/secure/BrowseProject.jspa in Rainbow with the Zen (Rainbow.Zen) extension allows remote attackers to inject arbitrary web script or HTML via the id parameter.
|
2007-02-12
|
Nuclei
|
cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*;cpe:2.3:a:rainbow_portal:rainbow_with_the_zen:*:*:*:*:*:*:*:*
|
CVE-2007-0977
| 0
| null | 0.70115
|
IBM Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores HTTPPassword hashes from names.nsf in a manner accessible through Readviewentries and OpenDocument requests to the defaultview view, a different vector than CVE-2005-2428.
|
2007-02-16
|
Metasploit
|
cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:6.0:*:*:*:*:*:*:*
|
CVE-2007-1036
| 0
| null | 0.90349
|
The default configuration of JBoss does not restrict access to the (1) console and (2) web management interfaces, which allows remote attackers to bypass authentication and gain administrative access via direct requests.
|
2007-02-21
|
Metasploit
|
cpe:2.3:a:jboss:jboss_application_server:*:*:*:*:*:*:*:*
|
CVE-2007-1070
| 0
| null | 0.78365
|
Multiple stack-based buffer overflows in Trend Micro ServerProtect for Windows and EMC 5.58, and for Network Appliance Filer 5.61 and 5.62, allow remote attackers to execute arbitrary code via crafted RPC requests to TmRpcSrv.dll that trigger overflows when calling the (1) CMON_NetTestConnection, (2) CMON_ActiveUpdate, and (3) CMON_ActiveRollback functions in (a) StCommon.dll, and (4) ENG_SetRealTimeScanConfigInfo and (5) ENG_SendEMail functions in (b) eng50.dll.
|
2007-02-21
|
Metasploit
|
cpe:2.3:a:trend_micro:serverprotect:5.58:*:emc:*:*:*:*:*;cpe:2.3:a:trend_micro:serverprotect:5.61:*:network_appliance_filer:*:*:*:*:*;cpe:2.3:a:trend_micro:serverprotect:5.62:*:network_appliance_filer:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:32_bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*
|
CVE-2007-1286
| 0
| null | 0.77523
|
Integer overflow in PHP 4.4.4 and earlier allows remote context-dependent attackers to execute arbitrary code via a long string to the unserialize function, which triggers the overflow in the ZVAL reference counter.
|
2007-03-06
|
Metasploit
|
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
|
CVE-2007-1373
| 0
| null | 0.76457
|
Stack-based buffer overflow in Mercury/32 (aka Mercury Mail Transport System) 4.01b and earlier allows remote attackers to execute arbitrary code via a long LOGIN command. NOTE: this might be the same issue as CVE-2006-5961.
|
2007-03-10
|
Metasploit
|
cpe:2.3:a:pmail:mercury_mail_transport_system:*:*:*:*:*:*:*:*
|
CVE-2007-1435
| 0
| null | 0.6068
|
Buffer overflow in D-Link TFTP Server 1.0 allows remote attackers to cause a denial of service (crash) via a long (1) GET or (2) PUT request, which triggers memory corruption. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
2007-03-13
|
Metasploit
|
cpe:2.3:a:d-link:tftp_server:1.0:*:*:*:*:*:*:*
|
CVE-2007-1559
| 0
| null | 0.62849
|
Multiple stack-based buffer overflows in SonicDVDDashVRNav.dll in Roxio CinePlayer 3.2 allow remote attackers to execute arbitrary code via (1) unspecified long property values to SonicMediaPlayer.dll or (2) long arguments to unspecified methods in SonicMediaPlayer.dll.
|
2007-04-11
|
Metasploit
|
cpe:2.3:a:roxio:cineplayer:3.2:*:*:*:*:*:*:*
|
CVE-2007-1674
| 0
| null | 0.78218
|
Stack-based buffer overflow in the Alert Service (aolnsrvr.exe) in LANDesk Management Suite 8.7 allows remote attackers to execute arbitrary code via a crafted packet to port 65535/UDP.
|
2007-04-18
|
Metasploit
|
cpe:2.3:a:landesk:landesk_management_suite:8.7:*:*:*:*:*:*:*
|
CVE-2007-1682
| 0
| null | 0.63261
|
Multiple stack-based buffer overflows in the FileManager ActiveX control in SAFmgPws.dll in SoftArtisans XFile before 2.4.0 allow remote attackers to execute arbitrary code via unspecified calls to the (1) BuildPath, (2) GetDriveName, (3) DriveExists, or (4) DeleteFile method.
|
2008-08-27
|
Metasploit
|
cpe:2.3:a:softartisans:xfile:*:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.01:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.0:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1.6:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1.7:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:1.1:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.0:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.1.6:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.1.7:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:softartisans:xfile:2.2.4:*:*:*:*:*:*:*
|
CVE-2007-1689
| 0
| null | 0.73764
|
Buffer overflow in the ISAlertDataCOM ActiveX control in ISLALERT.DLL for Norton Personal Firewall 2004 and Internet Security 2004 allows remote attackers to execute arbitrary code via long arguments to the (1) Get and (2) Set functions.
