CVE
stringlengths
13
16
CVSS Score
float64
0
10
CVSS_Vector
stringclasses
257 values
EPSS
float64
0
0.95
Description
stringlengths
28
3.79k
Published
stringdate
1990-08-14 00:00:00
2025-10-05 00:00:00
Source
stringclasses
7 values
CPE
stringlengths
33
51k
CVE-2008-4654
0
null
0.807
Stack-based buffer overflow in the parse_master function in the Ty demux plugin (modules/demux/ty.c) in VLC Media Player 0.9.0 through 0.9.4 allows remote attackers to execute arbitrary code via a TiVo TY media file with a header containing a crafted size value.
2008-10-22
Metasploit
cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
CVE-2008-4668
0
null
0.00268
Directory traversal vulnerability in the Image Browser (com_imagebrowser) 0.1.5 component for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the folder parameter to index.php.
2008-10-22
Nuclei
cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
CVE-2008-4687
0
null
0.79225
manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to execute arbitrary code via a sort parameter containing PHP sequences, which are processed by create_function within the multi_sort function in core/utility_api.php.
2008-10-22
Metasploit
cpe:2.3:a:mantis:mantis:*:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:0.19.3:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:0.19.4:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.1.2:*:*:*:*:*:*:*
CVE-2008-4696
0
null
0.62121
Cross-site scripting (XSS) vulnerability in Opera.dll in Opera before 9.61 allows remote attackers to inject arbitrary web script or HTML via the anchor identifier (aka the "optional fragment"), which is not properly escaped before storage in the History Search database (aka md.dat).
2008-10-23
Metasploit
cpe:2.3:a:opera:opera:*:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5..10:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.0:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.11:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.12:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.1:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.2:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.3:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.4:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.5:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.6:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.7:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.8:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.9:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.01:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.02:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.03:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.04:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.05:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.06:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.0:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.01:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.02:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.03:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.0:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.10:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.11:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.20:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.20:beta7:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.21:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.22:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.23:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.50:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.50:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.51:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.52:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.53:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.54:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.54:update_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.54:update_2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7:beta_1.2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.01:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.02:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.0:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.0:beta_3:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.50:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.51:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.52:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.53:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.54:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.01:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.02:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.0:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.10:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.20:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.20:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.21:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.22:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.23:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.24:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.25:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.26:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.27:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.50:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.50:beta_2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.51:*:*:*:*:*:*:*
CVE-2008-4764
0
null
0.01921
Directory traversal vulnerability in the eXtplorer module (com_extplorer) 2.0.0 RC2 and earlier in Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dir parameter in a show_error action.
2008-10-28
Nuclei
cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
CVE-2008-4779
0
null
0.7879
Stack-based buffer overflow in TUGzip 3.5.0.0 allows remote attackers to denial of service (crash) or execute arbitrary code via a long filename in a .zip file.
2008-10-29
Metasploit
cpe:2.3:a:tguzip:tguzip:3.5.5.0.0:*:*:*:*:*:*:*
CVE-2008-4828
0
null
0.77418
Multiple stack-based buffer overflows in dsmagent.exe in the Remote Agent Service in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, and 5.4.0.0 through 5.4.1.96, and the TSM Express client 5.3.3.0 through 5.3.6.4, allow remote attackers to execute arbitrary code via (1) a request packet that is not properly parsed by an unspecified "generic string handling function" or (2) a crafted NodeName in a dicuGetIdentifyRequest request packet, related to the (a) Web GUI and (b) Java GUI.
2009-05-05
Metasploit
cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1.8.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.96:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3:*:*:*:*:*:*:*
CVE-2008-4830
0
null
0.62466
Insecure method vulnerability in the KWEdit ActiveX control in SAP GUI 6.40 Patch 29 (KWEDIT.DLL 6400.1.1.41) and 7.10 Patch 5 (KWEDIT.DLL 7100.1.1.43) allows remote attackers to (1) overwrite arbitrary files via the SaveDocumentAs method or (2) read or execute arbitrary files via the OpenDocument method.
2009-04-16
Metasploit
cpe:2.3:a:sap:sap_gui:6.40:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_gui:7.10:*:*:*:*:*:*:*
CVE-2008-4844
0
null
0.82846
Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabular Data Control (TDC) in a crafted HTML or XML document, as demonstrated by nested SPAN or MARQUEE elements, and exploited in the wild in December 2008.
2008-12-11
Metasploit
cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
CVE-2008-4922
0
null
0.67087
Buffer overflow in the DjVu ActiveX Control 3.0 for Microsoft Office (DjVu_ActiveX_MSOffice.dll) allows remote attackers to execute arbitrary code via a long (1) ImageURL property, and possibly the (2) Mode, (3) Page, or (4) Zoom properties.
2008-11-04
Metasploit
cpe:2.3:a:djvu:activex_control_for_microsoft_office_2000:*:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*
CVE-2008-5002
0
null
0.68423
Insecure method vulnerability in the ChilkatCrypt2.ChilkatCrypt2.1 ActiveX control (ChilkatCrypt2.dll 4.3.2.1) in Chilkat Crypt ActiveX Component allows remote attackers to create and overwrite arbitrary files via the WriteFile method. NOTE: this could be leveraged for code execution by creating executable files in Startup folders or by accessing files using hcp:// URLs. NOTE: some of these details are obtained from third party information.
