CVE
stringlengths 13
16
| CVSS Score
float64 0
10
| CVSS_Vector
stringclasses 257
values | EPSS
float64 0
0.95
| Description
stringlengths 28
3.79k
| Published
stringdate 1990-08-14 00:00:00
2025-10-05 00:00:00
| Source
stringclasses 7
values | CPE
stringlengths 33
51k
⌀ |
|---|---|---|---|---|---|---|---|
CVE-2008-4654
| 0
| null | 0.807
|
Stack-based buffer overflow in the parse_master function in the Ty demux plugin (modules/demux/ty.c) in VLC Media Player 0.9.0 through 0.9.4 allows remote attackers to execute arbitrary code via a TiVo TY media file with a header containing a crafted size value.
|
2008-10-22
|
Metasploit
|
cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
|
CVE-2008-4668
| 0
| null | 0.00268
|
Directory traversal vulnerability in the Image Browser (com_imagebrowser) 0.1.5 component for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the folder parameter to index.php.
|
2008-10-22
|
Nuclei
|
cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
CVE-2008-4687
| 0
| null | 0.79225
|
manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to execute arbitrary code via a sort parameter containing PHP sequences, which are processed by create_function within the multi_sort function in core/utility_api.php.
|
2008-10-22
|
Metasploit
|
cpe:2.3:a:mantis:mantis:*:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:0.19.3:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:0.19.4:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mantis:mantis:1.1.2:*:*:*:*:*:*:*
|
CVE-2008-4696
| 0
| null | 0.62121
|
Cross-site scripting (XSS) vulnerability in Opera.dll in Opera before 9.61 allows remote attackers to inject arbitrary web script or HTML via the anchor identifier (aka the "optional fragment"), which is not properly escaped before storage in the History Search database (aka md.dat).
|
2008-10-23
|
Metasploit
|
cpe:2.3:a:opera:opera:*:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5..10:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.0:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.11:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.12:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.1:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.2:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.3:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.4:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.5:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.6:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.7:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.8:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:5.9:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.01:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.02:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.03:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.04:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.05:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.06:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6.0:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:6:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.01:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.02:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.03:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.0:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.10:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.11:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.20:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.20:beta7:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.21:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.22:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.23:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.50:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.50:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.51:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.52:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.53:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.54:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.54:update_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7.54:update_2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7:beta_1.2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:7:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.01:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.02:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.0:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.0:beta_3:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.50:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.51:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.52:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.53:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:8.54:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.01:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.02:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.0:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.10:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.20:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.20:beta_1:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.21:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.22:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.23:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.24:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.25:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.26:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.27:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.50:*:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.50:beta_2:*:*:*:*:*:*;cpe:2.3:a:opera:opera:9.51:*:*:*:*:*:*:*
|
CVE-2008-4764
| 0
| null | 0.01921
|
Directory traversal vulnerability in the eXtplorer module (com_extplorer) 2.0.0 RC2 and earlier in Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dir parameter in a show_error action.
|
2008-10-28
|
Nuclei
|
cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
CVE-2008-4779
| 0
| null | 0.7879
|
Stack-based buffer overflow in TUGzip 3.5.0.0 allows remote attackers to denial of service (crash) or execute arbitrary code via a long filename in a .zip file.
|
2008-10-29
|
Metasploit
|
cpe:2.3:a:tguzip:tguzip:3.5.5.0.0:*:*:*:*:*:*:*
|
CVE-2008-4828
| 0
| null | 0.77418
|
Multiple stack-based buffer overflows in dsmagent.exe in the Remote Agent Service in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, and 5.4.0.0 through 5.4.1.96, and the TSM Express client 5.3.3.0 through 5.3.6.4, allow remote attackers to execute arbitrary code via (1) a request packet that is not properly parsed by an unspecified "generic string handling function" or (2) a crafted NodeName in a dicuGetIdentifyRequest request packet, related to the (a) Web GUI and (b) Java GUI.
|
2009-05-05
|
Metasploit
|
cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1.8.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1.8.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.96:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3:*:*:*:*:*:*:*
|
CVE-2008-4830
| 0
| null | 0.62466
|
Insecure method vulnerability in the KWEdit ActiveX control in SAP GUI 6.40 Patch 29 (KWEDIT.DLL 6400.1.1.41) and 7.10 Patch 5 (KWEDIT.DLL 7100.1.1.43) allows remote attackers to (1) overwrite arbitrary files via the SaveDocumentAs method or (2) read or execute arbitrary files via the OpenDocument method.
|
2009-04-16
|
Metasploit
|
cpe:2.3:a:sap:sap_gui:6.40:*:*:*:*:*:*:*;cpe:2.3:a:sap:sap_gui:7.10:*:*:*:*:*:*:*
|
CVE-2008-4844
| 0
| null | 0.82846
|
Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabular Data Control (TDC) in a crafted HTML or XML document, as demonstrated by nested SPAN or MARQUEE elements, and exploited in the wild in December 2008.
|
2008-12-11
|
Metasploit
|
cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
|
CVE-2008-4922
| 0
| null | 0.67087
|
Buffer overflow in the DjVu ActiveX Control 3.0 for Microsoft Office (DjVu_ActiveX_MSOffice.dll) allows remote attackers to execute arbitrary code via a long (1) ImageURL property, and possibly the (2) Mode, (3) Page, or (4) Zoom properties.
|
2008-11-04
|
Metasploit
|
cpe:2.3:a:djvu:activex_control_for_microsoft_office_2000:*:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*
|
CVE-2008-5002
| 0
| null | 0.68423
|
Insecure method vulnerability in the ChilkatCrypt2.ChilkatCrypt2.1 ActiveX control (ChilkatCrypt2.dll 4.3.2.1) in Chilkat Crypt ActiveX Component allows remote attackers to create and overwrite arbitrary files via the WriteFile method. NOTE: this could be leveraged for code execution by creating executable files in Startup folders or by accessing files using hcp:// URLs. NOTE: some of these details are obtained from third party information.