|
2007-05-16
|
Metasploit
|
cpe:2.3:a:symantec:norton_internet_security:2004:*:*:*:*:*:*:*;cpe:2.3:a:symantec:norton_personal_firewall:2004:*:*:*:*:*:*:*
|
CVE-2007-1748
| 0
| null | 0.85144
|
Stack-based buffer overflow in the RPC interface in the Domain Name System (DNS) Server Service in Microsoft Windows 2000 Server SP 4, Server 2003 SP 1, and Server 2003 SP 2 allows remote attackers to execute arbitrary code via a long zone name containing character constants represented by escape sequences.
|
2007-04-13
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp1:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:sp2:*:x64:*:*:*:*:*
|
CVE-2007-1765
| 0
| null | 0.59326
|
Unspecified vulnerability in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a malformed ANI file, which results in memory corruption when processing cursors, animated cursors, and icons, a similar issue to CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this issue might be a duplicate of CVE-2007-0038; if so, then use CVE-2007-0038 instead of this identifier.
|
2007-03-30
|
Metasploit
|
cpe:2.3:a:avaya:ip600_media_servers:*:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:ie:7.0:*:vista:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*;cpe:2.3:h:avaya:definity_one_media_server:*:*:*:*:*:*:*:*;cpe:2.3:h:avaya:s3400:*:*:*:*:*:*:*:*;cpe:2.3:h:avaya:s8100:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:*:*:*:advanced_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:*:*:*:datacenter_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:*:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:*:*:ja:server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:advanced_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:datacenter_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:advanced_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:datacenter_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:advanced_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:datacenter_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:advanced_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:datacenter_server:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:server:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp2:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:datacenter:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:enterprise:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:standard:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:web_edition:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:business:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:december_ctp:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:enterprise:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:home_basic:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:home_premium:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:beta1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:beta2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:beta:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:home:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:media_center:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:tablet_pc:*:*:*
|
CVE-2007-1819
| 0
| null | 0.7557
|
Stack-based buffer overflow in the SPIDERLib.Loader ActiveX control (Spider90.ocx) 9.1.0.4353 in TestDirector (TD) for Mercury Quality Center 9.0 before Patch 12.1, and 8.2 SP1 before Patch 32, allows remote attackers to execute arbitrary code via a long ProgColor property.
|
2007-04-02
|
Metasploit
|
cpe:2.3:a:hp:mercury_quality_center:8.2:sp1:*:*:*:*:*:*;cpe:2.3:a:hp:mercury_quality_center:9.0:*:*:*:*:*:*:*
|
CVE-2007-1868
| 0
| null | 0.75178
|
The management service in IBM Tivoli Provisioning Manager for OS Deployment before 5.1 Fix Pack 2 does not properly handle multipart/form-data in HTTP POST requests, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via crafted POST requests to port 8080/tcp or 443/tcp.
|
2007-04-04
|
Metasploit
|
cpe:2.3:a:ibm:tivoli_provisioning_manager_os_deployment:5.1.0.116:*:*:*:*:*:*:*
|
CVE-2007-2139
| 0
| null | 0.83801
|
Multiple stack-based buffer overflows in the SUN RPC service in CA (formerly Computer Associates) BrightStor ARCserve Media Server, as used in BrightStor ARCserve Backup 9.01 through 11.5 SP2, BrightStor Enterprise Backup 10.5, Server Protection Suite 2, and Business Protection Suite 2, allow remote attackers to execute arbitrary code via malformed RPC strings, a different vulnerability than CVE-2006-5171, CVE-2006-5172, and CVE-2007-1785.
|
2007-04-25
|
Metasploit
|
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:sp2:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:server_protection_suite:2:*:*:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:*;cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_sbs_premium:*:*:*:*:*;cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_sbs_standard:*:*:*:*:*
|
CVE-2007-2175
| 0
| null | 0.84873
|
Apple QuickTime Java extensions (QTJava.dll), as used in Safari and other browsers, and when Java is enabled, allows remote attackers to execute arbitrary code via parameters to the toQTPointer method in quicktime.util.QTHandleRef, which can be used to modify arbitrary memory when creating QTPointerRef objects, as demonstrated during the "PWN 2 0WN" contest at CanSecWest 2007.
|
2007-04-24
|
Metasploit
|
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
|
CVE-2007-2193
| 0
| null | 0.75177
|
Stack-based buffer overflow in the ID_X.apl plugin in ACDSee 9.0 Build 108, Pro 8.1 Build 99, and Photo Editor 4.0 Build 195 allows user-assisted remote attackers to execute arbitrary code via a crafted XPM file with a long section string. NOTE: some of these details are obtained from third party information.
|
2007-04-24
|
Metasploit
|
cpe:2.3:a:acd_systems:acdsee:8.1_build_99:*:pro:*:*:*:*:*;cpe:2.3:a:acd_systems:acdsee:9.0_build_108:*:*:*:*:*:*:*;cpe:2.3:a:acd_systems:photo_editor:4.0_build_195:*:*:*:*:*:*:*
|
CVE-2007-2238
| 0
| null | 0.7633
|
Multiple stack-based buffer overflows in the Whale Client Components ActiveX control (WhlMgr.dll), as used in Microsoft Intelligent Application Gateway (IAG) before 3.7 SP2, allow remote attackers to execute arbitrary code via long arguments to the (1) CheckForUpdates or (2) UpdateComponents methods.