2008-11-10
Metasploit
cpe:2.3:a:chilkat_software:chilkat_crypt_activex_control:2.1:*:*:*:*:*:*:*
CVE-2008-5036
0
null
0.67309
Stack-based buffer overflow in VideoLAN VLC media player 0.9.x before 0.9.6 might allow user-assisted attackers to execute arbitrary code via an an invalid RealText (rt) subtitle file, related to the ParseRealText function in modules/demux/subtitle.c. NOTE: this issue was SPLIT from CVE-2008-5032 on 20081110.
2008-11-10
Metasploit
cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
CVE-2008-5081
0
null
0.71171
The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.
2008-12-17
Metasploit
cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.1:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.2:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.3:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.4:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.5.1:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.5.2:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.5:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.10:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.11:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.12:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.13:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.14:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.15:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.16:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.17:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.18:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.19:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.1:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.20:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.21:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.22:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.2:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.3:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.4:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.5:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.6:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.7:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.8:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.9:*:*:*:*:*:*:*
CVE-2008-5159
0
null
0.74971
Integer overflow in the remote administration protocol processing in Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to cause a denial of service (crash) via a large string length argument, which triggers memory corruption.
2008-11-18
Metasploit
cpe:2.3:a:clientsoftware:wincome_mpd_total:*:*:*:*:*:*:*:*
CVE-2008-5161
0
null
0.03471
Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.
2008-11-19
Metasploit
cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.10:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.11:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.9:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.1.1:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.0:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.1:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.2:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.0:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.4.0:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.4.1:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.4.2:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.5.0:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.5.1:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.0:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.1:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.4:*:linux_ibm_zos:*:*:*:*:*
CVE-2008-5191
0
null
0.55521
Multiple SQL injection vulnerabilities in SePortal 2.4 allow remote attackers to execute arbitrary SQL commands via the (1) poll_id parameter to poll.php and the (2) sp_id parameter to staticpages.php.
2008-11-21
Metasploit
cpe:2.3:a:seportal:seportal:2.4:*:*:*:*:*:*:*
CVE-2008-5281
0
null
0.05497
Heap-based buffer overflow in Titan FTP Server 6.05 build 550 allows remote attackers to execute arbitrary code via a long DELE command.
2008-11-29
Nuclei
cpe:2.3:a:south_river_technologies:titan_ftp_server:6.05:build_550:*:*:*:*:*:*
CVE-2008-5353
0
null
0.89187
The Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not properly enforce context of ZoneInfo objects during deserialization, which allows remote attackers to run untrusted applets and applications in a privileged context, as demonstrated by "deserializing Calendar objects".
2008-12-05
Metasploit
cpe:2.3:a:sun:jdk:*:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:*:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
CVE-2008-5405
0
null
0.82978
Stack-based buffer overflow in the RDP protocol password decoder in Cain & Abel 4.9.23 and 4.9.24, and possibly earlier, allows remote attackers to execute arbitrary code via an RDP file containing a long string.
2008-12-10
Metasploit
cpe:2.3:a:oxid:cain_and_abel:4.9.23:*:*:*:*:*:*:*;cpe:2.3:a:oxid:cain_and_abel:4.9.24:*:*:*:*:*:*:*
CVE-2008-5416
0
null
0.89069
Heap-based buffer overflow in Microsoft SQL Server 2000 SP4, 8.00.2050, 8.00.2039, and earlier; SQL Server 2000 Desktop Engine (MSDE 2000) SP4; SQL Server 2005 SP2 and 9.00.1399.06; SQL Server 2000 Desktop Engine (WMSDE) on Windows Server 2003 SP1 and SP2; and Windows Internal Database (WYukon) SP2 allows remote authenticated users to cause a denial of service (access violation exception) or execute arbitrary code by calling the sp_replwritetovarbin extended stored procedure with a set of invalid parameters that trigger memory overwrite, aka "SQL Server sp_replwritetovarbin Limited Memory Overwrite Vulnerability."
2008-12-10
Metasploit
cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2005:*:*:*:*:*:*:*
CVE-2008-5444
0
null
0.75864
Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2008-5448 and CVE-2008-5449.
2009-01-14
Metasploit
cpe:2.3:a:oracle:secure_backup:10.2.0.2:*:*:*:*:*:*:*
CVE-2008-5448
0
null
0.81775
Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2008-5444 and CVE-2008-5449.
2009-01-14
Metasploit
cpe:2.3:a:oracle:secure_backup:10.2.0.2:*:*:*:*:*:*:*
CVE-2008-5457
0
null
0.81836
Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
2009-01-14
Metasploit
cpe:2.3:a:oracle:bea_product_suite:10.0:mp1:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:10.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:7.0:sp7:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:9.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:9.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:*
CVE-2008-5492
0
null
0.70177
Heap-based buffer overflow in the PDFVIEW.PdfviewCtrl.1 ActiveX control in pdfview.ocx 2.0.0.1 in VeryDOC PDF Viewer OCX Control allows remote attackers to execute arbitrary code via a long first argument to the OpenPDF method. NOTE: some of these details are obtained from third party information.
2008-12-12
Metasploit
cpe:2.3:a:verypdf:verydoc_pdf_viewer:2.0.0.1:*:*:*:*:*:*:*
CVE-2008-5499
0
null
0.88589
Unspecified vulnerability in Adobe Flash Player for Linux 10.0.12.36, and 9.0.151.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file.
2008-12-18
Metasploit
cpe:2.3:a:adobe:flash_player_for_linux:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player_for_linux:10.0.12.36:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player_for_linux:9.0.115.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player_for_linux:9.0.124.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player_for_linux:9.0.31:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player_for_linux:9.0.48.0:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVE-2008-5587
0
null
0.01986
Directory traversal vulnerability in libraries/lib.inc.php in phpPgAdmin 4.2.1 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the _language parameter to index.php.
