CVE
stringlengths
13
16
CVSS Score
float64
0
10
CVSS_Vector
stringclasses
257 values
EPSS
float64
0
0.95
Description
stringlengths
28
3.79k
Published
stringdate
1990-08-14 00:00:00
2025-10-05 00:00:00
Source
stringclasses
7 values
CPE
stringlengths
33
51k
CVE-2007-5728
0
null
0.00488
Cross-site scripting (XSS) vulnerability in phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, different vectors than CVE-2007-2865.
2007-10-30
Nuclei
cpe:2.3:a:phppgadmin:phppgadmin:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:4.1.1:*:*:*:*:*:*:*
CVE-2007-5779
0
null
0.81828
Buffer overflow in the GomManager (GomWeb Control) ActiveX control in GomWeb3.dll 1.0.0.12 in Gretech Online Movie Player (GOM Player) 2.1.6.3499 allows remote attackers to execute arbitrary code via a long argument to the OpenUrl method.
2007-11-01
Metasploit
cpe:2.3:a:gom_player:gom_player:2.1.6.3499:*:*:*:*:*:*:*
CVE-2007-5863
0
null
0.74389
Software Update in Apple Mac OS X 10.5.1 allows remote attackers to execute arbitrary commands via a man-in-the-middle (MITM) attack between the client and the server, using a modified distribution definition file with the "allow-external-scripts" option.
2007-12-19
Metasploit
cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
CVE-2007-6016
0
null
0.7098
Multiple stack-based buffer overflows in the PVATLCalendar.PVCalendar.1 ActiveX control in pvcalendar.ocx in the scheduler component in the Media Server in Symantec Backup Exec for Windows Server (BEWS) 11d 11.0.6235 and 11.0.7170, and 12.0 12.0.1364, allow remote attackers to execute arbitrary code via a long (1) _DOWText0, (2) _DOWText1, (3) _DOWText2, (4) _DOWText3, (5) _DOWText4, (6) _DOWText5, (7) _DOWText6, (8) _MonthText0, (9) _MonthText1, (10) _MonthText2, (11) _MonthText3, (12) _MonthText4, (13) _MonthText5, (14) _MonthText6, (15) _MonthText7, (16) _MonthText8, (17) _MonthText9, (18) _MonthText10, or (19) _MonthText11 property value when executing the Save method. NOTE: the vendor states "Authenticated user involvement required," but authentication is not needed to attack a client machine that loads this control.
2008-02-29
Metasploit
cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.6235:*:*:*:*:*:*;cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.7170:*:*:*:*:*:*;cpe:2.3:a:symantec:backup_exec_for_windows_server:12.0:12.0.1364:*:*:*:*:*:*
CVE-2007-6165
0
null
0.38553
Mail in Apple Mac OS X Leopard (10.5.1) allows user-assisted remote attackers to execute arbitrary code via an AppleDouble attachment containing an apparently-safe file type and script in a resource fork, which does not warn the user that a separate program is going to be executed. NOTE: this is a regression error related to CVE-2006-0395.
2007-11-29
Metasploit
cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
CVE-2007-6166
0
null
0.84232
Stack-based buffer overflow in Apple QuickTime before 7.3.1, as used in QuickTime Player on Windows XP and Safari on Mac OS X, allows remote Real Time Streaming Protocol (RTSP) servers to execute arbitrary code via an RTSP response with a long Content-Type header.
2007-11-29
Metasploit
cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
CVE-2007-6204
0
null
0.81604
Multiple stack-based buffer overflows in HP OpenView Network Node Manager (OV NNM) 6.41, 7.01, and 7.51 allow remote attackers to execute arbitrary code via unspecified long arguments to (1) ovlogin.exe, (2) OpenView5.exe, (3) snmpviewer.exe, and (4) webappmon.exe, as demonstrated via a long Action parameter to OpenView5.exe.
2007-12-13
Metasploit
cpe:2.3:a:hp:openview_network_node_manager:6.41:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*
CVE-2007-6377
0
null
0.82776
Stack-based buffer overflow in the PassThru functionality in ext.dll in BadBlue 2.72b and earlier allows remote attackers to execute arbitrary code via a long query string.
2007-12-15
Metasploit
cpe:2.3:a:badblue:badblue:*:*:*:*:*:*:*:*
CVE-2007-6507
0
null
0.7136
SpntSvc.exe daemon in Trend Micro ServerProtect 5.58 for Windows, before Security Patch 4, exposes unspecified dangerous sub-functions from StRpcSrv.dll in the DCE/RPC interface, which allows remote attackers to obtain "full file system access" and execute arbitrary code.
2007-12-20
Metasploit
cpe:2.3:a:trend_micro:serverprotect:5.58_security_patch_3:*:windows:*:*:*:*:*
CVE-2007-6509
0
null
0.71369
Unspecified vulnerability in Appian Enterprise Business Process Management (BPM) Suite 5.6 SP1 allows remote attackers to cause a denial of service via a crafted packet to port 5400/tcp.
2007-12-21
Metasploit
cpe:2.3:a:appian:business_process_management_suite:5.6:sp1:*:*:*:*:*:*
CVE-2007-6530
0
null
0.65752
Buffer overflow in the XUpload.ocx ActiveX control in Persits Software XUpload 2.1.0.1, and probably other versions before 3.0, as used by HP Mercury LoadRunner and Groove Virtual Office, allows remote attackers to execute arbitrary code via a long argument to the AddFolder function.
2007-12-27
Metasploit
cpe:2.3:a:groove:virtual_office:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:loadrunner:*:*:*:*:*:*:*:*;cpe:2.3:a:persits:xupload:2.1.0.1:*:*:*:*:*:*:*
CVE-2007-6750
0
null
0.87964
The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.