|
2009-04-16
|
Metasploit
|
cpe:2.3:a:microsoft:intelligent_application_gateway_2007:*:sp1:*:*:*:*:*:*
|
CVE-2007-2280
| 0
| null | 0.71004
|
Stack-based buffer overflow in OmniInet.exe (aka the backup client service daemon) in the Application Recovery Manager component in HP OpenView Storage Data Protector 5.50 and 6.0 allows remote attackers to execute arbitrary code via an MSG_PROTOCOL command with long arguments, a different vulnerability than CVE-2009-3844.
|
2009-12-18
|
Metasploit
|
cpe:2.3:a:hp:openview_storage_data_protector:5.50:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_storage_data_protector:6.0:*:*:*:*:*:*:*
|
CVE-2007-2386
| 0
| null | 0.71927
|
Buffer overflow in mDNSResponder in Apple Mac OS X 10.4 up to 10.4.9 allows remote attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted UPnP Internet Gateway Device (IGD) packet.
|
2007-05-24
|
Metasploit
|
cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
|
CVE-2007-2446
| 0
| null | 0.7795
|
Multiple heap-based buffer overflows in the NDR parsing in smbd in Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 (lsa_io_trans_names).
|
2007-05-14
|
Metasploit
|
cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
|
CVE-2007-2447
| 0
| null | 0.60899
|
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
|
2007-05-14
|
Metasploit
|
cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
|
CVE-2007-2449
| 0
| null | 0.80304
|
Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.
|
2007-06-14
|
Nuclei
|
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*
|
CVE-2007-2508
| 0
| null | 0.78609
|
Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote attackers to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the AgRpcCln.dll library in SpntSvc.exe; or (2) TCP port 3628, which triggers an overflow in EarthAgent.exe. NOTE: both issues are reachable via TmRpcSrv.dll.
|
2007-05-08
|
Metasploit
|
cpe:2.3:a:trend_micro:serverprotect:*:*:*:*:*:*:*:*
|
CVE-2007-2617
| 0
| null | 0.09033
|
srsexec in Sun Remote Services (SRS) Net Connect Software Proxy Core package in Sun Solaris 10 does not enforce file permissions when opening files, which allows local users to read the first line of arbitrary files via the -d and -v options.
|
2007-05-11
|
Metasploit
|
cpe:2.3:a:sun:net_connect_software:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:sun:net_connect_software:3.2.4:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*
|
CVE-2007-2711
| 0
| null | 0.79226
|
Stack-based buffer overflow in TinyIdentD 2.2 and earlier allows remote attackers to execute arbitrary code via a long string to TCP port 113.
|
2007-05-16
|
Metasploit
|
cpe:2.3:a:tinyirc:tinyidentd:*:*:*:*:*:*:*:*
|
CVE-2007-2864
| 0
| null | 0.79929
|
Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file.
|
2007-06-06
|
Metasploit
|
cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:10.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:common_services:1.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:common_services:1.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:common_services:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:common_services:2.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:common_services:2.2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:common_services:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_antivirus:8.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_antivirus:8.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_antivirus_sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_ez_antivirus:7.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_ez_armor:1.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_ez_armor:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:etrust_ez_armor:3.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:integrated_threat_management:8.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:internet_security_suite:1.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:internet_security_suite:2.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:internet_security_suite:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*;cpe:2.3:a:ca:etrust_secure_content_manager:8.0:*:*:*:*:*:*:*;cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*;cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:*
|
CVE-2007-2888
| 0
| null | 0.80267
|
Stack-based buffer overflow in UltraISO 8.6.2.2011 and earlier allows user-assisted remote attackers to execute arbitrary code via a long FILE string (filename) in a .cue file, a related issue to CVE-2007-2761. NOTE: some details are obtained from third party information.
|
2007-05-30
|
Metasploit
|
cpe:2.3:a:ezb_systems:ultraiso:*:*:*:*:*:*:*:*
|
CVE-2007-2918
| 0
| null | 0.73156
|
Multiple stack-based buffer overflows in ActiveX controls (1) VibeC in (a) vibecontrol.dll, (2) CallManager and (3) ViewerClient in (b) StarClient.dll, (4) ComLink in (c) uicomlink.dll, and (5) WebCamXMP in (d) wcamxmp.dll in Logitech VideoCall allow remote attackers to cause a denial of service (browser crash) and execute arbitrary code via unspecified vectors.
|
2007-06-01
|
Metasploit
|
cpe:2.3:a:logitech:videocall:*:*:*:*:*:*:*:*
|
CVE-2007-2919
| 0
| null | 0.74523
|
Multiple stack-based buffer overflows in the FViewerLoading ActiveX control (FlipViewerX.dll) in E-Book Systems FlipViewer before 4.1 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via long (1) UID, (2) Opf, (3) PAGENO, (4) LaunchMode, (5) SubID, (6) BookID, (7) LibraryID, (8) SubURL, and (9) LoadOpf properties.