2008-12-16
Nuclei
cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:2.2:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.1:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:4.1.1:*:*:*:*:*:*:*
CVE-2008-5626
0
null
0.79294
XM Easy Personal FTP Server 5.6.0 allows remote authenticated users to cause a denial of service via a crafted argument to the NLST command, as demonstrated by a -1 argument.
2008-12-17
Metasploit
cpe:2.3:a:dxmsoft:xm_easy_personal_ftp_server:5.6.0:*:*:*:*:*:*:*
CVE-2008-5664
0
null
0.78207
Stack-based buffer overflow in Realtek Media Player (aka Realtek Sound Manager, RtlRack, or rtlrack.exe) 1.15.0.0 allows remote attackers to execute arbitrary code via a crafted playlist (PLA) file.
2008-12-19
Metasploit
cpe:2.3:a:realtek:realtek_media_player:1.15.0.0:*:*:*:*:*:*:*
CVE-2008-5666
0
null
0.63292
WinFTP FTP Server 2.3.0, when passive (aka PASV) mode is used, allows remote authenticated users to cause a denial of service via a sequence of FTP sessions that include an invalid "NLST -1" command.
2008-12-19
Metasploit
cpe:2.3:a:wftpserver:winftp_ftp_server:2.3.0:*:*:*:*:*:*:*
CVE-2008-5711
0
null
0.55683
Heap-based buffer overflow in the Facebook PhotoUploader ActiveX control 5.0.14.0 and earlier allows remote attackers to execute arbitrary code via a long FileMask property value.
2008-12-24
Metasploit
cpe:2.3:a:facebook:photouploader:*:*:*:*:*:*:*:*;cpe:2.3:a:facebook:photouploader:4.5.57.0:*:*:*:*:*:*:*
CVE-2008-6080
0
null
0.063
Directory traversal vulnerability in download.php in the ionFiles (com_ionfiles) 4.4.2 component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
2009-02-06
Nuclei
cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
CVE-2008-6082
0
null
0.60799
Titan FTP Server 6.26 build 630 allows remote attackers to cause a denial of service (CPU consumption) via the SITE WHO command.
2009-02-06
Metasploit
cpe:2.3:a:southrivertech:titan_ftp_server:6.26:*:*:*:*:*:*:*
CVE-2008-6132
0
null
0.77652
Eval injection vulnerability in reserve.php in phpScheduleIt 1.2.10 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via the start_date parameter.
2009-02-13
Metasploit
cpe:2.3:a:brickhost:phpscheduleit:*:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.0.0rc1:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.0:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.0_rc1:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.0:beta:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.7:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.8:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.9:*:*:*:*:*:*:*
CVE-2008-6172
0
null
0.07294
Directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter.
2009-02-19
Nuclei
cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*;cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
CVE-2008-6222
0
null
0.01649
Directory traversal vulnerability in the Pro Desk Support Center (com_pro_desk) component 1.0 and 1.2 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the include_file parameter to index.php.
2009-02-20
Nuclei
cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.2:*:*:*:*:*:*:*
CVE-2008-6465
0
null
0.01157
Multiple cross-site scripting (XSS) vulnerabilities in login.php in webshell4 in Parallels H-Sphere 3.0.0 P9 and 3.1 P1 allow remote attackers to inject arbitrary web script or HTML via the (1) err, (2) errorcode, and (3) login parameters.
2009-03-13
Nuclei
cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*;cpe:2.3:a:parallels:h-sphere:3.1:p1:*:*:*:*:*:*
CVE-2008-6508
0
null
0.72592
Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
2009-03-23
Metasploit
cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:2.6.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:2.6.2:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.4.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.4.3:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.4.4:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.4.5:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.5.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.6.0:*:*:*:*:*:*:*
CVE-2008-6668
0
null
0.01077
Multiple directory traversal vulnerabilities in nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) id parameter to comm.php and (2) var_filename parameter to viewrq.php.
2009-04-08
Nuclei
cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*;cpe:2.3:a:dirk_bartley:nweb2fax:0.2:*:*:*:*:*:*:*
CVE-2008-6825
0
null
0.63298
Directory traversal vulnerability in user/index.php in Fonality trixbox CE 2.6.1 and earlier allows remote attackers to include and execute arbitrary files via a .. (dot dot) in the langChoice parameter.
2009-06-05
Metasploit
cpe:2.3:a:trixbox:trixbox:*:*:*:*:*:*:*:*;cpe:2.3:a:trixbox:trixbox:2.0:*:*:*:*:*:*:*;cpe:2.3:a:trixbox:trixbox:2.4.2.0:*:*:*:*:*:*:*
CVE-2008-6829
0
null
0.68325
VicFTPS 5.0 allows remote attackers to cause a denial of service (crash) via a LIST command that starts with a "/\/" (forward slash, backward slash, forward slash). NOTE: this might be the same issue as CVE-2008-2031.
2009-06-08
Metasploit
cpe:2.3:a:vicftps:vicftps:5.0:*:*:*:*:*:*:*
CVE-2008-6898
0
null
0.66182
Buffer overflow in the XHTTP Module 4.1.0.0 in the ActiveX control for SaschArt SasCam Webcam Server 2.6.5 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long argument to the Get method and other unspecified methods.