|
2008-11-10
|
Metasploit
|
cpe:2.3:a:chilkat_software:chilkat_crypt_activex_control:2.1:*:*:*:*:*:*:*
|
CVE-2008-5036
| 0
| null | 0.67309
|
Stack-based buffer overflow in VideoLAN VLC media player 0.9.x before 0.9.6 might allow user-assisted attackers to execute arbitrary code via an an invalid RealText (rt) subtitle file, related to the ParseRealText function in modules/demux/subtitle.c. NOTE: this issue was SPLIT from CVE-2008-5032 on 20081110.
|
2008-11-10
|
Metasploit
|
cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
|
CVE-2008-5081
| 0
| null | 0.71171
|
The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.
|
2008-12-17
|
Metasploit
|
cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.1:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.2:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.3:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.4:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.5.1:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.5.2:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.5:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.10:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.11:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.12:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.13:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.14:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.15:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.16:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.17:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.18:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.19:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.1:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.20:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.21:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.22:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.2:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.3:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.4:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.5:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.6:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.7:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.8:*:*:*:*:*:*:*;cpe:2.3:a:avahi:avahi:0.6.9:*:*:*:*:*:*:*
|
CVE-2008-5159
| 0
| null | 0.74971
|
Integer overflow in the remote administration protocol processing in Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to cause a denial of service (crash) via a large string length argument, which triggers memory corruption.
|
2008-11-18
|
Metasploit
|
cpe:2.3:a:clientsoftware:wincome_mpd_total:*:*:*:*:*:*:*:*
|
CVE-2008-5161
| 0
| null | 0.03471
|
Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.
|
2008-11-19
|
Metasploit
|
cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.10:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.11:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4.9:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.1.1:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.0:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.1:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.2:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.0:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.5:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.6:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.7:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.3.8:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.4.0:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.4.1:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.4.2:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.5.0:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:5.5.1:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.0:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.1:*:ibm_zos:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ssh:tectia_server:6.0.4:*:linux_ibm_zos:*:*:*:*:*
|
CVE-2008-5191
| 0
| null | 0.55521
|
Multiple SQL injection vulnerabilities in SePortal 2.4 allow remote attackers to execute arbitrary SQL commands via the (1) poll_id parameter to poll.php and the (2) sp_id parameter to staticpages.php.
|
2008-11-21
|
Metasploit
|
cpe:2.3:a:seportal:seportal:2.4:*:*:*:*:*:*:*
|
CVE-2008-5281
| 0
| null | 0.05497
|
Heap-based buffer overflow in Titan FTP Server 6.05 build 550 allows remote attackers to execute arbitrary code via a long DELE command.
|
2008-11-29
|
Nuclei
|
cpe:2.3:a:south_river_technologies:titan_ftp_server:6.05:build_550:*:*:*:*:*:*
|
CVE-2008-5353
| 0
| null | 0.89187
|
The Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not properly enforce context of ZoneInfo objects during deserialization, which allows remote attackers to run untrusted applets and applications in a privileged context, as demonstrated by "deserializing Calendar objects".
|
2008-12-05
|
Metasploit
|
cpe:2.3:a:sun:jdk:*:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:*:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:6:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:6:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
|
CVE-2008-5405
| 0
| null | 0.82978
|
Stack-based buffer overflow in the RDP protocol password decoder in Cain & Abel 4.9.23 and 4.9.24, and possibly earlier, allows remote attackers to execute arbitrary code via an RDP file containing a long string.
|
2008-12-10
|
Metasploit
|
cpe:2.3:a:oxid:cain_and_abel:4.9.23:*:*:*:*:*:*:*;cpe:2.3:a:oxid:cain_and_abel:4.9.24:*:*:*:*:*:*:*
|
CVE-2008-5416
| 0
| null | 0.89069
|
Heap-based buffer overflow in Microsoft SQL Server 2000 SP4, 8.00.2050, 8.00.2039, and earlier; SQL Server 2000 Desktop Engine (MSDE 2000) SP4; SQL Server 2005 SP2 and 9.00.1399.06; SQL Server 2000 Desktop Engine (WMSDE) on Windows Server 2003 SP1 and SP2; and Windows Internal Database (WYukon) SP2 allows remote authenticated users to cause a denial of service (access violation exception) or execute arbitrary code by calling the sp_replwritetovarbin extended stored procedure with a set of invalid parameters that trigger memory overwrite, aka "SQL Server sp_replwritetovarbin Limited Memory Overwrite Vulnerability."
|
2008-12-10
|
Metasploit
|
cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2005:*:*:*:*:*:*:*
|
CVE-2008-5444
| 0
| null | 0.75864
|
Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2008-5448 and CVE-2008-5449.
|
2009-01-14
|
Metasploit
|
cpe:2.3:a:oracle:secure_backup:10.2.0.2:*:*:*:*:*:*:*
|
CVE-2008-5448
| 0
| null | 0.81775
|
Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2008-5444 and CVE-2008-5449.
|
2009-01-14
|
Metasploit
|
cpe:2.3:a:oracle:secure_backup:10.2.0.2:*:*:*:*:*:*:*
|
CVE-2008-5457
| 0
| null | 0.81836
|
Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
|
2009-01-14
|
Metasploit
|
cpe:2.3:a:oracle:bea_product_suite:10.0:mp1:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:10.3:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:7.0:sp7:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:9.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:9.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:*
|
CVE-2008-5492
| 0
| null | 0.70177
|
Heap-based buffer overflow in the PDFVIEW.PdfviewCtrl.1 ActiveX control in pdfview.ocx 2.0.0.1 in VeryDOC PDF Viewer OCX Control allows remote attackers to execute arbitrary code via a long first argument to the OpenPDF method. NOTE: some of these details are obtained from third party information.
|
2008-12-12
|
Metasploit
|
cpe:2.3:a:verypdf:verydoc_pdf_viewer:2.0.0.1:*:*:*:*:*:*:*
|
CVE-2008-5499
| 0
| null | 0.88589
|
Unspecified vulnerability in Adobe Flash Player for Linux 10.0.12.36, and 9.0.151.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file.
|
2008-12-18
|
Metasploit
|
cpe:2.3:a:adobe:flash_player_for_linux:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player_for_linux:10.0.12.36:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player_for_linux:9.0.115.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player_for_linux:9.0.124.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player_for_linux:9.0.31:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player_for_linux:9.0.48.0:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
|
CVE-2008-5587
| 0
| null | 0.01986
|
Directory traversal vulnerability in libraries/lib.inc.php in phpPgAdmin 4.2.1 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the _language parameter to index.php.