2011-12-27
Metasploit
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.2.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.30:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.31:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.32:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.33:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.34:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.35:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.36:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.37:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.38:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.39:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.41:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.42:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.65:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.68:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:1.99:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
CVE-2008-0015
0
null
0.8358
Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted web page, as exploited in the wild in July 2009, aka "Microsoft Video ActiveX Control Vulnerability."
2009-07-07
Metasploit
cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
CVE-2008-0065
0
null
0.7236
Multiple stack-based buffer overflows in in_mp3.dll in Winamp 5.21, 5.5, and 5.51 allow remote attackers to execute arbitrary code via a long (1) artist or (2) name tag in Ultravox streaming metadata, related to construction of stream titles.
2008-01-22
Metasploit
cpe:2.3:a:winamp:nullsoft_winamp:5.21:*:*:*:*:*:*:*;cpe:2.3:a:winamp:nullsoft_winamp:5.51:*:*:*:*:*:*:*;cpe:2.3:a:winamp:nullsoft_winamp:5.5:*:*:*:*:*:*:*
CVE-2008-0067
0
null
0.74623
Multiple stack-based buffer overflows in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allow remote attackers to execute arbitrary code via (1) long string parameters to the OpenView5.exe CGI program; (2) a long string parameter to the OpenView5.exe CGI program, related to ov.dll; or a long string parameter to the (3) getcvdata.exe, (4) ovlaunch.exe, or (5) Toolbar.exe CGI program.
2009-01-08
Metasploit
cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*
CVE-2008-0226
0
null
0.91936
Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp.
2008-01-10
Metasploit
cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*;cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.50:sp1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.60:sp1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*;cpe:2.3:a:yassl:yassl:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
CVE-2008-0244
0
null
0.89824
SAP MaxDB 7.6.03 build 007 and earlier allows remote attackers to execute arbitrary commands via "&&" and other shell metacharacters in exec_sdbinfo and other unspecified commands, which are executed when MaxDB invokes cons.exe.
2008-01-12
Metasploit
cpe:2.3:a:sap:maxdb:*:*:*:*:*:*:*:*
CVE-2008-0311
0
null
0.65003
Stack-based buffer overflow in the PGMWebHandler::parse_request function in the StarTeam Multicast Service component (STMulticastService) 6.4 in Borland CaliberRM 2006 allows remote attackers to execute arbitrary code via a large HTTP request.
2008-04-06
Metasploit
cpe:2.3:a:borland:caliberrm:2006:*:*:*:*:*:*:*
CVE-2008-0320
0
null
0.82
Heap-based buffer overflow in the OLE importer in OpenOffice.org before 2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an OLE file with a crafted DocumentSummaryInformation stream.
2008-04-17
Metasploit
cpe:2.3:a:openoffice:openoffice.org:*:*:*:*:*:*:*:*;cpe:2.3:a:openoffice:openoffice.org:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:openoffice:openoffice.org:2.1:*:*:*:*:*:*:*;cpe:2.3:a:openoffice:openoffice.org:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:openoffice:openoffice.org:2.2:*:*:*:*:*:*:*;cpe:2.3:a:openoffice:openoffice.org:2.3:*:*:*:*:*:*:*
CVE-2008-0492
0
null
0.6666
Stack-based buffer overflow in the Persits.XUpload.2 ActiveX control in XUpload.ocx 3.0.0.4 and earlier in Persits XUpload 3.0 allows remote attackers to execute arbitrary code via a long argument to the AddFile method. NOTE: some of these details are obtained from third party information.
2008-01-30
Metasploit
cpe:2.3:a:persits:xupload:3.0:*:*:*:*:*:*:*
CVE-2008-0506
0
null
0.88385
include/imageObjectIM.class.php in Coppermine Photo Gallery (CPG) before 1.4.15, when the ImageMagick picture processing method is configured, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) quality, (2) angle, or (3) clipval parameter to picEditor.php.
2008-01-31
Metasploit
cpe:2.3:a:coppermine:coppermine_photo_gallery:*:*:*:*:*:*:*:*
CVE-2008-0550
0
null
0.68157
Off-by-one error in Steamcast 0.9.75 and earlier allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a certain HTTP request that leads to a buffer overflow, as demonstrated by a long User-Agent header.
2008-02-01
Metasploit
cpe:2.3:a:radio_toolbox:steamcast:*:*:*:*:*:*:*:*
CVE-2008-0610
0
null
0.74834
Stack-based buffer overflow in the ClientConnection::NegotiateProtocolVersion function in vncviewer/ClientConnection.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mode or when using the DSM plugin, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a modified size value.
2008-02-06
Metasploit
cpe:2.3:a:ultravnc:ultravnc:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ultravnc:ultravnc:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc6:*:*:*:*:*:*:*;cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc7:*:*:*:*:*:*:*;cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc8:*:*:*:*:*:*:*
CVE-2008-0621
0
null
0.88155
Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands.
2008-02-06
Metasploit
cpe:2.3:a:sap:sapgui:7.10:*:*:*:*:*:*:*;cpe:2.3:a:sap:saplpd:*:*:*:*:*:*:*:*;cpe:2.3:a:sap:sapsprint:*:*:*:*:*:*:*:*
CVE-2008-0655
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.69964
Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.
2008-02-07
CISA
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
CVE-2008-0702
0
null
0.16074
Multiple heap-based buffer overflows in Titan FTP Server 6.03 and 6.0.5.549 allow remote attackers to cause a denial of service (daemon crash or hang) and possibly execute arbitrary code via a long argument to the (1) USER or (2) PASS command, different vectors than CVE-2004-1641.
2008-02-12
Nuclei
cpe:2.3:a:south_river_technologies:titan_ftp_server:6.0.5.549:*:*:*:*:*:*:*;cpe:2.3:a:south_river_technologies:titan_ftp_server:6.03:*:*:*:*:*:*:*
CVE-2008-0871
0
null
0.70217
Multiple stack-based buffer overflows in Now SMS/MMS Gateway 2007.06.27 and earlier allow remote attackers to execute arbitrary code via a (1) long password in an Authorization header to the HTTP service or a (2) large packet to the SMPP service.