2009-08-05
Metasploit
cpe:2.3:a:saschart:sascam_webcam_server:2.6.5:*:*:*:*:*:*:*
CVE-2008-6938
0
null
0.73687
Pi3Web 2.0.3 before PL2, when installed on Windows as a desktop application and without using the Pi3Web/Conf/Intenet.pi3, allows remote attackers to cause a denial of service (crash or hang) and obtain the full pathname of the server via a request to a file in the ISAPI directory that is not an executable DLL, which triggers the crash when the DLL load fails, as demonstrated using Isapi\users.txt.
2009-08-11
Metasploit
cpe:2.3:a:holger_zimmermann:pi3web:*:*:*:*:*:*:*:*;cpe:2.3:a:holger_zimmermann:pi3web:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:holger_zimmermann:pi3web:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:holger_zimmermann:pi3web:2.0.2_beta_1:*:*:*:*:*:*:*;cpe:2.3:a:holger_zimmermann:pi3web:2.0:*:*:*:*:*:*:*
CVE-2008-6982
0
null
0.08587
Cross-site scripting (XSS) vulnerability in index.php in devalcms 1.4a allows remote attackers to inject arbitrary web script or HTML via the currentpath parameter.
2009-08-19
Nuclei
cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:*
CVE-2008-7232
0
null
0.55749
Buffer overflow in the report function in xtacacsd 4.1.2 and earlier allows remote attackers to execute arbitrary code via a crafted CONNECT TACACS command.
2009-09-14
Metasploit
cpe:2.3:a:netplex-tech:xtacacsd:*:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:2.0:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.0:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.1:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.2:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.3:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.4:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.5:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:4.0:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:4.1:*:*:*:*:*:*:*
CVE-2008-7269
0
null
0.00653
Open redirect vulnerability in api.php in SiteEngine 5.x allows user-assisted remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the forward parameter in a logout action.
2010-12-01
Nuclei
cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
CVE-2009-0075
0
null
0.84846
Microsoft Internet Explorer 7 does not properly handle errors during attempted access to deleted objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to CFunctionPointer and the appending of document objects, aka "Uninitialized Memory Corruption Vulnerability."
2009-02-10
Metasploit
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:*:professional:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:professional:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
CVE-2009-0133
0
null
0.70799
Buffer overflow in Microsoft HTML Help Workshop 4.74 and earlier allows context-dependent attackers to execute arbitrary code via a .hhp file with a long "Index file" field, possibly a related issue to CVE-2006-0564.
2009-01-15
Metasploit
cpe:2.3:a:microsoft:html_help_workshop:4.74:*:*:*:*:*:*:*
CVE-2009-0183
0
null
0.7952
Stack-based buffer overflow in Remote Control Server in Free Download Manager (FDM) 2.5 Build 758 and 3.0 Build 844 allows remote attackers to execute arbitrary code via a long Authorization header in an HTTP request.
2009-02-03
Metasploit
cpe:2.3:a:free_download_manager:free_download_manager:2.5:*:*:*:*:*:*:*;cpe:2.3:a:free_download_manager:free_download_manager:3.0:*:*:*:*:*:*:*
CVE-2009-0184
0
null
0.67534
Multiple buffer overflows in the torrent parsing implementation in Free Download Manager (FDM) 2.5 Build 758 and 3.0 Build 844 allow remote attackers to execute arbitrary code via (1) a long file name within a torrent file, (2) a long tracker URL in a torrent file, or (3) a long comment in a torrent file.
2009-02-03
Metasploit
cpe:2.3:a:free_download_manager:free_download_manager:2.5:*:*:*:*:*:*:*;cpe:2.3:a:free_download_manager:free_download_manager:3.0:*:*:*:*:*:*:*
CVE-2009-0187
0
null
0.75649
Stack-based buffer overflow in Orbit Downloader 2.8.2 and 2.8.3, and possibly other versions before 2.8.5, allows remote attackers to execute arbitrary code via a crafted HTTP URL with a long host name, which is not properly handled when constructing a "Connecting" log message.
2009-02-26
Metasploit
cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.2:*:*:*:*:*:*:*;cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.3:*:*:*:*:*:*:*;cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.4:*:*:*:*:*:*:*
CVE-2009-0215
0
null
0.61783
Stack-based buffer overflow in the GetXMLValue method in the IBM Access Support ActiveX control in IbmEgath.dll, as distributed on IBM and Lenovo computers, allows remote attackers to execute arbitrary code via unspecified vectors.
2009-03-25
Metasploit
cpe:2.3:a:ibm:access_support_activex_control:3.20.284.0:*:*:*:*:*:*:*
CVE-2009-0255
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.05112
The System extension Install tool in TYPO3 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3 creates the encryption key with an insufficiently random seed, which makes it easier for attackers to crack the key.
2009-01-22
Metasploit
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
CVE-2009-0323
0
null
0.69816
Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 and 11.0 allow remote attackers to execute arbitrary code via (1) a long type parameter in an input tag, which is not properly handled by the EndOfXmlAttributeValue function; (2) an "HTML GI" in a start tag, which is not properly handled by the ProcessStartGI function; and unspecified vectors in (3) html2thot.c and (4) xml2thot.c, related to the msgBuffer variable. NOTE: these are different vectors than CVE-2008-6005.
2009-01-28
Metasploit
cpe:2.3:a:w3:amaya:*:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:0.95b:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:0.9:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.0a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.1a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.1c:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.2a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.3a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.3b:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.4a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:10.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:2.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:2.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:2.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:2.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:2.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:3.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:3.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:3.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:5.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:5.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:5.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:5.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:6.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:6.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:6.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:6.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:6.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:7.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:7.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:7.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.1a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.1b:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.52:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.5:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.6:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.7.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.7.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.7:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.8.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.8.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.8.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.8.5:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.2.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.52:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.53:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.54:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.55:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.5:*:*:*:*:*:*:*
CVE-2009-0347
0
null
0.03639
Open redirect vulnerability in cs.html in the Autonomy (formerly Verity) Ultraseek search engine allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.