|
2008-12-16
|
Nuclei
|
cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:2.2:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.1:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*;cpe:2.3:a:phppgadmin:phppgadmin:4.1.1:*:*:*:*:*:*:*
|
CVE-2008-5626
| 0
| null | 0.79294
|
XM Easy Personal FTP Server 5.6.0 allows remote authenticated users to cause a denial of service via a crafted argument to the NLST command, as demonstrated by a -1 argument.
|
2008-12-17
|
Metasploit
|
cpe:2.3:a:dxmsoft:xm_easy_personal_ftp_server:5.6.0:*:*:*:*:*:*:*
|
CVE-2008-5664
| 0
| null | 0.78207
|
Stack-based buffer overflow in Realtek Media Player (aka Realtek Sound Manager, RtlRack, or rtlrack.exe) 1.15.0.0 allows remote attackers to execute arbitrary code via a crafted playlist (PLA) file.
|
2008-12-19
|
Metasploit
|
cpe:2.3:a:realtek:realtek_media_player:1.15.0.0:*:*:*:*:*:*:*
|
CVE-2008-5666
| 0
| null | 0.63292
|
WinFTP FTP Server 2.3.0, when passive (aka PASV) mode is used, allows remote authenticated users to cause a denial of service via a sequence of FTP sessions that include an invalid "NLST -1" command.
|
2008-12-19
|
Metasploit
|
cpe:2.3:a:wftpserver:winftp_ftp_server:2.3.0:*:*:*:*:*:*:*
|
CVE-2008-5711
| 0
| null | 0.55683
|
Heap-based buffer overflow in the Facebook PhotoUploader ActiveX control 5.0.14.0 and earlier allows remote attackers to execute arbitrary code via a long FileMask property value.
|
2008-12-24
|
Metasploit
|
cpe:2.3:a:facebook:photouploader:*:*:*:*:*:*:*:*;cpe:2.3:a:facebook:photouploader:4.5.57.0:*:*:*:*:*:*:*
|
CVE-2008-6080
| 0
| null | 0.063
|
Directory traversal vulnerability in download.php in the ionFiles (com_ionfiles) 4.4.2 component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
|
2009-02-06
|
Nuclei
|
cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
CVE-2008-6082
| 0
| null | 0.60799
|
Titan FTP Server 6.26 build 630 allows remote attackers to cause a denial of service (CPU consumption) via the SITE WHO command.
|
2009-02-06
|
Metasploit
|
cpe:2.3:a:southrivertech:titan_ftp_server:6.26:*:*:*:*:*:*:*
|
CVE-2008-6132
| 0
| null | 0.77652
|
Eval injection vulnerability in reserve.php in phpScheduleIt 1.2.10 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via the start_date parameter.
|
2009-02-13
|
Metasploit
|
cpe:2.3:a:brickhost:phpscheduleit:*:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.0.0rc1:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.0:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.0_rc1:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.0:beta:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.7:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.8:*:*:*:*:*:*:*;cpe:2.3:a:brickhost:phpscheduleit:1.2.9:*:*:*:*:*:*:*
|
CVE-2008-6172
| 0
| null | 0.07294
|
Directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter.
|
2009-02-19
|
Nuclei
|
cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*;cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
|
CVE-2008-6222
| 0
| null | 0.01649
|
Directory traversal vulnerability in the Pro Desk Support Center (com_pro_desk) component 1.0 and 1.2 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the include_file parameter to index.php.
|
2009-02-20
|
Nuclei
|
cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.2:*:*:*:*:*:*:*
|
CVE-2008-6465
| 0
| null | 0.01157
|
Multiple cross-site scripting (XSS) vulnerabilities in login.php in webshell4 in Parallels H-Sphere 3.0.0 P9 and 3.1 P1 allow remote attackers to inject arbitrary web script or HTML via the (1) err, (2) errorcode, and (3) login parameters.
|
2009-03-13
|
Nuclei
|
cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*;cpe:2.3:a:parallels:h-sphere:3.1:p1:*:*:*:*:*:*
|
CVE-2008-6508
| 0
| null | 0.72592
|
Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
|
2009-03-23
|
Metasploit
|
cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:2.6.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:2.6.2:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.3.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.4.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.4.3:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.4.4:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.4.5:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.5.0:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:igniterealtime:openfire:3.6.0:*:*:*:*:*:*:*
|
CVE-2008-6668
| 0
| null | 0.01077
|
Multiple directory traversal vulnerabilities in nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) id parameter to comm.php and (2) var_filename parameter to viewrq.php.
|
2009-04-08
|
Nuclei
|
cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*;cpe:2.3:a:dirk_bartley:nweb2fax:0.2:*:*:*:*:*:*:*
|
CVE-2008-6825
| 0
| null | 0.63298
|
Directory traversal vulnerability in user/index.php in Fonality trixbox CE 2.6.1 and earlier allows remote attackers to include and execute arbitrary files via a .. (dot dot) in the langChoice parameter.
|
2009-06-05
|
Metasploit
|
cpe:2.3:a:trixbox:trixbox:*:*:*:*:*:*:*:*;cpe:2.3:a:trixbox:trixbox:2.0:*:*:*:*:*:*:*;cpe:2.3:a:trixbox:trixbox:2.4.2.0:*:*:*:*:*:*:*
|
CVE-2008-6829
| 0
| null | 0.68325
|
VicFTPS 5.0 allows remote attackers to cause a denial of service (crash) via a LIST command that starts with a "/\/" (forward slash, backward slash, forward slash). NOTE: this might be the same issue as CVE-2008-2031.
|
2009-06-08
|
Metasploit
|
cpe:2.3:a:vicftps:vicftps:5.0:*:*:*:*:*:*:*
|
CVE-2008-6898
| 0
| null | 0.66182
|
Buffer overflow in the XHTTP Module 4.1.0.0 in the ActiveX control for SaschArt SasCam Webcam Server 2.6.5 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long argument to the Get method and other unspecified methods.