2008-02-21
Metasploit
cpe:2.3:a:now:sms_mms_gateway:*:*:*:*:*:*:*:*
CVE-2008-0926
0
null
0.65873
The SOAP interface to the eMBox module in Novell eDirectory 8.7.3.9 and earlier, and 8.8.x before 8.8.2, relies on client-side authentication, which allows remote attackers to bypass authentication via requests for /SOAP URIs, and cause a denial of service (daemon shutdown) or read arbitrary files. NOTE: it was later reported that 8.7.3.10 (aka 8.7.3 SP10) is also affected.
2008-03-28
Metasploit
cpe:2.3:a:novell:edirectory:*:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.3.8:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.3.8_presp9:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.3.9:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7.3:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*;cpe:2.3:a:novell:edirectory:8.8:*:*:*:*:*:*:*
CVE-2008-0935
0
null
0.82864
Stack-based buffer overflow in the Novell iPrint Control ActiveX control in ienipp.ocx in Novell iPrint Client before 4.34 allows remote attackers to execute arbitrary code via a long argument to the ExecuteRequest method.
2008-02-25
Metasploit
cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint_client:4.26:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint_client:4.32:*:*:*:*:*:*:*
CVE-2008-0955
0
null
0.73958
Stack-based buffer overflow in the Creative Software AutoUpdate Engine ActiveX control in CTSUEng.ocx allows remote attackers to execute arbitrary code via a long CacheFolder property value.
2008-05-29
Metasploit
cpe:2.3:a:creative:creative_software_autoupdate_engine:*:*:*:*:*:*:*:*
CVE-2008-1059
0
null
0.00265
PHP remote file inclusion vulnerability in modules/syntax_highlight.php in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the libpath parameter.
2008-02-28
Nuclei
cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:sniplets_plugin:1.2.2:*:*:*:*:*:*:*
CVE-2008-1061
0
null
0.00155
Multiple cross-site scripting (XSS) vulnerabilities in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) text parameter to (a) warning.php, (b) notice.php, and (c) inset.php in view/sniplets/, and possibly (d) modules/execute.php; the (2) url parameter to (e) view/admin/submenu.php; and the (3) page parameter to (f) view/admin/pager.php.
2008-02-28
Nuclei
cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:sniplets_plugin:1.2.2:*:*:*:*:*:*:*
CVE-2008-1117
0
null
0.77307
Directory traversal vulnerability in the Notes (aka Flash Notes or instant messages) feature in tb2ftp.dll in Timbuktu Pro 8.6.5 for Windows, and possibly 8.7 for Mac OS X, allows remote attackers to upload files to arbitrary locations via a destination filename with a \ (backslash) character followed by ../ (dot dot slash) sequences. NOTE: this can be leveraged for code execution by writing to a Startup folder. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-4220.
2008-03-14
Metasploit
cpe:2.3:a:netopia:timbuktu_pro:8.6.5:*:windows:*:*:*:*:*
CVE-2008-1309
0
null
0.75492
The RealAudioObjects.RealAudio ActiveX control in rmoc3260.dll in RealNetworks RealPlayer Enterprise, RealPlayer 10, RealPlayer 10.5 before build 6.0.12.1675, and RealPlayer 11 before 11.0.3 build 6.0.14.806 does not properly manage memory for the (1) Console or (2) Controls property, which allows remote attackers to execute arbitrary code or cause a denial of service (browser crash) via a series of assignments of long string values, which triggers an overwrite of freed heap memory.
2008-03-12
Metasploit
cpe:2.3:a:realnetworks:realplayer:*:*:enterprise:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11:*:*:*:*:*:*:*
CVE-2008-1311
0
null
0.6635
The TFTP server in PacketTrap pt360 Tool Suite PRO 2.0.3901.0 and earlier allows remote attackers to cause a denial of service (daemon hang) by uploading a file named (1) '|' (pipe), (2) '"' (quotation mark), or (3) "<>" (less than, greater than); or (4) a file with a long name. NOTE: the issue for vector 4 might exist because of an incomplete fix for CVE-2008-1312.
2008-03-12
Metasploit
cpe:2.3:a:packettrap:pt360_tool_suite_pro:*:*:*:*:*:*:*:*
CVE-2008-1358
0
null
0.7623
Stack-based buffer overflow in the IMAP server in Alt-N Technologies MDaemon 9.6.4 allows remote authenticated users to execute arbitrary code via a FETCH command with a long BODY.
2008-03-17
Metasploit
cpe:2.3:a:altn:mdaemon:9.6.4:*:*:*:*:*:*:*
CVE-2008-1365
0
null
0.75208
Stack-based buffer overflow in Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long encrypted password, which triggers the overflow in (1) cgiChkMasterPwd.exe, (2) policyserver.exe as reachable through cgiABLogon.exe, and other vectors.
2008-03-17
Metasploit
cpe:2.3:a:trend_micro:officescan_corporate_edition:*:*:*:*:*:*:*:*
CVE-2008-1447
6.8
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
0.86321
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
2008-07-08
Metasploit
cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*;cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*;cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*;cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
CVE-2008-1472
0
null
0.75854
Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method.