2009-01-29
Nuclei
cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
CVE-2009-0476
0
null
0.83257
Stack-based buffer overflow in MultiMedia Soft AdjMmsEng.dll 7.11.1.0 and 7.11.2.7, as distributed in multiple MultiMedia Soft audio components for .NET, allows remote attackers to execute arbitrary code via a long string in a playlist (.pls) file, as originally reported for Euphonics Audio Player 1.0. NOTE: some of these details are obtained from third party information.
2009-02-08
Metasploit
cpe:2.3:a:multimediasoft:audio_dj_studio_for_.net:-:*:*:*:*:*:*:*;cpe:2.3:a:multimediasoft:audio_sound_editer_for_.net:-:*:*:*:*:*:*:*;cpe:2.3:a:multimediasoft:audio_sound_recorder_for_.net:-:*:*:*:*:*:*:*;cpe:2.3:a:multimediasoft:audio_sound_studio_for_.net:-:*:*:*:*:*:*:*;cpe:2.3:a:multimediasoft:audio_sound_suite_for_.net:-:*:*:*:*:*:*:*
CVE-2009-0545
0
null
0.93944
cgi-bin/kerbynet in ZeroShell 1.0beta11 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the type parameter in a NoAuthREQ x509List action.
2009-02-12
Metasploit/Nuclei
cpe:2.3:a:zeroshell:zeroshell:1.0:beta10:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta11:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta2:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta3:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta4:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta5:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta6:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta7:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta8:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta9:*:*:*:*:*:*
CVE-2009-0546
0
null
0.8017
Stack-based buffer overflow in NewsGator FeedDemon 2.7 and earlier allows user-assisted remote attackers to execute arbitrary code via a long text attribute in an outline element in a .opml file.
2009-02-12
Metasploit
cpe:2.3:a:newsgator:feeddemon:*:*:*:*:*:*:*:*;cpe:2.3:a:newsgator:feeddemon:2.0.0.24:*:*:*:*:*:*:*;cpe:2.3:a:newsgator:feeddemon:2.6.1.4:*:*:*:*:*:*:*;cpe:2.3:a:newsgator:feeddemon:2.6.1.5:*:*:*:*:*:*:*;cpe:2.3:a:newsgator:feeddemon:2.6:*:*:*:*:*:*:*
CVE-2009-0557
7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.83761
Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel Viewer 2003 SP3; Microsoft Office Excel Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Object Record Corruption Vulnerability."
2009-06-10
CISA
cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_excel_viewer:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_excel_viewer:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:open_xml_file_format_converter:-:*:*:*:*:macos:*:*
CVE-2009-0563
7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.80017
Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; Microsoft Office Word Viewer 2003 SP3; Microsoft Office Word Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a Word document with a crafted tag containing an invalid length field, aka "Word Buffer Overflow Vulnerability."
2009-06-10
CISA
cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_word_viewer:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:open_xml_file_format_converter:-:*:*:*:*:macos:*:*
CVE-2009-0580
0
null
0.84435
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
2009-06-05
Metasploit
cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.37:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.38:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.39:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*
CVE-2009-0658
7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.90801
Buffer overflow in Adobe Reader 9.0 and earlier, and Acrobat 9.0 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF document, related to a non-JavaScript function call and possibly an embedded JBIG2 image stream, as exploited in the wild in February 2009 by Trojan.Pidief.E.
2009-02-20
Metasploit
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
CVE-2009-0695
0
null
0.70615
hagent.exe in Wyse Device Manager (WDM) 4.7.x does not require authentication for commands, which allows remote attackers to obtain management access via a crafted query, as demonstrated by a V52 query that triggers a power-off action.
2012-06-19
Metasploit
cpe:2.3:a:dell:wyse_device_manager:4.7.0:*:*:*:*:*:*:*;cpe:2.3:a:dell:wyse_device_manager:4.7.1:*:*:*:*:*:*:*;cpe:2.3:a:dell:wyse_device_manager:4.7.2:*:*:*:*:*:*:*
CVE-2009-0815
0
null
0.498
The jumpUrl mechanism in class.tslib_fe.php in TYPO3 3.3.x through 3.8.x, 4.0 before 4.0.12, 4.1 before 4.1.10, 4.2 before 4.2.6, and 4.3alpha1 leaks a hash secret (juHash) in an error message, which allows remote attackers to read arbitrary files by including the hash in a request.
2009-03-05
Metasploit
cpe:2.3:a:typo3:typo3:3.3.x:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:3.5.x:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:3.6.x:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:3.7.x:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:3.8.x:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.0:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.4:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.6:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.7:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.8:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.9:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.3:alpha1:*:*:*:*:*:*
CVE-2009-0836
0
null
0.1077
Foxit Reader 2.3 before Build 3902 and 3.0 before Build 1506, including 1120 and 1301, does not require user confirmation before performing dangerous actions defined in a PDF file, which allows remote attackers to execute arbitrary programs and have unspecified other impact via a crafted file, as demonstrated by the "Open/Execute a file" action.
2009-03-10
Metasploit
cpe:2.3:a:foxitsoftware:reader:2.3:*:*:*:*:*:*:*;cpe:2.3:a:foxitsoftware:reader:3.0:*:*:*:*:*:*:*
CVE-2009-0837
0
null
0.83223
Stack-based buffer overflow in Foxit Reader 3.0 before Build 1506, including 1120 and 1301, allows remote attackers to execute arbitrary code via a long (1) relative path or (2) absolute path in the filename argument in an action, as demonstrated by the "Open/Execute a file" action.