|
2009-08-05
|
Metasploit
|
cpe:2.3:a:saschart:sascam_webcam_server:2.6.5:*:*:*:*:*:*:*
|
CVE-2008-6938
| 0
| null | 0.73687
|
Pi3Web 2.0.3 before PL2, when installed on Windows as a desktop application and without using the Pi3Web/Conf/Intenet.pi3, allows remote attackers to cause a denial of service (crash or hang) and obtain the full pathname of the server via a request to a file in the ISAPI directory that is not an executable DLL, which triggers the crash when the DLL load fails, as demonstrated using Isapi\users.txt.
|
2009-08-11
|
Metasploit
|
cpe:2.3:a:holger_zimmermann:pi3web:*:*:*:*:*:*:*:*;cpe:2.3:a:holger_zimmermann:pi3web:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:holger_zimmermann:pi3web:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:holger_zimmermann:pi3web:2.0.2_beta_1:*:*:*:*:*:*:*;cpe:2.3:a:holger_zimmermann:pi3web:2.0:*:*:*:*:*:*:*
|
CVE-2008-6982
| 0
| null | 0.08587
|
Cross-site scripting (XSS) vulnerability in index.php in devalcms 1.4a allows remote attackers to inject arbitrary web script or HTML via the currentpath parameter.
|
2009-08-19
|
Nuclei
|
cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:*
|
CVE-2008-7232
| 0
| null | 0.55749
|
Buffer overflow in the report function in xtacacsd 4.1.2 and earlier allows remote attackers to execute arbitrary code via a crafted CONNECT TACACS command.
|
2009-09-14
|
Metasploit
|
cpe:2.3:a:netplex-tech:xtacacsd:*:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:2.0:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.0:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.1:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.2:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.3:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.4:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:3.5:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:4.0:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:netplex-tech:xtacacsd:4.1:*:*:*:*:*:*:*
|
CVE-2008-7269
| 0
| null | 0.00653
|
Open redirect vulnerability in api.php in SiteEngine 5.x allows user-assisted remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the forward parameter in a logout action.
|
2010-12-01
|
Nuclei
|
cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
|
CVE-2009-0075
| 0
| null | 0.84846
|
Microsoft Internet Explorer 7 does not properly handle errors during attempted access to deleted objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to CFunctionPointer and the appending of document objects, aka "Uninitialized Memory Corruption Vulnerability."
|
2009-02-10
|
Metasploit
|
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp1:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:*:professional:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:professional:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
|
CVE-2009-0133
| 0
| null | 0.70799
|
Buffer overflow in Microsoft HTML Help Workshop 4.74 and earlier allows context-dependent attackers to execute arbitrary code via a .hhp file with a long "Index file" field, possibly a related issue to CVE-2006-0564.
|
2009-01-15
|
Metasploit
|
cpe:2.3:a:microsoft:html_help_workshop:4.74:*:*:*:*:*:*:*
|
CVE-2009-0183
| 0
| null | 0.7952
|
Stack-based buffer overflow in Remote Control Server in Free Download Manager (FDM) 2.5 Build 758 and 3.0 Build 844 allows remote attackers to execute arbitrary code via a long Authorization header in an HTTP request.
|
2009-02-03
|
Metasploit
|
cpe:2.3:a:free_download_manager:free_download_manager:2.5:*:*:*:*:*:*:*;cpe:2.3:a:free_download_manager:free_download_manager:3.0:*:*:*:*:*:*:*
|
CVE-2009-0184
| 0
| null | 0.67534
|
Multiple buffer overflows in the torrent parsing implementation in Free Download Manager (FDM) 2.5 Build 758 and 3.0 Build 844 allow remote attackers to execute arbitrary code via (1) a long file name within a torrent file, (2) a long tracker URL in a torrent file, or (3) a long comment in a torrent file.
|
2009-02-03
|
Metasploit
|
cpe:2.3:a:free_download_manager:free_download_manager:2.5:*:*:*:*:*:*:*;cpe:2.3:a:free_download_manager:free_download_manager:3.0:*:*:*:*:*:*:*
|
CVE-2009-0187
| 0
| null | 0.75649
|
Stack-based buffer overflow in Orbit Downloader 2.8.2 and 2.8.3, and possibly other versions before 2.8.5, allows remote attackers to execute arbitrary code via a crafted HTTP URL with a long host name, which is not properly handled when constructing a "Connecting" log message.
|
2009-02-26
|
Metasploit
|
cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.2:*:*:*:*:*:*:*;cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.3:*:*:*:*:*:*:*;cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.4:*:*:*:*:*:*:*
|
CVE-2009-0215
| 0
| null | 0.61783
|
Stack-based buffer overflow in the GetXMLValue method in the IBM Access Support ActiveX control in IbmEgath.dll, as distributed on IBM and Lenovo computers, allows remote attackers to execute arbitrary code via unspecified vectors.
|
2009-03-25
|
Metasploit
|
cpe:2.3:a:ibm:access_support_activex_control:3.20.284.0:*:*:*:*:*:*:*
|
CVE-2009-0255
| 7.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| 0.05112
|
The System extension Install tool in TYPO3 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3 creates the encryption key with an insufficiently random seed, which makes it easier for attackers to crack the key.
|
2009-01-22
|
Metasploit
|
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
|
CVE-2009-0323
| 0
| null | 0.69816
|
Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 and 11.0 allow remote attackers to execute arbitrary code via (1) a long type parameter in an input tag, which is not properly handled by the EndOfXmlAttributeValue function; (2) an "HTML GI" in a start tag, which is not properly handled by the ProcessStartGI function; and unspecified vectors in (3) html2thot.c and (4) xml2thot.c, related to the msgBuffer variable. NOTE: these are different vectors than CVE-2008-6005.
|
2009-01-28
|
Metasploit
|
cpe:2.3:a:w3:amaya:*:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:0.95b:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:0.9:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.0a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.1a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.1c:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.2a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.3a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.3b:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:1.4a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:10.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:2.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:2.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:2.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:2.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:2.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:3.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:3.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:3.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.3.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:4.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:5.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:5.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:5.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:5.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:6.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:6.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:6.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:6.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:6.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:7.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:7.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:7.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.1a:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.1b:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.52:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.5:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.6:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.7.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.7.2:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.7:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.8.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.8.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.8.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:8.8.5:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.0:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.2.1:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.3:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.4:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.52:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.53:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.54:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.55:*:*:*:*:*:*:*;cpe:2.3:a:w3:amaya:9.5:*:*:*:*:*:*:*
|
CVE-2009-0347
| 0
| null | 0.03639
|
Open redirect vulnerability in cs.html in the Autonomy (formerly Verity) Ultraseek search engine allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.