2008-03-24
Metasploit
cpe:2.3:a:computer_associates:brightstor_arcserve_backup_laptops_desktops:11.5:*:*:*:*:*:*:*;cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:a:*:*:*:*:*:*;cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:c1:*:*:*:*:*:*;cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:ga:*:*:*:*:*:*;cpe:2.3:a:computer_associates:desktop_management_suite:r11.2:*:*:*:*:*:*:*;cpe:2.3:a:computer_associates:unicenter_dsm_r11_list_control_atx:11.2.3.1895:*:*:*:*:*:*:*;cpe:2.3:a:unicenter:asset_management:r11.1:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:asset_management:r11.1:c1:*:*:*:*:*:*;cpe:2.3:a:unicenter:asset_management:r11.1:ga:*:*:*:*:*:*;cpe:2.3:a:unicenter:asset_management:r11.2:*:*:*:*:*:*:*;cpe:2.3:a:unicenter:asset_management:r11.2:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:asset_management:r11.2:c1:*:*:*:*:*:*;cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:c1:*:*:*:*:*:*;cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:ga:*:*:*:*:*:*;cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:*:*:*:*:*:*:*;cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:c1:*:*:*:*:*:*;cpe:2.3:a:unicenter:remote_control:r11.1:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:remote_control:r11.1:c1:*:*:*:*:*:*;cpe:2.3:a:unicenter:remote_control:r11.1:ga:*:*:*:*:*:*;cpe:2.3:a:unicenter:remote_control:r11.2:*:*:*:*:*:*:*;cpe:2.3:a:unicenter:remote_control:r11.2:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:remote_control:r11.2:c1:*:*:*:*:*:*;cpe:2.3:a:unicenter:software_delivery:r11.1:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:software_delivery:r11.1:c1:*:*:*:*:*:*;cpe:2.3:a:unicenter:software_delivery:r11.1:ga:*:*:*:*:*:*;cpe:2.3:a:unicenter:software_delivery:r11.2:*:*:*:*:*:*:*;cpe:2.3:a:unicenter:software_delivery:r11.2:a:*:*:*:*:*:*;cpe:2.3:a:unicenter:software_delivery:r11.2:c1:*:*:*:*:*:*
CVE-2008-1491
0
null
0.8669
Stack-based buffer overflow in the DPC Proxy server (DpcProxy.exe) in ASUS Remote Console (aka ARC or ASMB3) 2.0.0.19 and 2.0.0.24 allows remote attackers to execute arbitrary code via a long string to TCP port 623.
2008-03-25
Metasploit
cpe:2.3:a:asus:remote_console:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:asus:remote_console:2.0.0.24:*:*:*:*:*:*:*
CVE-2008-1547
0
null
0.65006
Open redirect vulnerability in exchweb/bin/redir.asp in Microsoft Outlook Web Access (OWA) for Exchange Server 2003 SP2 (aka build 6.5.7638) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the URL parameter.
2008-10-21
Nuclei
cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
CVE-2008-1562
0
null
0.4219
The LDAP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.8 allows remote attackers to cause a denial of service (application crash) via a malformed packet, a different vulnerability than CVE-2006-5740.
2008-03-31
Metasploit
cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*
CVE-2008-1602
0
null
0.76581
Stack-based buffer overflow in Orbit downloader 2.6.3 and 2.6.4 allows remote attackers to execute arbitrary code via a long download URL, which is not properly handled during Unicode conversion for a balloon notification after a download has failed.
2008-04-06
Metasploit
cpe:2.3:a:orbit_downloader:orbit_downloader:2.6.3:*:*:*:*:*:*:*;cpe:2.3:a:orbit_downloader:orbit_downloader:2.6.4:*:*:*:*:*:*:*
CVE-2008-1610
0
null
0.75087
Stack-based buffer overflow in TallSoft Quick TFTP Server Pro 2.1 allows remote attackers to cause a denial of service or execute arbitrary code via a long mode field in a read or write request.
2008-04-01
Metasploit
cpe:2.3:a:tallsoft_quick:tftp_server_pro:2.1:*:*:*:*:*:*:*
CVE-2008-1611
0
null
0.8243
Stack-based buffer overflow in TFTP Server SP 1.4 for Windows allows remote attackers to cause a denial of service or execute arbitrary code via a long filename in a read or write request.
2008-04-01
Metasploit
cpe:2.3:a:tftp-server:winagents_tftp_server:sp_1.4:*:windows:*:*:*:*:*
CVE-2008-1661
0
null
0.80524
Stack-based buffer overflow in DoubleTake.exe in HP StorageWorks Storage Mirroring (SWSM) before 4.5 SP2 allows remote attackers to execute arbitrary code via a crafted encoded authentication request.
2008-06-04
Metasploit
cpe:2.3:a:hp:storageworks_storage_mirroring:4.5:sp1:*:*:*:*:*:*
CVE-2008-1697
0
null
0.8345
Stack-based buffer overflow in ovwparser.dll in HP OpenView Network Node Manager (OV NNM) 7.53, 7.51, and earlier allows remote attackers to execute arbitrary code via a long URI in an HTTP request processed by ovas.exe, as demonstrated by a certain topology/homeBaseView request. NOTE: some of these details are obtained from third party information.
2008-04-08
Metasploit
cpe:2.3:a:hp:openview_network_node_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*
CVE-2008-1724
0
null
0.76967
Stack-based buffer overflow in the IActiveXTransfer.FileTransfer method in the SecureTransport FileTransfer ActiveX control in vcst_en.dll 1.0.0.5 in Tumbleweed SecureTransport Server before 4.6.1 Hotfix 20 allows remote attackers to execute arbitrary code via a long remoteFile parameter.
2008-04-11
Metasploit
cpe:2.3:a:tumbleweed:securetransport_server_app:*:*:*:*:*:*:*:*;cpe:2.3:h:tumbleweed:securetransport_server:*:*:*:*:*:*:*:*
CVE-2008-1898
0
null
0.79812
A certain ActiveX control in WkImgSrv.dll 7.03.0616.0, as distributed in Microsoft Works 7 and Microsoft Office 2003 and 2007, allows remote attackers to execute arbitrary code or cause a denial of service (browser crash) via an invalid WksPictureInterface property value, which triggers an improper function call.
2008-04-21
Metasploit
cpe:2.3:a:microsoft:office:2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:works:7.0:*:*:*:*:*:*:*
CVE-2008-1914
0
null
0.87013
Stack-based buffer overflow in the AntServer module (AntServer.exe) in BigAnt IM Server in BigAnt Messenger 2.2 allows remote attackers to execute arbitrary code via a long URI in a request to TCP port 6080. NOTE: some of these details are obtained from third party information.