2009-03-10
Metasploit
cpe:2.3:a:foxit:reader3.0:*:*:*:*:*:*:*:*
CVE-2009-0880
0
null
0.63552
Directory traversal vulnerability in the CIM server in IBM Director before 5.20.3 Service Update 2 on Windows allows remote attackers to load and execute arbitrary local DLL code via a .. (dot dot) in a /CIMListener/ URI in an M-POST request.
2009-03-12
Metasploit
cpe:2.3:a:ibm:director:*:service_update_1:*:*:*:*:*:*;cpe:2.3:a:ibm:director:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.10:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.11:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.12:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.20:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.21:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.22:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.10.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.10.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.10.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.10.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.20.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.20.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.20.2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
CVE-2009-0884
0
null
0.01005
Buffer overflow in FileZilla Server before 0.9.31 allows remote attackers to cause a denial of service via unspecified vectors related to SSL/TLS packets.
2009-03-12
Nuclei
cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*
CVE-2009-0920
0
null
0.58773
Stack-based buffer overflow in OvCgi/Toolbar.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a long OvOSLocale cookie, a variant of CVE-2008-0067.
2009-03-25
Metasploit
cpe:2.3:a:hp:network_node_manager:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:network_node_manager:7.5.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:network_node_manager:7.5.3:*:*:*:*:*:*:*
CVE-2009-0927
8.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.93673
Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Collab object, a different vulnerability than CVE-2009-0658.
2009-03-19
Metasploit/CISA
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
CVE-2009-0932
0
null
0.05612
Directory traversal vulnerability in framework/Image/Image.php in Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.
2009-03-17
Nuclei
cpe:2.3:a:debian:horde:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde:3.3:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde_groupware:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde_groupware:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde_groupware:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde_groupware:1.1.4:*:*:*:*:*:*:*
CVE-2009-0950
0
null
0.82109
Stack-based buffer overflow in Apple iTunes before 8.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an itms: URL with a long URL component after a colon.
2009-06-02
Metasploit
cpe:2.3:a:apple:itunes:*:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:*:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.3:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.3:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.3:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.4:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.4:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.4:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:3.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:3.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.1.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.1.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2.72:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2.72:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.5.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.5.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.5:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.6.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.6.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.6:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1.30:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1.30:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.8.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.8.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.8:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.8:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.9.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.9.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.9:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.9:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.3:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.3:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.3:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.5:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.5:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.5:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.2.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.2.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.3:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.5.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.5.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.5:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.1:-:windows:*:*:*:*:*
CVE-2009-0978
0
null
0.49273
Unspecified vulnerability in the Workspace Manager component in Oracle Database 10.2.0.4 and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2009-0975.
2009-04-15
Metasploit
cpe:2.3:a:oracle:database_10g:10.2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_11g:11.1.0.6:*:*:*:*:*:*:*
CVE-2009-1028
0
null
0.67087
Stack-based buffer overflow in ediSys eZip Wizard 3.0 allows remote attackers to execute arbitrary code via a crafted .zip file.
2009-03-20
Metasploit
cpe:2.3:a:edisys:ezip_wizard:3.0:*:*:*:*:*:*:*
CVE-2009-1029
0
null
0.70342
Stack-based buffer overflow in POP Peeper 3.4.0.0 and earlier allows remote POP3 servers to execute arbitrary code via a long Date header, related to Imap.dll.
2009-03-20
Metasploit
cpe:2.3:a:poppeeper:pop_peeper:*:*:*:*:*:*:*:*;cpe:2.3:a:poppeeper:pop_peeper:2.4.3:*:*:*:*:*:*:*;cpe:2.3:a:poppeeper:pop_peeper:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:poppeeper:pop_peeper:3.0:*:*:*:*:*:*:*
CVE-2009-1122
0
null
0.92339
The WebDAV extension in Microsoft Internet Information Services (IIS) 5.0 on Windows 2000 SP4 does not properly decode URLs, which allows remote attackers to bypass authentication, and possibly read or create files, via a crafted HTTP request, aka "IIS 5.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1535.
2009-06-10
Metasploit
cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
CVE-2009-1123
7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.04516
The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Desktop Vulnerability."
2009-06-10
CISA
cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:-:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
CVE-2009-1136
0
null
0.85958
The Microsoft Office Web Components Spreadsheet ActiveX control (aka OWC10 or OWC11), as distributed in Office XP SP3 and Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 Gold and SP1, and Office Small Business Accounting 2006, when used in Internet Explorer, allows remote attackers to execute arbitrary code via a crafted call to the msDataSourceObject method, as exploited in the wild in July and August 2009, aka "Office Web Components HTML Script Vulnerability."
2009-07-15
Metasploit
cpe:2.3:a:microsoft:isa_server:2004:sp3:enterprise:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2004:sp3:standard:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2006:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2006:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2006:supportability:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:*:small_business_accounting_2006:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2003:sp1:2007_microsoft_office:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_xp:sp3:*:*:*:*:*:*:*
CVE-2009-1151
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.93032
Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.
2009-03-26
Metasploit/Nuclei/CISA
cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
CVE-2009-1185
0
null
0.8927
udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.
