CVE
stringlengths
13
16
CVSS Score
float64
0
10
CVSS_Vector
stringclasses
257 values
EPSS
float64
0
0.95
Description
stringlengths
28
3.79k
Published
stringdate
1990-08-14 00:00:00
2025-10-05 00:00:00
Source
stringclasses
7 values
CPE
stringlengths
33
51k
CVE-2009-1979
0
null
0.85749
Unspecified vulnerability in the Network Authentication component in Oracle Database 10.1.0.5 and 10.2.0.4 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2009 CPU. Oracle has not commented on claims from an independent researcher that this is related to improper validation of the AUTH_SESSKEY parameter length that leads to arbitrary code execution.
2009-10-22
Metasploit
cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*
CVE-2009-2011
0
null
0.74194
Worldweaver DX Studio Player 3.0.29.0, 3.0.22.0, 3.0.12.0, and probably other versions before 3.0.29.1, when used as a plug-in for Firefox, does not restrict access to the shell.execute JavaScript API method, which allows remote attackers to execute arbitrary commands via a .dxstudio file that invokes this method.
2009-06-16
Metasploit
cpe:2.3:a:dxstudio:dx_studio_player:*:*:*:*:*:*:*:*;cpe:2.3:a:dxstudio:dx_studio_player:3.0.12.0:*:*:*:*:*:*:*;cpe:2.3:a:dxstudio:dx_studio_player:3.0.22.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
CVE-2009-2015
0
null
0.01674
Directory traversal vulnerability in includes/file_includer.php in the Ideal MooFAQ (com_moofaq) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
2009-06-09
Nuclei
cpe:2.3:a:ideal:com_moofaq:1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
CVE-2009-2055
0
null
0.01238
Cisco IOS XR 3.4.0 through 3.8.1 allows remote attackers to cause a denial of service (session reset) via a BGP UPDATE message with an invalid attribute, as demonstrated in the wild on 17 August 2009.
2009-08-19
CISA
cpe:2.3:o:cisco:ios_xr:3.4.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.4.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.4.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.4.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.5.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.5.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.5.4:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.6.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.6.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.6.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.6.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.7.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.7.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.7.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.7.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.8.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios_xr:3.8.1:*:*:*:*:*:*:*
CVE-2009-2100
0
null
0.01877
Directory traversal vulnerability in the JoomlaPraise Projectfork (com_projectfork) component 2.0.10 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the section parameter to index.php.
2009-06-17
Nuclei
cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlapraise:com_projectfork:2.0.10:*:*:*:*:*:*:*
CVE-2009-2227
0
null
0.75031
Stack-based buffer overflow in B Labs Bopup Communication Server 3.2.26.5460 allows remote attackers to execute arbitrary code via a crafted request to TCP port 19810.
2009-06-26
Metasploit
cpe:2.3:a:blabsoft:bopup_communication_server:3.2.26.5460:*:*:*:*:*:*:*
CVE-2009-2261
0
null
0.70587
PeaZIP 2.6.1, 2.5.1, and earlier on Windows allows user-assisted remote attackers to execute arbitrary commands via a .zip archive with a .txt file whose name contains | (pipe) characters and a command.
2009-06-30
Metasploit
cpe:2.3:a:giorgio_tani:peazip:*:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.0:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.10:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.11:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.1:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.2:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.3:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.4:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.5:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.6:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.7:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.8.1:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.8.2:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.8:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.9.1:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.9.2:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.9.3:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:1.9:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:2.0:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:2.1:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:2.2:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:2.3a:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:2.4.1:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:2.4:-:windows:*:*:*:*:*;cpe:2.3:a:giorgio_tani:peazip:2.6.1:-:windows:*:*:*:*:*
CVE-2009-2265
0
null
0.92974
Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4.1 allow remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecified connector modules, as exploited in the wild for remote code execution in July 2009, related to the file browser and the editor/filemanager/connectors/ directory.
2009-07-05
Metasploit
cpe:2.3:a:fckeditor:fckeditor:*:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.0:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.0_fc:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.0_rc2:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.0rc2:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.0rc3:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.1:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.2:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.3.2:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.3.3:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.3:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.3:beta:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.4.1:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.4.2:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.4.3:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.4:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.5:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.5:beta:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.6.2:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.6.3:*:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.6.3:beta:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.6.4:beta:*:*:*:*:*:*;cpe:2.3:a:fckeditor:fckeditor:2.6:*:*:*:*:*:*:*
CVE-2009-2288
0
null
0.933
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
2009-07-01
Metasploit
cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:1.0:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:1.0b1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:1.0b2:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:1.0b4:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:1.1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:2.0:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:2.0b4:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:2.10:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:2.7:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*;cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:*
CVE-2009-2335
0
null
0.85338
WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience."
2009-07-10
Metasploit
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*
CVE-2009-2367
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.32334
cgi-bin/makecgi-pro in Iomega StorCenter Pro generates predictable session IDs, which allows remote attackers to hijack active sessions and gain privileges via brute force guessing attacks on the session_id parameter.
2009-07-08
Metasploit
cpe:2.3:h:iomega:storcenter_pro:-:*:*:*:*:*:*:*;cpe:2.3:o:iomega:storcenter_pro_firmware:-:*:*:*:*:*:*:*
CVE-2009-2477
0
null
0.83034
js/src/jstracer.cpp in the Just-in-time (JIT) JavaScript compiler (aka TraceMonkey) in Mozilla Firefox 3.5 before 3.5.1 allows remote attackers to execute arbitrary code via certain use of the escape function that triggers access to uninitialized memory locations, as originally demonstrated by a document containing P and FONT elements.