2008-04-22
Metasploit
cpe:2.3:a:bigantsoft:bigant_messenger:2.2:*:*:*:*:*:*:*
CVE-2008-2031
0
null
0.53859
VicFTPS 5.0 allows remote attackers to cause a denial of service (crash) via a crafted LIST command, which triggers a NULL pointer dereference. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
2008-04-30
Metasploit
cpe:2.3:a:vicftps:vicftps:5.0:*:*:*:*:*:*:*
CVE-2008-2157
0
null
0.84999
robotd in the Library Manager in EMC AlphaStor 3.1 SP1 for Windows allows remote attackers to execute arbitrary commands via an unspecified string field in a packet to TCP port 3500.
2008-05-29
Metasploit
cpe:2.3:a:emc_corporation:alphastor:3.1_sp1:*:*:*:*:*:*:*
CVE-2008-2158
0
null
0.36377
Multiple stack-based buffer overflows in the Command Line Interface process in the Server Agent in EMC AlphaStor 3.1 SP1 for Windows allow remote attackers to execute arbitrary code via crafted TCP packets to port 41025.
2008-05-29
Metasploit
cpe:2.3:a:emc_corporation:alphastor:3.1_sp1:*:*:*:*:*:*:*
CVE-2008-2161
0
null
0.78902
Buffer overflow in TFTP Server SP 1.4 and 1.5 on Windows, and possibly other versions, allows remote attackers to execute arbitrary code via a long TFTP error packet. NOTE: some of these details are obtained from third party information.
2008-05-12
Metasploit
cpe:2.3:a:tftp:tftp_server_sp:1.4:*:*:*:*:*:*:*;cpe:2.3:a:tftp:tftp_server_sp:1.5:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:all_windows:*:*:*:*:*:*:*:*
CVE-2008-2240
0
null
0.83949
Stack-based buffer overflow in the Web Server service in IBM Lotus Domino before 7.0.3 FP1, and 8.x before 8.0.1, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long Accept-Language HTTP header.
2008-05-22
Metasploit
cpe:2.3:a:ibm:lotus_domino:6.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:6.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:7.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_domino:8.0:*:*:*:*:*:*:*
CVE-2008-2286
0
null
0.39749
SQL injection vulnerability in axengine.exe in Symantec Altiris Deployment Solution 6.8.x and 6.9.x before 6.9.176 allows remote attackers to execute arbitrary SQL commands via unspecified string fields in a notification packet.
2008-05-18
Metasploit
cpe:2.3:a:symantec:altiris_deployment_solution:6.8:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*
CVE-2008-2398
0
null
0.00777
Cross-site scripting (XSS) vulnerability in index.php in AppServ Open Project 2.5.10 and earlier allows remote attackers to inject arbitrary web script or HTML via the appservlang parameter.
2008-05-21
Nuclei
cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.7.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.3.0:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.1:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.2:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.3:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.4:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.4a:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.5:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.6:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.7:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.8:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4.9:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.4:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.2:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.3:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.4:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.4a:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.5:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.6:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.7:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.8:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5.9:*:*:*:*:*:*:*;cpe:2.3:a:appserv_open_project:appserv:2.5:*:*:*:*:*:*:*
CVE-2008-2439
0
null
0.44618
Directory traversal vulnerability in the UpdateAgent function in TmListen.exe in the OfficeScanNT Listener service in the client in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and other builds before 1372, OfficeScan 8.0 SP1 before build 1222, OfficeScan 8.0 SP1 Patch 1 before build 3087, and Worry-Free Business Security 5.0 before build 1220 allows remote attackers to read arbitrary files via directory traversal sequences in an HTTP request. NOTE: some of these details are obtained from third party information.
2008-10-03
Metasploit
cpe:2.3:a:trend_micro:officescan:7.3:*:*:*:*:*:*:*;cpe:2.3:a:trend_micro:officescan:8.0:sp1:*:*:*:*:*:*;cpe:2.3:a:trend_micro:officescan:8.0:sp1_patch1:*:*:*:*:*:*;cpe:2.3:a:trend_micro:worry_free_business_security:5.0:*:*:*:*:*:*:*
CVE-2008-2463
0
null
0.84093
The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.
2008-07-07
Metasploit
cpe:2.3:a:microsoft:office_snapshot_viewer_activex:office2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_snapshot_viewer_activex:office_2003:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_snapshot_viewer_activex:office_xp:*:*:*:*:*:*:*
CVE-2008-2499
0
null
0.76393
Stack-based buffer overflow in the Community Services Multiplexer (aka MUX or StMux.exe) in IBM Lotus Sametime 7.5.1 CF1 and earlier, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code via a crafted URL.
2008-05-29
Metasploit
cpe:2.3:a:ibm:lotus_sametime:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_sametime:7.5.1:cf1:*:*:*:*:*:*
CVE-2008-2551
0
null
0.85104
The DownloaderActiveX Control (DownloaderActiveX.ocx) in Icona SpA C6 Messenger 1.0.0.1 allows remote attackers to force the download and execution of arbitrary files via a URL in the propDownloadUrl parameter with the propPostDownloadAction parameter set to "run."
2008-06-04
Metasploit
cpe:2.3:a:icona:instant_messenger:1.0.0.1:*:*:*:*:*:*:*
CVE-2008-2639
0
null
0.85791
Stack-based buffer overflow in the ODBC server service in Citect CitectSCADA 6 and 7, and CitectFacilities 7, allows remote attackers to execute arbitrary code via a long string in the second application packet in a TCP session on port 20222.