2009-04-17
Metasploit
cpe:2.3:a:juniper:ctpview:*:*:*:*:*:*:*:*;cpe:2.3:a:juniper:ctpview:7.1:-:*:*:*:*:*:*;cpe:2.3:a:juniper:ctpview:7.1:r1:*:*:*:*:*:*;cpe:2.3:a:juniper:ctpview:7.2:-:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*;cpe:2.3:a:udev_project:udev:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
CVE-2009-1260
0
null
0.74522
Multiple stack-based buffer overflows in UltraISO 9.3.3.2685 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted (1) CCD or (2) IMG file.
2009-04-07
Metasploit
cpe:2.3:a:ezbsystems:ultraiso:*:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:3.1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:3.1_sr1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:3.1_sr2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:4.0:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:4.1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:4.5:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:5.0:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:5.1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:5.55:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:5.55_sr-1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:5.55_sr-2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.0:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.51:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.52:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.52_sr-1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.52_sr-2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.56_sr-1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.56_sr-2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.5:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.0:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.1:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.21_sr-1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.21_sr-2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.22_me:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.23:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.25:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.51:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.52:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.55:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.56:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.5:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.62:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.65:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.65_sr-2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.66:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.6:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.12:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.2:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.51:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.61:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.62:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.63:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.65:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.66:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.6:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.0:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.1.2:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.2:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.3.1:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.3.2:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.3:-:pe:*:*:*:*:*
CVE-2009-1350
0
null
0.75455
Unspecified vulnerability in xtagent.exe in Novell NetIdentity Client before 1.2.4 allows remote attackers to execute arbitrary code by establishing an IPC$ connection to the XTIERRPCPIPE named pipe, and sending RPC messages that trigger a dereference of an arbitrary pointer.
2009-04-21
Metasploit
cpe:2.3:a:novell:netidentity_client1.2.3:*:*:*:*:*:*:*:*
CVE-2009-1386
0
null
0.42628
ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
2009-06-04
Metasploit
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openssl:0.9.6-15:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openssl:0.9.6b-3:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openssl:0.9.7a-2:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
CVE-2009-1394
0
null
0.49012
Stack-based buffer overflow in Motorola Timbuktu Pro 8.6.5 on Windows allows remote attackers to execute arbitrary code by sending a long malformed string over the PlughNTCommand named pipe.
2009-06-26
Metasploit
cpe:2.3:a:motorola:timbuktu_pro:8.6.5:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
CVE-2009-1429
0
null
0.911
The Intel LANDesk Common Base Agent (CBA) in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allows remote attackers to execute arbitrary commands via a crafted packet whose contents are interpreted as a command to be launched in a new process by the CreateProcessA function.
2009-04-29
Metasploit
cpe:2.3:a:symantec:antivirus:*:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:*:-:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:-:-:srv:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.3:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.4:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.5:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.6:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.7:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.8:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.9:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus_central_quarantine_server:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1001:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1009:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:endpoint_protection:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:system_center:*:*:*:*:*:*:*:*
CVE-2009-1430
0
null
0.60565
Multiple stack-based buffer overflows in IAO.EXE in the Intel Alert Originator Service in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allow remote attackers to execute arbitrary code via (1) a crafted packet or (2) data that ostensibly arrives from the MsgSys.exe process.
2009-04-29
Metasploit
cpe:2.3:a:symantec:antivirus:*:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:*:-:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:-:-:srv:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.3:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.4:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.5:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.6:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.7:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.8:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.9:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus_central_quarantine_server:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1001:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1009:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:endpoint_protection:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:system_center:*:*:*:*:*:*:*:*
CVE-2009-1496
0
null
0.01473
Directory traversal vulnerability in the Cmi Marketplace (com_cmimarketplace) component 0.1 for Joomla! allows remote attackers to list arbitrary directories via a .. (dot dot) in the viewit parameter to index.php.
2009-05-01
Nuclei
cpe:2.3:a:ijobid:com_cmimarketplace:0.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
CVE-2009-1534
0
null
0.7543
Buffer overflow in the Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2000 Web Components SP3, Office XP Web Components SP3, BizTalk Server 2002, and Visual Studio .NET 2003 SP1 allows remote attackers to execute arbitrary code via crafted property values, aka "Office Web Components Buffer Overflow Vulnerability."
2009-08-12
Metasploit
cpe:2.3:a:microsoft:biztalk_server:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2004:sp3:enterprise:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2004:sp3:standard:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2006:sp1:enterprise:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2006:sp1:standard:*:*:*:*:*;cpe:2.3:a:microsoft:office:-:*:small_business_accounting_2006:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2003:sp1:2007_microsoft_office:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_studio_.net:2003:sp1:*:*:*:*:*:*
CVE-2009-1535
0
null
0.91826
The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.0 allows remote attackers to bypass URI-based protection mechanisms, and list folders or read, create, or modify files, via a %c0%af (Unicode / character) at an arbitrary position in the URI, as demonstrated by inserting %c0%af into a "/protected/" initial pathname component to bypass the password protection on the protected\ folder, aka "IIS 5.1 and 6.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1122.
2009-06-10
Metasploit
cpe:2.3:a:microsoft:internet_information_services:5.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_services:6.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:-:*
CVE-2009-1558
0
null
0.10881
Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter.
2009-05-06
Nuclei
cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*;cpe:2.3:h:cisco:wvc54gca:1.00r24:*:*:*:*:*:*:*
CVE-2009-1568
0
null
0.61015
Stack-based buffer overflow in ienipp.ocx in Novell iPrint Client 5.30, and possibly other versions before 5.32, allows remote attackers to execute arbitrary code via a long target-frame parameter.