|
2009-01-29
|
Nuclei
|
cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
|
CVE-2009-0476
| 0
| null | 0.83257
|
Stack-based buffer overflow in MultiMedia Soft AdjMmsEng.dll 7.11.1.0 and 7.11.2.7, as distributed in multiple MultiMedia Soft audio components for .NET, allows remote attackers to execute arbitrary code via a long string in a playlist (.pls) file, as originally reported for Euphonics Audio Player 1.0. NOTE: some of these details are obtained from third party information.
|
2009-02-08
|
Metasploit
|
cpe:2.3:a:multimediasoft:audio_dj_studio_for_.net:-:*:*:*:*:*:*:*;cpe:2.3:a:multimediasoft:audio_sound_editer_for_.net:-:*:*:*:*:*:*:*;cpe:2.3:a:multimediasoft:audio_sound_recorder_for_.net:-:*:*:*:*:*:*:*;cpe:2.3:a:multimediasoft:audio_sound_studio_for_.net:-:*:*:*:*:*:*:*;cpe:2.3:a:multimediasoft:audio_sound_suite_for_.net:-:*:*:*:*:*:*:*
|
CVE-2009-0545
| 0
| null | 0.93944
|
cgi-bin/kerbynet in ZeroShell 1.0beta11 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the type parameter in a NoAuthREQ x509List action.
|
2009-02-12
|
Metasploit/Nuclei
|
cpe:2.3:a:zeroshell:zeroshell:1.0:beta10:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta11:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta2:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta3:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta4:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta5:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta6:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta7:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta8:*:*:*:*:*:*;cpe:2.3:a:zeroshell:zeroshell:1.0:beta9:*:*:*:*:*:*
|
CVE-2009-0546
| 0
| null | 0.8017
|
Stack-based buffer overflow in NewsGator FeedDemon 2.7 and earlier allows user-assisted remote attackers to execute arbitrary code via a long text attribute in an outline element in a .opml file.
|
2009-02-12
|
Metasploit
|
cpe:2.3:a:newsgator:feeddemon:*:*:*:*:*:*:*:*;cpe:2.3:a:newsgator:feeddemon:2.0.0.24:*:*:*:*:*:*:*;cpe:2.3:a:newsgator:feeddemon:2.6.1.4:*:*:*:*:*:*:*;cpe:2.3:a:newsgator:feeddemon:2.6.1.5:*:*:*:*:*:*:*;cpe:2.3:a:newsgator:feeddemon:2.6:*:*:*:*:*:*:*
|
CVE-2009-0557
| 7.8
|
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| 0.83761
|
Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel Viewer 2003 SP3; Microsoft Office Excel Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Object Record Corruption Vulnerability."
|
2009-06-10
|
CISA
|
cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_excel_viewer:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_excel_viewer:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:open_xml_file_format_converter:-:*:*:*:*:macos:*:*
|
CVE-2009-0563
| 7.8
|
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| 0.80017
|
Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; Microsoft Office Word Viewer 2003 SP3; Microsoft Office Word Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a Word document with a crafted tag containing an invalid length field, aka "Word Buffer Overflow Vulnerability."
|
2009-06-10
|
CISA
|
cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_word_viewer:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:open_xml_file_format_converter:-:*:*:*:*:macos:*:*
|
CVE-2009-0580
| 0
| null | 0.84435
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
|
2009-06-05
|
Metasploit
|
cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.37:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.38:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.39:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*
|
CVE-2009-0658
| 7.8
|
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| 0.90801
|
Buffer overflow in Adobe Reader 9.0 and earlier, and Acrobat 9.0 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF document, related to a non-JavaScript function call and possibly an embedded JBIG2 image stream, as exploited in the wild in February 2009 by Trojan.Pidief.E.
|
2009-02-20
|
Metasploit
|
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
|
CVE-2009-0695
| 0
| null | 0.70615
|
hagent.exe in Wyse Device Manager (WDM) 4.7.x does not require authentication for commands, which allows remote attackers to obtain management access via a crafted query, as demonstrated by a V52 query that triggers a power-off action.
|
2012-06-19
|
Metasploit
|
cpe:2.3:a:dell:wyse_device_manager:4.7.0:*:*:*:*:*:*:*;cpe:2.3:a:dell:wyse_device_manager:4.7.1:*:*:*:*:*:*:*;cpe:2.3:a:dell:wyse_device_manager:4.7.2:*:*:*:*:*:*:*
|
CVE-2009-0815
| 0
| null | 0.498
|
The jumpUrl mechanism in class.tslib_fe.php in TYPO3 3.3.x through 3.8.x, 4.0 before 4.0.12, 4.1 before 4.1.10, 4.2 before 4.2.6, and 4.3alpha1 leaks a hash secret (juHash) in an error message, which allows remote attackers to read arbitrary files by including the hash in a request.
|
2009-03-05
|
Metasploit
|
cpe:2.3:a:typo3:typo3:3.3.x:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:3.5.x:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:3.6.x:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:3.7.x:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:3.8.x:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.0:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.4:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.6:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.7:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.8:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1.9:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.1:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.2:*:*:*:*:*:*:*;cpe:2.3:a:typo3:typo3:4.3:alpha1:*:*:*:*:*:*
|
CVE-2009-0836
| 0
| null | 0.1077
|
Foxit Reader 2.3 before Build 3902 and 3.0 before Build 1506, including 1120 and 1301, does not require user confirmation before performing dangerous actions defined in a PDF file, which allows remote attackers to execute arbitrary programs and have unspecified other impact via a crafted file, as demonstrated by the "Open/Execute a file" action.
|
2009-03-10
|
Metasploit
|
cpe:2.3:a:foxitsoftware:reader:2.3:*:*:*:*:*:*:*;cpe:2.3:a:foxitsoftware:reader:3.0:*:*:*:*:*:*:*
|
CVE-2009-0837
| 0
| null | 0.83223
|
Stack-based buffer overflow in Foxit Reader 3.0 before Build 1506, including 1120 and 1301, allows remote attackers to execute arbitrary code via a long (1) relative path or (2) absolute path in the filename argument in an action, as demonstrated by the "Open/Execute a file" action.