2008-06-16
Metasploit
cpe:2.3:a:citect:citectfacilities:7:*:*:*:*:*:*:*;cpe:2.3:a:citect:citectscada:6:*:*:*:*:*:*:*;cpe:2.3:a:citect:citectscada:7:*:*:*:*:*:*:*
CVE-2008-2650
0
null
0.01643
Directory traversal vulnerability in cmsimple/cms.php in CMSimple 3.1, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number.
2008-06-10
Nuclei
cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
CVE-2008-2683
0
null
0.79398
The BIDIB.BIDIBCtrl.1 ActiveX control in BIDIB.ocx 10.9.3.0 in Black Ice Barcode SDK 5.01 allows remote attackers to force the download and storage of arbitrary files by specifying the origin URL in the first argument to the DownloadImageFileURL method, and the local filename in the second argument. NOTE: some of these details are obtained from third party information.
2008-06-12
Metasploit
cpe:2.3:a:black_ice:barcode_sdk:5.01:*:*:*:*:*:*:*
CVE-2008-2703
0
null
0.7077
Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client before 2.0.3 HP1 for Windows allow remote attackers to execute arbitrary code via "spoofed server responses" that contain a long string after the NM_A_SZ_TRANSACTION_ID field name.
2008-06-13
Metasploit
cpe:2.3:a:novell:groupwise_messenger:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise_messenger:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:novell:groupwise_messenger:2.0:*:*:*:*:*:*:*
CVE-2008-2789
0
null
0.47316
SQL injection vulnerability in pages/index.php in BASIC-CMS allows remote attackers to execute arbitrary SQL commands via the page_id parameter.
2008-06-20
Metasploit
cpe:2.3:a:basic-cms:basic-cms:*:*:*:*:*:*:*:*
CVE-2008-2905
0
null
0.70556
PHP remote file inclusion vulnerability in includes/Cache/Lite/Output.php in the Cache_Lite package in Mambo 4.6.4 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
2008-06-30
Metasploit
cpe:2.3:a:mambo:mambo:4.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.1_1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.1_beta2:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.1_beta:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.1a:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.2.3:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.3h:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5_1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5_1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5_1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5_1.0.3_beta:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.5_1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.6.1:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.6.2:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.6.4:*:*:*:*:*:*:*;cpe:2.3:a:mambo:mambo:4.6:*:*:*:*:*:*:*
CVE-2008-2908
0
null
0.59529
Multiple stack-based buffer overflows in a certain ActiveX control in ienipp.ocx in Novell iPrint Client for Windows before 4.36 allow remote attackers to execute arbitrary code via a long value of the (1) operation, (2) printer-url, or (3) target-frame parameter. NOTE: some of these details are obtained from third party information.
2008-06-30
Metasploit
cpe:2.3:a:novell:iprint_client:*:*:windows:*:*:*:*:*
CVE-2008-2938
0
null
0.92261
Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
2008-08-13
Metasploit
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
CVE-2008-2992
7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.93377
Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104.
2008-11-04
Metasploit/CISA
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
CVE-2008-3008
0
null
0.811
Stack-based buffer overflow in the WMEncProfileManager ActiveX control in wmex.dll in Microsoft Windows Media Encoder 9 Series allows remote attackers to execute arbitrary code via a long first argument to the GetDetailsString method, aka "Windows Media Encoder Buffer Overrun Vulnerability."
2008-09-11
Metasploit
cpe:2.3:a:microsoft:windows_media_encoder:9_series:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows-nt:2008:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:-:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
CVE-2008-3158
0
null
0.10819
Unspecified vulnerability in NWFS.SYS in Novell Client for Windows 4.91 SP4 has unknown impact and attack vectors, possibly related to IOCTL requests that overwrite arbitrary memory.
2008-07-11
Metasploit
cpe:2.3:a:novell:novell_client_for_windows:4.91_sp4:*:*:*:*:*:*:*
CVE-2008-3257
0
null
0.78222
Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request.
2008-07-22
Metasploit
cpe:2.3:a:bea:weblogic_server:10.0:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:3.1.8:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.0:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.5.1:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.5.1:sp15:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.5.2:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.5.2:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.5.2:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:4.5:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp10:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp11:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp12:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp13:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp3:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp4:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp5:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp6:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp7:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp8:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:5.1:sp9:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.0:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.0:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.0:sp6:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp7:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:6.1:sp8:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:7.0:sp7:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:8.1:sp5:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:8.1:sp6:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.0:ga:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.0:sp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.0:sp2:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.0:sp3:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.0:sp4:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.0:sp5:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.1:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.1:ga:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.2:*:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.2:mp1:*:*:*:*:*:*;cpe:2.3:a:bea:weblogic_server:9.2:mp2:*:*:*:*:*:*;cpe:2.3:a:bea_systems:apache_connector_in_weblogic_server:*:*:*:*:*:*:*:*;cpe:2.3:a:bea_systems:weblogic_server:10.0_mp1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:weblogic_server:*:*:*:*:*:*:*:*
CVE-2008-3273
0
null
0.29391
JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2.0.CP03, and 4.3.0 before 4.3.0.CP01, allows remote attackers to obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string.
2008-08-10
Metasploit
cpe:2.3:a:jboss:enterprise_application_platform:*:*:*:*:*:*:*:*;cpe:2.3:a:jboss:enterprise_application_platform:4.2.0.cp01:*:*:*:*:*:*:*;cpe:2.3:a:jboss:enterprise_application_platform:4.2.0.cp02:*:*:*:*:*:*:*
CVE-2008-3431
8.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
0.04564
The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to gain privileges by opening the \\.\VBoxDrv device and calling DeviceIoControl to send a crafted kernel address.
2008-08-05
CISA
cpe:2.3:a:oracle:virtualbox:*:*:*:*:*:*:*:*
CVE-2008-3466
0
null
0.8472
Microsoft Host Integration Server (HIS) 2000, 2004, and 2006 does not limit RPC access to administrative functions, which allows remote attackers to bypass authentication and execute arbitrary programs via a crafted SNA RPC message using opcode 1 or 6 to call the CreateProcess function, aka "HIS Command Execution Vulnerability."