|
2007-06-06
|
Metasploit
|
cpe:2.3:a:e-book_systems:flipviewer:*:*:*:*:*:*:*:*
|
CVE-2007-2987
| 0
| null | 0.74973
|
Multiple buffer overflows in certain ActiveX controls in sasatl.dll in Zenturi ProgramChecker allow remote attackers to execute arbitrary code via unspecified vectors, possibly involving the (1) DebugMsgLog or (2) DoFileProperties methods.
|
2007-06-01
|
Metasploit
|
cpe:2.3:a:zenturi:zenturi_programchecker:*:*:*:*:*:*:*:*
|
CVE-2007-3010
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.94007
|
masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server R7.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the user parameter during a ping action.
|
2007-09-18
|
Metasploit/Nuclei/CISA
|
cpe:2.3:a:al-enterprise:omnipcx_enterprise_communication_server:*:*:*:*:*:*:*:*
|
CVE-2007-3039
| 0
| null | 0.83998
|
Stack-based buffer overflow in the Microsoft Message Queuing (MSMQ) service in Microsoft Windows 2000 Server SP4, Windows 2000 Professional SP4, and Windows XP SP2 allows attackers to execute arbitrary code via a long string in an opnum 0x06 RPC call to port 2103. NOTE: this is remotely exploitable on Windows 2000 Server.
|
2007-12-12
|
Metasploit
|
cpe:2.3:a:microsoft:message_queuing:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:pro:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:srv:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
|
CVE-2007-3068
| 0
| null | 0.7945
|
Stack-based buffer overflow in DVD X Player 4.1 Professional allows remote attackers to execute arbitrary code via a PLF playlist containing a long filename.
|
2007-06-06
|
Metasploit
|
cpe:2.3:a:dvd_x_studios:dvd_x_player:4.1:*:professional:*:*:*:*:*
|
CVE-2007-3147
| 0
| null | 0.58205
|
Buffer overflow in the Yahoo! Webcam Upload ActiveX control in ywcupl.dll 2.0.1.4 for Yahoo! Messenger 8.1.0.249 allows remote attackers to execute arbitrary code via a long server property value to the send method. NOTE: some of these details are obtained from third party information.
|
2007-06-11
|
Metasploit
|
cpe:2.3:a:yahoo:messenger:2.0.1.4:*:*:*:*:*:*:*;cpe:2.3:a:yahoo:messenger:8.0.0.863:*:*:*:*:*:*:*;cpe:2.3:a:yahoo:messenger:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:yahoo:messenger:8.0:*:*:*:*:*:*:*;cpe:2.3:a:yahoo:messenger:8.0_2005.1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:yahoo:messenger:8.1.0.249:*:*:*:*:*:*:*
|
CVE-2007-3216
| 0
| null | 0.60166
|
Multiple buffer overflows in the LGServer component of CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.1 allow remote attackers to execute arbitrary code via crafted arguments to the (1) rxsAddNewUser, (2) rxsSetUserInfo, (3) rxsRenameUser, (4) rxsSetMessageLogSettings, (5) rxsExportData, (6) rxsSetServerOptions, (7) rxsRenameFile, (8) rxsACIManageSend, (9) rxsExportUser, (10) rxsImportUser, (11) rxsMoveUserData, (12) rxsUseLicenseIni, (13) rxsLicGetSiteId, (14) rxsGetLogFileNames, (15) rxsGetBackupLog, (16) rxsBackupComplete, (17) rxsSetDataProtectionSecurityData, (18) rxsSetDefaultConfigName, (19) rxsGetMessageLogSettings, (20) rxsHWDiskGetTotal, (21) rxsHWDiskGetFree, (22) rxsGetSubDirs, (23) rxsGetServerDBPathName, (24) rxsSetServerOptions, (25) rxsDeleteFile, (26) rxsACIManageSend, (27) rxcReadBackupSetList, (28) rxcWriteConfigInfo, (29) rxcSetAssetManagement, (30) rxcWriteFileListForRestore, (31) rxcReadSaveSetProfile, (32) rxcInitSaveSetProfile, (33) rxcAddSaveSetNextAppList, (34) rxcAddSaveSetNextFilesPathList, (35) rxcAddNextBackupSetIncWildCard, (36) rxcGetRevisions, (37) rxrAddMovedUser, (38) rxrSetClientVersion, or (39) rxsSetDataGrowthScheduleAndFilter commands.
|
2007-06-14
|
Metasploit
|
cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:*:*:*:*:*:*:*
|
CVE-2007-3280
| 0
| null | 0.56641
|
The Database Link library (dblink) in PostgreSQL 8.1 implements functions via CREATE statements that map to arbitrary libraries based on the C programming language, which allows remote authenticated superusers to map and execute a function from any library, as demonstrated by using the system function in libc.so.6 to gain shell access.
|
2007-06-19
|
Metasploit
|
cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:*
|
CVE-2007-3314
| 0
| null | 0.76114
|
Stack-based buffer overflow in peviewer.spl in Altap Servant Salamander 2.5 with Portable Executable Viewer 2.02 (English Trial), and 2.0 with Portable Executable Viewer 1.00 (English Trial), allows remote attackers to execute arbitrary code via a long PDB debug filename in a PE file.