|
2009-03-10
|
Metasploit
|
cpe:2.3:a:foxit:reader3.0:*:*:*:*:*:*:*:*
|
CVE-2009-0880
| 0
| null | 0.63552
|
Directory traversal vulnerability in the CIM server in IBM Director before 5.20.3 Service Update 2 on Windows allows remote attackers to load and execute arbitrary local DLL code via a .. (dot dot) in a /CIMListener/ URI in an M-POST request.
|
2009-03-12
|
Metasploit
|
cpe:2.3:a:ibm:director:*:service_update_1:*:*:*:*:*:*;cpe:2.3:a:ibm:director:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.10:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.11:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.12:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.20:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.21:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:4.22:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.10.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.10.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.10.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.10.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.20.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.20.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:director:5.20.2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
|
CVE-2009-0884
| 0
| null | 0.01005
|
Buffer overflow in FileZilla Server before 0.9.31 allows remote attackers to cause a denial of service via unspecified vectors related to SSL/TLS packets.
|
2009-03-12
|
Nuclei
|
cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*
|
CVE-2009-0920
| 0
| null | 0.58773
|
Stack-based buffer overflow in OvCgi/Toolbar.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a long OvOSLocale cookie, a variant of CVE-2008-0067.
|
2009-03-25
|
Metasploit
|
cpe:2.3:a:hp:network_node_manager:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:network_node_manager:7.5.1:*:*:*:*:*:*:*;cpe:2.3:a:hp:network_node_manager:7.5.3:*:*:*:*:*:*:*
|
CVE-2009-0927
| 8.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| 0.93673
|
Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Collab object, a different vulnerability than CVE-2009-0658.
|
2009-03-19
|
Metasploit/CISA
|
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
|
CVE-2009-0932
| 0
| null | 0.05612
|
Directory traversal vulnerability in framework/Image/Image.php in Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.
|
2009-03-17
|
Nuclei
|
cpe:2.3:a:debian:horde:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde:3.3:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde_groupware:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde_groupware:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde_groupware:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:debian:horde_groupware:1.1.4:*:*:*:*:*:*:*
|
CVE-2009-0950
| 0
| null | 0.82109
|
Stack-based buffer overflow in Apple iTunes before 8.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an itms: URL with a long URL component after a colon.
|
2009-06-02
|
Metasploit
|
cpe:2.3:a:apple:itunes:*:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:*:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.3:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.3:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.3:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.4:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.4:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0.4:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:2.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:3.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:3.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.1.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.1.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2.72:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2.72:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.5.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.5.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.5:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.6.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.6.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.6:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1.30:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1.30:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.7:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.8.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.8.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.8:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.8:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.9.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.9.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.9:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:4.9:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:5.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.3:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.3:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.3:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.4:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.5:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.5:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0.5:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:6.0:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.0.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.1.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.2.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.2.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.3.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4.3:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.4:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.5.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.5.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.5:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.2:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.6:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.1:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:7.7:*:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.1:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0.2:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.0:-:windows:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:itunes:8.1:-:windows:*:*:*:*:*
|
CVE-2009-0978
| 0
| null | 0.49273
|
Unspecified vulnerability in the Workspace Manager component in Oracle Database 10.2.0.4 and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2009-0975.
|
2009-04-15
|
Metasploit
|
cpe:2.3:a:oracle:database_10g:10.2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_11g:11.1.0.6:*:*:*:*:*:*:*
|
CVE-2009-1028
| 0
| null | 0.67087
|
Stack-based buffer overflow in ediSys eZip Wizard 3.0 allows remote attackers to execute arbitrary code via a crafted .zip file.
|
2009-03-20
|
Metasploit
|
cpe:2.3:a:edisys:ezip_wizard:3.0:*:*:*:*:*:*:*
|
CVE-2009-1029
| 0
| null | 0.70342
|
Stack-based buffer overflow in POP Peeper 3.4.0.0 and earlier allows remote POP3 servers to execute arbitrary code via a long Date header, related to Imap.dll.
|
2009-03-20
|
Metasploit
|
cpe:2.3:a:poppeeper:pop_peeper:*:*:*:*:*:*:*:*;cpe:2.3:a:poppeeper:pop_peeper:2.4.3:*:*:*:*:*:*:*;cpe:2.3:a:poppeeper:pop_peeper:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:poppeeper:pop_peeper:3.0:*:*:*:*:*:*:*
|
CVE-2009-1122
| 0
| null | 0.92339
|
The WebDAV extension in Microsoft Internet Information Services (IIS) 5.0 on Windows 2000 SP4 does not properly decode URLs, which allows remote attackers to bypass authentication, and possibly read or create files, via a crafted HTTP request, aka "IIS 5.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1535.
|
2009-06-10
|
Metasploit
|
cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
|
CVE-2009-1123
| 7.8
|
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| 0.04516
|
The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Desktop Vulnerability."
|
2009-06-10
|
CISA
|
cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:-:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
|
CVE-2009-1136
| 0
| null | 0.85958
|
The Microsoft Office Web Components Spreadsheet ActiveX control (aka OWC10 or OWC11), as distributed in Office XP SP3 and Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 Gold and SP1, and Office Small Business Accounting 2006, when used in Internet Explorer, allows remote attackers to execute arbitrary code via a crafted call to the msDataSourceObject method, as exploited in the wild in July and August 2009, aka "Office Web Components HTML Script Vulnerability."
|
2009-07-15
|
Metasploit
|
cpe:2.3:a:microsoft:isa_server:2004:sp3:enterprise:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2004:sp3:standard:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2006:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2006:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2006:supportability:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:*:small_business_accounting_2006:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2003:sp1:2007_microsoft_office:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_xp:sp3:*:*:*:*:*:*:*
|
CVE-2009-1151
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.93032
|
Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.
|
2009-03-26
|
Metasploit/Nuclei/CISA
|
cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
|
CVE-2009-1185
| 0
| null | 0.8927
|
udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.