2009-12-08
Metasploit
cpe:2.3:a:novell:iprint_client:5.30:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint_client:5.31:*:*:*:*:*:*:*
CVE-2009-1569
0
null
0.65451
Multiple stack-based buffer overflows in Novell iPrint Client 4.38, 5.30, and possibly other versions before 5.32 allow remote attackers to execute arbitrary code via vectors related to (1) Date and (2) Time.
2009-12-08
Metasploit
cpe:2.3:a:novell:iprint:4.38:*:client:*:*:*:*:*;cpe:2.3:a:novell:iprint:5.30:*:client:*:*:*:*:*
CVE-2009-1612
0
null
0.68936
Stack-based buffer overflow in the MPS.StormPlayer.1 ActiveX control in mps.dll 3.9.4.27 in Baofeng Storm allows remote attackers to execute arbitrary code via a long argument to the OnBeforeVideoDownload method, as exploited in the wild in April and May 2009. NOTE: some of these details are obtained from third party information. NOTE: it was later reported that 3.09.04.17 and earlier are also affected.
2009-05-11
Metasploit
cpe:2.3:a:baofeng:storm:2.7.9_10:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:2.7.9_8:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:2.8:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:2.9:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:3.9.3_25:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:3.9.3_30:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:3.9.4_17:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:3.9.4_27:*:*:*:*:*:*:*
CVE-2009-1641
0
null
0.65931
Multiple stack-based buffer overflows in Mini-stream Ripper 3.0.1.1 allow remote attackers to execute arbitrary code via (1) a long rtsp URL in a .ram file and (2) a long string in the HREF attribute of a REF element in a .asx file.
2009-05-15
Metasploit
cpe:2.3:a:mini-stream:ripper:3.0.1.1:*:*:*:*:*:*:*
CVE-2009-1730
0
null
0.62305
Multiple directory traversal vulnerabilities in NetMechanica NetDecision TFTP Server 4.2 allow remote attackers to read or modify arbitrary files via directory traversal sequences in the (1) GET or (2) PUT command.
2009-05-20
Metasploit
cpe:2.3:a:netmechanica:netdecision_tftp_server:4.2:*:*:*:*:*:*:*
CVE-2009-1831
0
null
0.81169
The Nullsoft Modern Skins Support module (gen_ff.dll) in Nullsoft Winamp before 5.552 allows remote attackers to execute arbitrary code via a crafted MAKI file, which triggers an incorrect sign extension, an integer overflow, and a stack-based buffer overflow.
2009-05-29
Metasploit
cpe:2.3:a:nullsoft:winamp:*:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.0:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.10:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.24:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.4:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.50:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.5e:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.60:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.60:*:full:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.60:*:lite:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.61:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.61:*:full:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.62:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.62:*:standard:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.64:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.64:*:standard:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.65:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.6x:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.70:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.70:*:full:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.71:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.72:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.73:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.73:*:full:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.74:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.75:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.76:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.77:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.78:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.79:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.7x:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.80:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.81:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.90:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.91:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.95:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:3.0:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:3.1:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.01:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.02:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.03:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.03a:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.04:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.05:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.06:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.07:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08:c:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08:d:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08:e:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08c:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08d:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08e:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.091:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.093:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.094:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.09:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.0:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.111:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.112:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.11:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.12:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.13:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.1:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.21:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.22:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.23:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.24:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.2:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.31:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.32:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.33:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.34:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.35:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.36:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.3:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.51:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.52:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.53:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.541:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.54:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.5:*:*:*:*:*:*:*
CVE-2009-1862
7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.57995
Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009.
2009-07-23
CISA
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
CVE-2009-1872
0
null
0.12
Multiple cross-site scripting (XSS) vulnerabilities in Adobe ColdFusion Server 8.0.1, 8, and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the startRow parameter to administrator/logviewer/searchlog.cfm, or the query string to (2) wizards/common/_logintowizard.cfm, (3) wizards/common/_authenticatewizarduser.cfm, or (4) administrator/enter.cfm.
2009-08-18
Nuclei
cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.0:*:enterprise_multi-server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.0:*:enterprise_server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.0:*:linux:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.0:*:solaris:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.1:*:enterprise_multi-server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.1:*:enterprise_server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.1:*:linux:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.1:*:solaris:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0:*:enterprise_multi-server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0:*:enterprise_server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0:*:linux:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0:*:solaris:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.2:unknown:mx:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:8.1:*:*:*:*:*:*:*
CVE-2009-1943
0
null
0.64247
Stack-based buffer overflow in the IKE service (ireIke.exe) in SafeNet SoftRemote before 10.8.6 allows remote attackers to execute arbitrary code via a long request to UDP port 62514.
2009-06-05
Metasploit
cpe:2.3:a:safenet-inc:softremote1.4:*:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:*:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.7.7:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.7.7:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.0:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.1:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.2:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.3:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:8.0:*:*:*:*:*:*:*
CVE-2009-1977
0
null
0.85139
Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the July 2009 Oracle CPU. Oracle has not commented on claims from an independent researcher that this vulnerability allows attackers to bypass authentication via unknown vectors involving the username parameter and login.php.
2009-07-14
Metasploit
cpe:2.3:a:oracle:secure_backup:10.2.0.3:*:*:*:*:*:*:*
CVE-2009-1978
0
null
0.8526
Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the July 2009 Oracle CPU. Oracle has not commented on claims from an independent researcher that this vulnerability allows remote authenticated users to execute arbitrary code with SYSTEM privileges via vectors involving property_box.php.
2009-07-14
Metasploit
cpe:2.3:a:oracle:secure_backup:10.2.0.3:*:*:*:*:*:*:*