|
2007-06-21
|
Metasploit
|
cpe:2.3:a:altap:portable_executable_viewer:1.00:*:english_trial:*:*:*:*:*;cpe:2.3:a:altap:portable_executable_viewer:2.02:*:english_trial:*:*:*:*:*;cpe:2.3:a:altap:servant_salamander:2.0:*:*:*:*:*:*:*;cpe:2.3:a:altap:servant_salamander:2.5:*:*:*:*:*:*:*
|
CVE-2007-3389
| 0
| null | 0.22887
|
Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload.
|
2007-06-26
|
Metasploit
|
cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*
|
CVE-2007-3435
| 0
| null | 0.76141
|
Stack-based buffer overflow in the BeginPrint method in a certain ActiveX control in RKD Software (barcodetools.com) BarCodeAx.dll 4.9 allows remote attackers to execute arbitrary code via a long argument.
|
2007-06-27
|
Metasploit
|
cpe:2.3:a:rkd_software:barcode_activex:4.9:*:*:*:*:*:*:*
|
CVE-2007-3566
| 0
| null | 0.74824
|
Stack-based buffer overflow in the database service (ibserver.exe) in Borland InterBase 2007 before SP2 allows remote attackers to execute arbitrary code via a long size value in a create request to port 3050/tcp.
|
2007-07-26
|
Metasploit
|
cpe:2.3:a:borland_software:interbase:2007:*:*:*:*:*:*:*
|
CVE-2007-3605
| 0
| null | 0.86968
|
Stack-based buffer overflow in the kweditcontrol.kwedit.1 ActiveX control in FrontEnd\SapGui\kwedit.dll in the EnjoySAP SAP GUI allows remote attackers to execute arbitrary code via a long argument to the PrepareToPostHTML function.
|
2007-07-06
|
Metasploit
|
cpe:2.3:a:sap:enjoysap:*:*:*:*:*:*:*:*
|
CVE-2007-3614
| 0
| null | 0.7771
|
Multiple stack-based buffer overflows in waHTTP.exe (aka the SAP DB Web Server) in SAP DB, possibly 7.3 through 7.5, allow remote attackers to execute arbitrary code via (1) a certain cookie value; (2) a certain additional parameter, related to sapdbwa_GetQueryString; and other unspecified vectors related to "numerous other fields."
|
2007-07-06
|
Metasploit
|
cpe:2.3:a:sap:sap_db:7.3.00:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_db:7.3.29:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_db:7.4.03.29:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_db:7.4.03.30:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_db:7.4.3.7_beta:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_db:7.4.3:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_db:7.4:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_db:7.5:*:*:*:*:*:*:*
|
CVE-2007-3872
| 0
| null | 0.71103
|
Multiple stack-based buffer overflows in the Shared Trace Service (OVTrace) service for HP OpenView Operations A.07.50 for Windows, and possibly earlier versions, allow remote attackers to execute arbitrary code via certain crafted requests.
|
2007-08-09
|
Metasploit
|
cpe:2.3:a:hp:openview_operations:*:*:windows:*:*:*:*:*;cpe:2.3:a:hp:shared_trace_service:*:*:*:*:*:*:*:*
|
CVE-2007-3901
| 0
| null | 0.78531
|
Stack-based buffer overflow in the DirectShow Synchronized Accessible Media Interchange (SAMI) parser in quartz.dll for Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted SAMI file.
|
2007-12-12
|
Metasploit
|
cpe:2.3:a:microsoft:directx:10.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:5.2:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:6.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:7.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:7.0a:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:7.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:8.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:8.0a:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:8.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:8.1a:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:8.1b:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:8.2:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:9.0a:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:9.0b:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:directx:9.0c:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web_edition:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:professional:*:*:*:*:*
|
CVE-2007-3925
| 0
| null | 0.90441
|
Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
|
2007-07-21
|
Metasploit
|
cpe:2.3:a:ipswitch:imail_server:*:*:*:*:*:*:*:*;cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:*:*:*:*:*:*:*:*
|
CVE-2007-4006
| 0
| null | 0.66371
|
Buffer overflow in Mike Dubman Windows RSH daemon (rshd) 1.7 has unknown impact and remote attack vectors, aka ZD-00000034. NOTE: this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. A CVE has been assigned for tracking purposes, but duplicates with other CVEs are difficult to determine.
|
2007-07-26
|
Metasploit
|
cpe:2.3:a:mike_dubman:windows_rsh_daemon:1.7:*:*:*:*:*:*:*
|
CVE-2007-4370
| 0
| null | 0.7605
|
Multiple buffer overflows in the (1) client and (2) server in Racer 0.5.3 beta 5 allow remote attackers to execute arbitrary code via a long string to UDP port 26000.
|
2007-08-15
|
Metasploit
|
cpe:2.3:a:racer:racer:0.5.3:*:*:*:*:*:*:*
|
CVE-2007-4387
| 0
| null | 0.52822
|
Cross-site request forgery (CSRF) vulnerability in /xslt in 2wire 1701HG and 2071 Gateway routers, with 3.17.5 and 5.29.51 software, allows remote attackers to perform certain configuration changes as administrators.