|
2009-04-17
|
Metasploit
|
cpe:2.3:a:juniper:ctpview:*:*:*:*:*:*:*:*;cpe:2.3:a:juniper:ctpview:7.1:-:*:*:*:*:*:*;cpe:2.3:a:juniper:ctpview:7.1:r1:*:*:*:*:*:*;cpe:2.3:a:juniper:ctpview:7.2:-:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*;cpe:2.3:a:udev_project:udev:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
|
CVE-2009-1260
| 0
| null | 0.74522
|
Multiple stack-based buffer overflows in UltraISO 9.3.3.2685 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted (1) CCD or (2) IMG file.
|
2009-04-07
|
Metasploit
|
cpe:2.3:a:ezbsystems:ultraiso:*:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:3.1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:3.1_sr1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:3.1_sr2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:4.0:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:4.1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:4.5:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:5.0:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:5.1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:5.55:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:5.55_sr-1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:5.55_sr-2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.0:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.51:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.52:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.52_sr-1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.52_sr-2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.56_sr-1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.56_sr-2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:6.5:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.0:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.1:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.21_sr-1:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.21_sr-2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.22_me:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.23:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.25:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.51:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.52:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.55:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.56:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.5:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.62:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.65:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.65_sr-2:*:*:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.66:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:7.6:-:me:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.12:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.2:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.51:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.61:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.62:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.63:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.65:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.66:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8.6:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:8:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.0:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.1.2:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.2:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.3.1:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.3.2:-:pe:*:*:*:*:*;cpe:2.3:a:ezbsystems:ultraiso:9.3:-:pe:*:*:*:*:*
|
CVE-2009-1350
| 0
| null | 0.75455
|
Unspecified vulnerability in xtagent.exe in Novell NetIdentity Client before 1.2.4 allows remote attackers to execute arbitrary code by establishing an IPC$ connection to the XTIERRPCPIPE named pipe, and sending RPC messages that trigger a dereference of an arbitrary pointer.
|
2009-04-21
|
Metasploit
|
cpe:2.3:a:novell:netidentity_client1.2.3:*:*:*:*:*:*:*:*
|
CVE-2009-1386
| 0
| null | 0.42628
|
ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
|
2009-06-04
|
Metasploit
|
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openssl:0.9.6-15:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openssl:0.9.6b-3:*:*:*:*:*:*:*;cpe:2.3:a:redhat:openssl:0.9.7a-2:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
|
CVE-2009-1394
| 0
| null | 0.49012
|
Stack-based buffer overflow in Motorola Timbuktu Pro 8.6.5 on Windows allows remote attackers to execute arbitrary code by sending a long malformed string over the PlughNTCommand named pipe.
|
2009-06-26
|
Metasploit
|
cpe:2.3:a:motorola:timbuktu_pro:8.6.5:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
|
CVE-2009-1429
| 0
| null | 0.911
|
The Intel LANDesk Common Base Agent (CBA) in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allows remote attackers to execute arbitrary commands via a crafted packet whose contents are interpreted as a command to be launched in a new process by the CreateProcessA function.
|
2009-04-29
|
Metasploit
|
cpe:2.3:a:symantec:antivirus:*:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:*:-:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:-:-:srv:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.3:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.4:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.5:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.6:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.7:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.8:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.9:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus_central_quarantine_server:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1001:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1009:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:endpoint_protection:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:system_center:*:*:*:*:*:*:*:*
|
CVE-2009-1430
| 0
| null | 0.60565
|
Multiple stack-based buffer overflows in IAO.EXE in the Intel Alert Originator Service in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allow remote attackers to execute arbitrary code via (1) a crafted packet or (2) data that ostensibly arrives from the MsgSys.exe process.
|
2009-04-29
|
Metasploit
|
cpe:2.3:a:symantec:antivirus:*:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:*:-:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:-:-:srv:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.3:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.4:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.5:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.6:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.7:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.8:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.9:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus_central_quarantine_server:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1001:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.1.1009:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:endpoint_protection:*:*:*:*:*:*:*:*;cpe:2.3:a:symantec:system_center:*:*:*:*:*:*:*:*
|
CVE-2009-1496
| 0
| null | 0.01473
|
Directory traversal vulnerability in the Cmi Marketplace (com_cmimarketplace) component 0.1 for Joomla! allows remote attackers to list arbitrary directories via a .. (dot dot) in the viewit parameter to index.php.
|
2009-05-01
|
Nuclei
|
cpe:2.3:a:ijobid:com_cmimarketplace:0.1:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
CVE-2009-1534
| 0
| null | 0.7543
|
Buffer overflow in the Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2000 Web Components SP3, Office XP Web Components SP3, BizTalk Server 2002, and Visual Studio .NET 2003 SP1 allows remote attackers to execute arbitrary code via crafted property values, aka "Office Web Components Buffer Overflow Vulnerability."
|
2009-08-12
|
Metasploit
|
cpe:2.3:a:microsoft:biztalk_server:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2004:sp3:enterprise:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2004:sp3:standard:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2006:sp1:enterprise:*:*:*:*:*;cpe:2.3:a:microsoft:isa_server:2006:sp1:standard:*:*:*:*:*;cpe:2.3:a:microsoft:office:-:*:small_business_accounting_2006:*:*:*:*:*;cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2003:sp1:2007_microsoft_office:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_web_components:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:visual_studio_.net:2003:sp1:*:*:*:*:*:*
|
CVE-2009-1535
| 0
| null | 0.91826
|
The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.0 allows remote attackers to bypass URI-based protection mechanisms, and list folders or read, create, or modify files, via a %c0%af (Unicode / character) at an arbitrary position in the URI, as demonstrated by inserting %c0%af into a "/protected/" initial pathname component to bypass the password protection on the protected\ folder, aka "IIS 5.1 and 6.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1122.
|
2009-06-10
|
Metasploit
|
cpe:2.3:a:microsoft:internet_information_services:5.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_services:6.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:-:*
|
CVE-2009-1558
| 0
| null | 0.10881
|
Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter.
|
2009-05-06
|
Nuclei
|
cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*;cpe:2.3:h:cisco:wvc54gca:1.00r24:*:*:*:*:*:*:*
|
CVE-2009-1568
| 0
| null | 0.61015
|
Stack-based buffer overflow in ienipp.ocx in Novell iPrint Client 5.30, and possibly other versions before 5.32, allows remote attackers to execute arbitrary code via a long target-frame parameter.