2008-10-15
Metasploit
cpe:2.3:a:microsoft:host_integration_server_2000:*:*:*:*:client:*:*:*;cpe:2.3:a:microsoft:host_integration_server_2000:*:sp2:*:*:server:*:*:*;cpe:2.3:a:microsoft:host_integration_server_2004:*:*:*:*:client:*:*:*;cpe:2.3:a:microsoft:host_integration_server_2004:*:*:*:*:server:*:*:*;cpe:2.3:a:microsoft:host_integration_server_2004:*:sp1:*:*:server:*:*:*;cpe:2.3:a:microsoft:host_integration_server_2006:*:*:*:*:*:*:x64:*;cpe:2.3:a:microsoft:host_integration_server_2006:*:*:*:*:*:*:x86:*
CVE-2008-3558
0
null
0.79896
Stack-based buffer overflow in the WebexUCFObject ActiveX control in atucfobj.dll in Cisco WebEx Meeting Manager before 20.2008.2606.4919 allows remote attackers to execute arbitrary code via a long argument to the NewObject method.
2008-08-08
Metasploit
cpe:2.3:a:cisco:webex_meeting_manager:20.2008.2601.4928:*:*:*:*:*:*:*
CVE-2008-3656
0
null
0.75848
Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
2008-08-13
Metasploit
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*;cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
CVE-2008-3704
0
null
0.87473
Heap-based buffer overflow in the MaskedEdit ActiveX control in Msmask32.ocx 6.0.81.69, and possibly other versions before 6.0.84.18, in Microsoft Visual Studio 6.0, Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 allows remote attackers to execute arbitrary code via a long Mask parameter, related to not "validating property values with boundary checks," as exploited in the wild in August 2008, aka "Masked Edit Control Memory Corruption Vulnerability."
2008-08-18
Metasploit
cpe:2.3:a:microsoft:visual_basic:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_foxpro:8.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_foxpro:9.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_foxpro:9.0:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_studio:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_studio_.net:2002:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_studio_.net:2003:sp1:*:*:*:*:*:*
CVE-2008-3878
0
null
0.7193
Stack-based buffer overflow in the Ultra.OfficeControl ActiveX control in OfficeCtrl.ocx 2.0.2008.801 in Ultra Shareware Ultra Office Control allows remote attackers to execute arbitrary code via long strUrl, strFile, and strPostData parameters to the HttpUpload method.
2008-09-02
Metasploit
cpe:2.3:a:ultrashareware:ultra_office_control:2.0.2008.801:*:*:*:*:*:*:*
CVE-2008-3922
0
null
0.91414
awstatstotals.php in AWStats Totals 1.0 through 1.14 allows remote attackers to execute arbitrary code via PHP sequences in the sort parameter, which is used by the multisort function when dynamically creating an anonymous PHP function.
2008-09-04
Metasploit
cpe:2.3:a:telartis_bv:awstats_totals:1.0:*:*:*:*:*:*:*;cpe:2.3:a:telartis_bv:awstats_totals:1.11:*:*:*:*:*:*:*;cpe:2.3:a:telartis_bv:awstats_totals:1.13:*:*:*:*:*:*:*;cpe:2.3:a:telartis_bv:awstats_totals:1.14:*:*:*:*:*:*:*;cpe:2.3:a:telartis_bv:awstats_totals:1.1:*:*:*:*:*:*:*
CVE-2008-3979
0
null
0.48682
Unspecified vulnerability in the Oracle Spatial component in Oracle Database 10.1.0.5 and 10.2.0.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors. NOTE: the previous information was obtained from the January 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is a SQL injection vulnerability that allows remote authenticated users to gain MDSYS privileges via the MDSYS.SDO_TOPO_DROP_FTBL trigger.
2009-01-14
Metasploit
cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_10g:10.2.0.2:*:*:*:*:*:*:*
CVE-2008-3982
0
null
0.53142
Unspecified vulnerability in the Workspace Manager component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to SYS.LT and WMSYS.LT, a different vulnerability than CVE-2008-3983 and CVE-2008-3984.
2008-10-14
Metasploit
cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_10g:10.2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_11i:11.1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_9i:9.2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_9i:9.2.0.8dv:*:*:*:*:*:*:*
CVE-2008-3983
0
null
0.67346
Unspecified vulnerability in the Workspace Manager component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to SYS.LT and WMSYS.LT, a different vulnerability than CVE-2008-3982 and CVE-2008-3984.
2008-10-14
Metasploit
cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_10g:10.2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_11i:11.1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_9i:9.2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_9i:9.2.0.8dv:*:*:*:*:*:*:*
CVE-2008-3984
0
null
0.67346
Unspecified vulnerability in the Workspace Manager component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to SYS.LT and WMSYS.LT, a different vulnerability than CVE-2008-3982 and CVE-2008-3983.
2008-10-14
Metasploit
cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_10g:10.2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_11i:11.1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_9i:9.2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_9i:9.2.0.8dv:*:*:*:*:*:*:*
CVE-2008-3995
0
null
0.47398
Unspecified vulnerability in the Change Data Capture component in Oracle Database 10.1.0.5, 10.2.0.4, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to DBMS_CDC_PUBLISH.
2008-10-14
Metasploit
cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_10g:10.2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_11i:11.1.0.6:*:*:*:*:*:*:*
CVE-2008-3996
0
null
0.37808
Unspecified vulnerability in the Change Data Capture component in Oracle Database 10.1.0.5, 10.2.0.4, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to SYS.DBMS_CDC_IPUBLISH.
2008-10-14
Metasploit
cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_10g:10.2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_11i:11.1.0.6:*:*:*:*:*:*:*
CVE-2008-4008
0
null
0.85806
Unspecified vulnerability in the WebLogic Server Plugins for Apache component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2008 CPU. Oracle has not commented on reliable researcher claims that this issue is a stack-based buffer overflow in the WebLogic Apache Connector, related to an invalid parameter.