|
2007-08-17
|
Metasploit
|
cpe:2.3:h:2wire:1701hg_router:3.17.5:*:*:*:*:*:*:*;cpe:2.3:h:2wire:1701hg_router:5.29.51:*:*:*:*:*:*:*;cpe:2.3:h:2wire:2071_router:3.17.5:*:*:*:*:*:*:*;cpe:2.3:h:2wire:2071_router:5.29.51:*:*:*:*:*:*:*
|
CVE-2007-4440
| 0
| null | 0.81335
|
Stack-based buffer overflow in the MercuryS SMTP server in Mercury Mail Transport System, possibly 4.51 and earlier, allows remote attackers to execute arbitrary code via a long AUTH CRAM-MD5 string. NOTE: this might overlap CVE-2006-5961.
|
2007-08-21
|
Metasploit
|
cpe:2.3:a:pmail:mercury_mail_transport_system:*:*:*:*:*:*:*:*
|
CVE-2007-4466
| 0
| null | 0.66935
|
Multiple stack-based buffer overflows in Electronic Arts (EA) SnoopyCtrl ActiveX control (NPSnpy.dll) allow remote attackers to execute arbitrary code via unspecified methods and parameters.
|
2007-10-09
|
Metasploit
|
cpe:2.3:a:electronic_arts:snoopyctrl:*:*:*:*:*:*:*:*
|
CVE-2007-4474
| 0
| null | 0.87468
|
Multiple stack-based buffer overflows in the IBM Lotus Domino Web Access ActiveX control, as provided by inotes6.dll, inotes6w.dll, dwa7.dll, and dwa7w.dll, in Domino 6.x and 7.x allow remote attackers to execute arbitrary code, as demonstrated by an overflow from a long General_ServerName property value when calling the InstallBrowserHelperDll function in the Upload Module in the dwa7.dwa7.1 control in dwa7w.dll 7.0.34.1.
|
2007-12-27
|
Metasploit
|
cpe:2.3:a:ibm:domino_web_access:6.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.5.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.5.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:6.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:domino_web_access:7.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino_web_access:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino_web_access:7.0.34.1:*:*:*:*:*:*:*
|
CVE-2007-4475
| 0
| null | 0.68002
|
Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method.
|
2009-04-01
|
Metasploit
|
cpe:2.3:a:sap:sapgui:*:*:*:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6:*:*:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6:*:windows:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6a:*:*:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6a:*:windows:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6b:*:*:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6b:*:windows:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6c:*:*:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6c:*:windows:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6d:*:*:*:*:*:*:*;cpe:2.3:a:sap:sapgui:4.6d:*:windows:*:*:*:*:*;cpe:2.3:a:sap:sapgui:6.40:*:*:*:*:*:*:*
|
CVE-2007-4504
| 0
| null | 0.0006
|
Directory traversal vulnerability in index.php in the RSfiles component (com_rsfiles) 1.0.2 and earlier for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the path parameter in a files.display action.
|
2007-08-23
|
Nuclei
|
cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:*
|
CVE-2007-4515
| 0
| null | 0.72612
|
Buffer overflow in a certain ActiveX control in YVerInfo.dll before 2007.8.27.1 in the Yahoo! services suite for Yahoo! Messenger before 8.1.0.419 allows remote attackers to execute arbitrary code via unspecified vectors involving arguments to the (1) fvCom and (2) info methods. NOTE: some of these details are obtained from third party information.
|
2007-08-31
|
Metasploit
|
cpe:2.3:a:yahoo:messenger:*:*:*:*:*:*:*:*
|
CVE-2007-4556
| 0
| null | 0.02359
|
Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via form input beginning with a "%{" sequence and ending with a "}" character.
|
2007-08-28
|
Nuclei
|
cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
|
CVE-2007-4560
| 0
| null | 0.91095
|
clamav-milter in ClamAV before 0.91.2, when run in black hole mode, allows remote attackers to execute arbitrary commands via shell metacharacters that are used in a certain popen call, involving the "recipient field of sendmail."
|
2007-08-28
|
Metasploit
|
cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*
|
CVE-2007-4607
| 0
| null | 0.79668
|
Buffer overflow in the EasyMailSMTPObj ActiveX control in emsmtp.dll 6.0.1 in the Quiksoft EasyMail SMTP Object, as used in Postcast Server Pro 3.0.61 and other products, allows remote attackers to execute arbitrary code via a long argument to the SubmitToExpress method, a different vulnerability than CVE-2007-1029. NOTE: this may have been fixed in version 6.0.3.15.
|
2007-08-31
|
Metasploit
|
cpe:2.3:a:gate_comm_software:postcast_server_pro:3.0.61:*:*:*:*:*:*:*;cpe:2.3:a:quicksoft:easymail_objects:*:*:*:*:*:*:*:*
|
CVE-2007-4620
| 0
| null | 0.75811
|
Multiple stack-based buffer overflows in Computer Associates (CA) Alert Notification Service (Alert.exe) 8.1.586.0, 8.0.450.0, and 7.1.758.0, as used in multiple CA products including Anti-Virus for the Enterprise 7.1 through r11.1 and Threat Manager for the Enterprise 8.1 and r8, allow remote authenticated users to execute arbitrary code via crafted RPC requests.