|
2009-12-08
|
Metasploit
|
cpe:2.3:a:novell:iprint_client:5.30:*:*:*:*:*:*:*;cpe:2.3:a:novell:iprint_client:5.31:*:*:*:*:*:*:*
|
CVE-2009-1569
| 0
| null | 0.65451
|
Multiple stack-based buffer overflows in Novell iPrint Client 4.38, 5.30, and possibly other versions before 5.32 allow remote attackers to execute arbitrary code via vectors related to (1) Date and (2) Time.
|
2009-12-08
|
Metasploit
|
cpe:2.3:a:novell:iprint:4.38:*:client:*:*:*:*:*;cpe:2.3:a:novell:iprint:5.30:*:client:*:*:*:*:*
|
CVE-2009-1612
| 0
| null | 0.68936
|
Stack-based buffer overflow in the MPS.StormPlayer.1 ActiveX control in mps.dll 3.9.4.27 in Baofeng Storm allows remote attackers to execute arbitrary code via a long argument to the OnBeforeVideoDownload method, as exploited in the wild in April and May 2009. NOTE: some of these details are obtained from third party information. NOTE: it was later reported that 3.09.04.17 and earlier are also affected.
|
2009-05-11
|
Metasploit
|
cpe:2.3:a:baofeng:storm:2.7.9_10:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:2.7.9_8:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:2.8:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:2.9:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:3.9.3_25:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:3.9.3_30:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:3.9.4_17:*:*:*:*:*:*:*;cpe:2.3:a:baofeng:storm:3.9.4_27:*:*:*:*:*:*:*
|
CVE-2009-1641
| 0
| null | 0.65931
|
Multiple stack-based buffer overflows in Mini-stream Ripper 3.0.1.1 allow remote attackers to execute arbitrary code via (1) a long rtsp URL in a .ram file and (2) a long string in the HREF attribute of a REF element in a .asx file.
|
2009-05-15
|
Metasploit
|
cpe:2.3:a:mini-stream:ripper:3.0.1.1:*:*:*:*:*:*:*
|
CVE-2009-1730
| 0
| null | 0.62305
|
Multiple directory traversal vulnerabilities in NetMechanica NetDecision TFTP Server 4.2 allow remote attackers to read or modify arbitrary files via directory traversal sequences in the (1) GET or (2) PUT command.
|
2009-05-20
|
Metasploit
|
cpe:2.3:a:netmechanica:netdecision_tftp_server:4.2:*:*:*:*:*:*:*
|
CVE-2009-1831
| 0
| null | 0.81169
|
The Nullsoft Modern Skins Support module (gen_ff.dll) in Nullsoft Winamp before 5.552 allows remote attackers to execute arbitrary code via a crafted MAKI file, which triggers an incorrect sign extension, an integer overflow, and a stack-based buffer overflow.
|
2009-05-29
|
Metasploit
|
cpe:2.3:a:nullsoft:winamp:*:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.0:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.10:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.24:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.4:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.50:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.5e:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.60:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.60:*:full:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.60:*:lite:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.61:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.61:*:full:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.62:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.62:*:standard:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.64:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.64:*:standard:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.65:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.6x:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.70:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.70:*:full:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.71:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.72:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.73:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.73:*:full:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.74:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.75:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.76:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.77:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.78:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.79:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.7x:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.80:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.81:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.90:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.91:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:2.95:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:3.0:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:3.1:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.01:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.02:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.03:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.03a:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.04:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.05:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.06:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.07:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08:c:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08:d:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08:e:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08c:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08d:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.08e:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.091:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.093:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.094:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.09:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.0:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.111:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.112:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.11:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.12:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.13:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.1:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.21:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.22:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.23:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.24:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.2:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.31:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.32:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.33:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.34:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.35:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.36:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.3:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.51:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.52:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.53:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.541:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.54:*:*:*:*:*:*:*;cpe:2.3:a:nullsoft:winamp:5.5:*:*:*:*:*:*:*
|
CVE-2009-1862
| 7.8
|
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| 0.57995
|
Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009.
|
2009-07-23
|
CISA
|
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
|
CVE-2009-1872
| 0
| null | 0.12
|
Multiple cross-site scripting (XSS) vulnerabilities in Adobe ColdFusion Server 8.0.1, 8, and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the startRow parameter to administrator/logviewer/searchlog.cfm, or the query string to (2) wizards/common/_logintowizard.cfm, (3) wizards/common/_authenticatewizarduser.cfm, or (4) administrator/enter.cfm.
|
2009-08-18
|
Nuclei
|
cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.0:*:enterprise_multi-server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.0:*:enterprise_server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.0:*:linux:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.0:*:solaris:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.1:*:enterprise_multi-server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.1:*:enterprise_server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.1:*:linux:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:6.1:*:solaris:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0:*:enterprise_multi-server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0:*:enterprise_server:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0:*:linux:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0:*:solaris:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.2:unknown:mx:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:8.1:*:*:*:*:*:*:*
|
CVE-2009-1943
| 0
| null | 0.64247
|
Stack-based buffer overflow in the IKE service (ireIke.exe) in SafeNet SoftRemote before 10.8.6 allows remote attackers to execute arbitrary code via a long request to UDP port 62514.
|
2009-06-05
|
Metasploit
|
cpe:2.3:a:safenet-inc:softremote1.4:*:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:*:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.7.7:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.7.7:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.0:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.1:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.2:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.3:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:8.0:*:*:*:*:*:*:*
|
CVE-2009-1977
| 0
| null | 0.85139
|
Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the July 2009 Oracle CPU. Oracle has not commented on claims from an independent researcher that this vulnerability allows attackers to bypass authentication via unknown vectors involving the username parameter and login.php.
|
2009-07-14
|
Metasploit
|
cpe:2.3:a:oracle:secure_backup:10.2.0.3:*:*:*:*:*:*:*
|
CVE-2009-1978
| 0
| null | 0.8526
|
Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the July 2009 Oracle CPU. Oracle has not commented on claims from an independent researcher that this vulnerability allows remote authenticated users to execute arbitrary code with SYSTEM privileges via vectors involving property_box.php.
|
2009-07-14
|
Metasploit
|
cpe:2.3:a:oracle:secure_backup:10.2.0.3:*:*:*:*:*:*:*
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.