2008-10-14
Metasploit
cpe:2.3:a:oracle:bea_product_suite:10.0:mp1:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:10.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:6.1:sp7:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:7.0:sp7:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:9.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:9.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:*
CVE-2008-4037
0
null
0.73933
Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote SMB servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, as demonstrated by backrush, aka "SMB Credential Reflection Vulnerability." NOTE: some reliable sources report that this vulnerability exists because of an insufficient fix for CVE-2000-0834.
2008-11-12
Metasploit
cpe:2.3:o:microsoft:windows:server_2003:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:server_2003:sp1:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows:server_2003:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:server_2003:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows:server_2003:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows:server_2003:unknown:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows:xp:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:xp:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows:xp:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:xp:unknown:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
CVE-2008-4114
0
null
0.78908
srv.sys in the Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via an SMB WRITE_ANDX packet with an offset that is inconsistent with the packet size, related to "insufficiently validating the buffer size," as demonstrated by a request to the \PIPE\lsarpc named pipe, aka "SMB Validation Denial of Service Vulnerability."
2008-09-16
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:gold:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:gold:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:sp1:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:pro_x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:pro_x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
CVE-2008-4193
0
null
0.80446
Stack-based buffer overflow in SecurityGateway.dll in Alt-N Technologies SecurityGateway 1.0.1 allows remote attackers to execute arbitrary code via a long username parameter.
2008-09-24
Metasploit
cpe:2.3:a:alt-n:securitygateway:1.0.1:*:*:*:*:*:*:*
CVE-2008-4250
0
null
0.94038
The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka "Server Service Vulnerability."
2008-10-23
Metasploit
cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:-:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x86:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
CVE-2008-4322
0
null
0.67533
Stack-based buffer overflow in RealFlex Technologies Ltd. RealWin Server 2.0, as distributed by DATAC, allows remote attackers to execute arbitrary code via a crafted FC_INFOTAG/SET_CONTROL packet.
2008-09-29
Metasploit
cpe:2.3:a:realflex_technologies_ltd:realwin_server:2.0:*:*:*:*:*:*:*
CVE-2008-4384
0
null
0.62466
Multiple stack-based buffer overflows in MGI Software LPViewer ActiveX control (LPControl.dll), as acquired by Roxio and iseemedia, allow remote attackers to execute arbitrary code via the (1) url, (2) toolbar, and (3) enableZoomPastMax methods.
2008-10-07
Metasploit
cpe:2.3:a:iseemedia:lpviewer:*:*:*:*:*:*:*:*;cpe:2.3:a:mgi_software:lpviewer:*:*:*:*:*:*:*:*;cpe:2.3:a:roxio:lpviewer:*:*:*:*:*:*:*:*
CVE-2008-4385
0
null
0.74091
Husdawg, LLC Systems Requirements Lab 3, as used by Instant Expert Analysis, allows remote attackers to force the download and execution of arbitrary programs via by specifiying a malicious website argument to the Init method in (1) a certain ActiveX control (sysreqlab2.cab, sysreqlab.dll, sysreqlabsli.dll, or sysreqlab2.dll) and (2) a certain Java applet in RLApplet.class in sysreqlab2.jar or sysreqlab.jar.
2008-10-14
Metasploit
cpe:2.3:a:systemrequirementslab:system_requirements_lab:3:*:*:*:*:*:*:*
CVE-2008-4388
0
null
0.63442
The LaunchObj ActiveX control before 5.2.2.865 in launcher.dll in Symantec AppStream Client 5.2.x before 5.2.2 SP3 MP1 does not properly validate downloaded files, which allows remote attackers to execute arbitrary code via the installAppMgr method and unspecified other methods.
2009-01-20
Metasploit
cpe:2.3:a:symantec:appstream_client:5.2:*:*:*:*:*:*:*
CVE-2008-4397
0
null
0.85816
Directory traversal vulnerability in the RPC interface (asdbapi.dll) in CA ARCserve Backup (formerly BrightStor ARCserve Backup) r11.1 through r12.0 allows remote attackers to execute arbitrary commands via a .. (dot dot) in an RPC call with opnum 0x10A.
2008-10-14
Metasploit
cpe:2.3:a:broadcom:arcserve_backup:r12.0:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:business_protection_suite:r2:*:*:*:*:*:*:*;cpe:2.3:a:broadcom:server_protection_suite:r2:*:*:*:*:*:*:*;cpe:2.3:a:ca:arcserve_backup:r11.1:*:*:*:*:*:*:*;cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*;cpe:2.3:a:ca:business_protection_suite:r2:*:microsoft_small_business_server_premium:*:*:*:*:*;cpe:2.3:a:ca:business_protection_suite:r2:*:microsoft_small_business_server_standard:*:*:*:*:*
CVE-2008-4449
0
null
0.80993
Stack-based buffer overflow in mIRC 6.34 allows remote attackers to execute arbitrary code via a long hostname in a PRIVMSG message.
2008-10-06
Metasploit
cpe:2.3:a:mirc:mirc:6.34:*:*:*:*:*:*:*
CVE-2008-4556
0
null
0.77322
Stack-based buffer overflow in the adm_build_path function in sadmind in Sun Solstice AdminSuite on Solaris 8 and 9 allows remote attackers to execute arbitrary code via a crafted request.
2008-10-14
Metasploit
cpe:2.3:o:sun:solaris:8:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:8:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:9:*:x86:*:*:*:*:*
CVE-2008-4572
0
null
0.70907
GuildFTPd 0.999.14, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long arguments to the CWD and LIST commands, which triggers heap corruption related to an improper free call, and possibly triggering a heap-based buffer overflow.
2008-10-15
Metasploit
cpe:2.3:a:guildftpd:guildftpd:0.999.14:*:*:*:*:*:*:*