|
2008-04-07
|
Metasploit
|
cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*;cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:*;cpe:2.3:a:ca:threat_manager_for_the_enterprise:r8.1:*:*:*:*:*:*:*;cpe:2.3:a:ca:threat_manager_for_the_enterprise:r8:*:*:*:*:*:*:*
|
CVE-2007-4776
| 0
| null | 0.81829
|
Buffer overflow in Microsoft Visual Basic 6.0 and Enterprise Edition 6.0 SP6 allows user-assisted remote attackers to execute arbitrary code via a Visual Basic project (vbp) file containing a long Reference line, related to VBP_Open and OLE. NOTE: there are limited usage scenarios under which this would be a vulnerability.
|
2007-09-10
|
Metasploit
|
cpe:2.3:a:microsoft:visual_basic:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_basic:6.0:sp6:enterprise:*:*:*:*:*
|
CVE-2007-4880
| 0
| null | 0.88938
|
Buffer overflow in the Client Acceptor Daemon (CAD), dsmcad.exe, in certain IBM Tivoli Storage Manager (TSM) clients 5.1 before 5.1.8.1, 5.2 before 5.2.5.2, 5.3 before 5.3.5.3, and 5.4 before 5.4.1.2 allows remote attackers to execute arbitrary code via crafted HTTP headers, aka IC52905.
|
2007-09-28
|
Metasploit
|
cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4:*:*:*:*:*:*:*
|
CVE-2007-4915
| 0
| null | 0.78618
|
The Intersil isl3893 extensions for Boa 0.93.15, as used on the FreeLan RO80211G-AP and other devices, do not prevent stack writes from entering memory locations used for string constants, which allows remote attackers to change the admin password stored in memory via a long username in an HTTP Basic Authentication request.
|
2007-09-17
|
Metasploit
|
cpe:2.3:a:boa:boa_webserver:0.93.15:*:*:*:*:*:*:*
|
CVE-2007-5003
| 0
| null | 0.82085
|
Multiple stack-based buffer overflows in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 allow remote attackers to execute arbitrary code via a long (1) username or (2) password to the rxrLogin command in rxRPC.dll, or a long (3) username argument to the GetUserInfo function.
|
2007-10-01
|
Metasploit
|
cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:sp1:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.5:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:4.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:desktop_management_suite:11.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:desktop_management_suite:11.1:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:desktop_management_suite:11.2:*:*:*:*:*:*:*;cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*
|
CVE-2007-5067
| 0
| null | 0.83256
|
Multiple buffer overflows in iMatix Xitami Web Server 2.5c2 allow remote attackers to execute arbitrary code via a long If-Modified-Since header to (1) xigui32.exe or (2) xitami.exe.
|
2007-09-24
|
Metasploit
|
cpe:2.3:a:imatix:xitami:2.5_c2:*:*:*:*:*:*:*
|
CVE-2007-5082
| 0
| null | 0.70512
|
Multiple stack-based buffer overflows in Computer Associates (CA) BrightStor Hierarchical Storage Manager (HSM) before r11.6 allow remote attackers to execute arbitrary code via unspecified CsAgent service commands with certain opcodes, related to missing validation of a length parameter.
|
2007-10-01
|
Metasploit
|
cpe:2.3:a:broadcom:brightstor_hierarchical_storage_manager:11.5:*:*:*:*:*:*:*
|
CVE-2007-5107
| 0
| null | 0.76187
|
Stack-based buffer overflow in the AskJeevesToolBar.SettingsPlugin.1 ActiveX control in askBar.dll in IAC Search & Media ask.com Ask Toolbar 4.0.2.53 and earlier allows remote attackers to execute arbitrary code via a long ShortFormat property value. NOTE: some of these details are obtained from third party information. NOTE: the researcher claims that this is the same as CVE-2007-5108, but there is insufficient detail for CVE-2007-5108 to be certain.
|
2007-09-26
|
Metasploit
|
cpe:2.3:a:ask.com:ask_toolbar:*:*:*:*:*:*:*:*
|
CVE-2007-5208
| 0
| null | 0.73524
|
hpssd in Hewlett-Packard Linux Imaging and Printing Project (hplip) 1.x and 2.x before 2.7.10 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a from address, which is not properly handled when invoking sendmail.
|
2007-10-13
|
Metasploit
|
cpe:2.3:a:hp:linux_imaging_and_printing_project:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:linux_imaging_and_printing_project:1.0:*:*:*:*:*:*:*
|
CVE-2007-5217
| 0
| null | 0.65697
|
Stack-based buffer overflow in the ADM4 ActiveX control in adm4.dll in Altnet Download Manager 4.0.0.6, as used in (1) Kazaa 3.2.7 and (2) Grokster, allows remote attackers to execute arbitrary code via a long argument to the Install method. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
2007-10-05
|
Metasploit
|
cpe:2.3:a:altnet:altnet_download_manager:4.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:grokster:grokster:2.6:*:*:*:*:*:*:*;cpe:2.3:a:kazaa:kazaa_media_desktop:3.2.7:*:*:*:*:*:*:*
|
CVE-2007-5243
| 0
| null | 0.82951
|
Multiple stack-based buffer overflows in Borland InterBase LI 8.0.0.53 through 8.1.0.253, and WI 5.1.1.680 through 8.1.0.257, allow remote attackers to execute arbitrary code via (1) a long service attach request on TCP port 3050 to the (a) SVC_attach or (b) INET_connect function, (2) a long create request on TCP port 3050 to the (c) isc_create_database or (d) jrd8_create_database function, (3) a long attach request on TCP port 3050 to the (e) isc_attach_database or (f) PWD_db_aliased function, or unspecified vectors involving the (4) jrd8_attach_database or (5) expand_filename2 function.
|
2007-10-06
|
Metasploit
|
cpe:2.3:a:borland_software:interbase:li_8.0.0.253:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:li_8.0.0.53:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:li_8.0.0.54:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-o6.0.1.6:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-o6.0.2.0:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v5.1.1.680:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v5.5.0.742:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v6.0.0.627:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v6.0.1.0:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v6.0.1.6:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v6.5.0.28:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v7.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v7.5.0.129:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v7.5.1.80:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi-v8.0.0.123:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi_5.1.1.680:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:wi_8.1.0.257:*:*:*:*:*:*:*
|
CVE-2007-5244
| 0
| null | 0.76302
|
Stack-based buffer overflow in Borland InterBase LI 8.0.0.53 through 8.1.0.253 on Linux, and possibly unspecified versions on Solaris, allows remote attackers to execute arbitrary code via a long attach request on TCP port 3050 to the open_marker_file function.
|
2007-10-06
|
Metasploit
|
cpe:2.3:a:borland_software:interbase:li_8.0.0.253:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:li_8.0.0.53:*:*:*:*:*:*:*;cpe:2.3:a:borland_software:interbase:li_8.0.0.54:*:*:*:*:*:*:*
|
CVE-2007-5423
| 0
| null | 0.88231
|
tiki-graph_formula.php in TikiWiki 1.9.8 allows remote attackers to execute arbitrary code via PHP sequences in the f array parameter, which are processed by create_function.
|
2007-10-12
|
Metasploit
|
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.8:*:*:*:*:*:*:*
|
CVE-2007-5511
| 0
| null | 0.63711
|
SQL injection vulnerability in Workspace Manager for Oracle Database before OWM 10.2.0.4.1, OWM 10.1.0.8.0, and OWM 9.2.0.8.0 allows attackers to execute arbitrary SQL commands via the FINDRICSET procedure in the LT package. NOTE: this is probably covered by CVE-2007-5510, but there are insufficient details to be certain.
|
2007-10-17
|
Metasploit
|
cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*
|
CVE-2007-5601
| 0
| null | 0.67392
|
Stack-based buffer overflow in the Database Component in MPAMedia.dll in RealNetworks RealPlayer 10.5 and 11 beta, and earlier versions including 10, RealOne Player, and RealOne Player 2, allows remote attackers to execute arbitrary code via certain playlist names, as demonstrated via the import method to the IERPCtl ActiveX control in ierpplug.dll.
|
2007-10-20
|
Metasploit
|
cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11_beta:*:*:*:*:*:*:*
|
CVE-2007-5603
| 0
| null | 0.71288
|
Stack-based buffer overflow in the SonicWall SSL-VPN NetExtender NELaunchCtrl ActiveX control before 2.1.0.51, and 2.5.x before 2.5.0.56, allows remote attackers to execute arbitrary code via a long string in the second argument to the AddRouteEntry method.
|
2007-11-05
|
Metasploit
|
cpe:2.3:a:sonicwall:ssl_vpn:*:*:*:*:*:*:*:*
|
CVE-2007-5659
| 7.8
|
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| 0.93258
|
Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be subsumed by CVE-2008-0655.
|
2008-02-12
|
Metasploit/CISA
|
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
|
CVE-2007-5660
| 0
| null | 0.6769
|
Unspecified vulnerability in the Update Service ActiveX control in isusweb.dll before 6.0.100.65101 in MacroVision FLEXnet Connect and InstallShield 2008 allows remote attackers to execute arbitrary code via an unspecified "unsafe method," possibly involving a buffer overflow.
|
2007-11-02
|
Metasploit
|
cpe:2.3:a:macrovision:flexnet_connect:*:*:*:*:*:*:*:*;cpe:2.3:a:macrovision:installshield_2008:*:*:*:*:*:*:*:*;cpe:2.3:a:macrovision:update_service:3.0:*:*:*:*:*:*:*;cpe:2.3:a:macrovision:update_service:4.0:*:*:*:*:*:*:*;cpe:2.3:a:macrovision:update_service:5.0:*:*:*:*:*:*:*;cpe:2.3:a:macrovision:update_service:5.1.100_47363:*:*:*:*:*:*:*;cpe:2.3:a:macrovision:update_service:6.0.100_60146:*:*:*:*:*:*:*
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.