2009-07-15
Metasploit
cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*
CVE-2009-2484
0
null
0.68591
Stack-based buffer overflow in the Win32AddConnection function in modules/access/smb.c in VideoLAN VLC media player 0.9.9, when running on Microsoft Windows, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long smb URI in a playlist file.
2009-07-16
Metasploit
cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
CVE-2009-2485
0
null
0.80024
Stack-based buffer overflow in HT-MP3Player 1.0 allows remote attackers to execute arbitrary code via a long string in a .ht3 file.
2009-07-16
Metasploit
cpe:2.3:a:tingan:ht-mp3player:1.0:*:*:*:*:*:*:*
CVE-2009-2514
0
null
0.80209
win32k.sys in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not correctly parse font code during construction of a directory-entry table, which allows remote attackers to execute arbitrary code via a crafted Embedded OpenType (EOT) font, aka "Win32k EOT Parsing Vulnerability."
2009-11-11
Metasploit
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:gold:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
CVE-2009-2521
0
null
0.60775
Stack consumption vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows remote authenticated users to cause a denial of service (daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka "IIS FTP Service DoS Vulnerability."
2009-09-04
Metasploit
cpe:2.3:a:microsoft:internet_information_services:*:*:*:*:*:*:*:*
CVE-2009-2566
0
null
0.63261
Stack-based buffer overflow in TFM MMPlayer 2.0, and possibly 2.0.0.30, allows remote attackers to execute arbitrary code via a long string in a playlist (.m3u) file.
2009-07-21
Metasploit
cpe:2.3:a:tfm:mmplayer:2.0:*:*:*:*:*:*:*
CVE-2009-2650
0
null
0.61668
Heap-based buffer overflow in Sorcerer Software MultiMedia Jukebox 4.0 Build 020124 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted (1) .m3u or possibly (2) .pst file.
2009-07-30
Metasploit
cpe:2.3:a:sorcerersoftware:multimedia_jukebox:4.0:*:*:*:*:*:*:*
CVE-2009-2685
0
null
0.76735
Stack-based buffer overflow in the login form in the management web server in HP Power Manager allows remote attackers to execute arbitrary code via the Login variable.
2009-11-06
Metasploit
cpe:2.3:a:hp:power_manager:*:*:*:*:*:*:*:*
CVE-2009-2692
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.1838
The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
2009-08-14
Metasploit
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*;cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_real_time:10:*:*:*:*:*:*:*
CVE-2009-2727
0
null
0.7763
Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 through 5.3.10, and 6.1.0 through 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote attackers to execute arbitrary code via a long XDR-encoded ASCII string to remote procedure 15.
2009-08-10
Metasploit
cpe:2.3:o:ibm:aix:5.2.0.50:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2.0.54:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2.0:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2_l:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.0:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.10:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.7:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.8:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.9:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1.0:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*
CVE-2009-2765
0
null
0.92013
httpd.c in httpd in the management GUI in DD-WRT 24 sp1, and other versions before build 12533, allows remote attackers to execute arbitrary commands via shell metacharacters in a request to a cgi-bin/ URI.
2009-08-14
Metasploit
cpe:2.3:a:dd-wrt:dd-wrt:*:sp1:*:*:*:*:*:*
CVE-2009-2936
0
null
0.6839
The Command Line Interface (aka Server CLI or administration interface) in the master process in the reverse proxy server in Varnish before 2.1.0 does not require authentication for commands received through a TCP port, which allows remote attackers to (1) execute arbitrary code via a vcl.inline directive that provides a VCL configuration file containing inline C code; (2) change the ownership of the master process via param.set, stop, and start directives; (3) read the initial line of an arbitrary file via a vcl.load directive; or (4) conduct cross-site request forgery (CSRF) attacks that leverage a victim's location on a trusted network and improper input validation of directives. NOTE: the vendor disputes this report, saying that it is "fundamentally misguided and pointless.
2010-04-05
Metasploit
cpe:2.3:a:varnish.projects.linpro:varnish:0.9.1:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:0.9:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.0:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:1.1:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0:*:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0:beta1:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0:beta2:*:*:*:*:*:*;cpe:2.3:a:varnish.projects.linpro:varnish:2.0:rc1:*:*:*:*:*:*
CVE-2009-2990
0
null
0.87912
Array index error in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow attackers to execute arbitrary code via unspecified vectors.
2009-10-19
Metasploit
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
CVE-2009-3023
0
null
0.77219
Buffer overflow in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 6.0 allows remote authenticated users to execute arbitrary code via a crafted NLST (NAME LIST) command that uses wildcards, leading to memory corruption, aka "IIS FTP Service RCE and DoS Vulnerability."
2009-08-31
Metasploit
cpe:2.3:a:microsoft:internet_information_server:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x86:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:-:*:x86:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:-:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:-:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
CVE-2009-3028
0
null
0.72029
The Altiris eXpress NS SC Download ActiveX control in AeXNSPkgDLLib.dll, as used in Symantec Altiris Deployment Solution 6.9.x, Notification Server 6.0.x, and Symantec Management Platform 7.0.x exposes an unsafe method, which allows remote attackers to force the download of arbitrary files and possibly execute arbitrary code via the DownloadAndInstall method.
2011-03-07
Metasploit
cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp2:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp3:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp4:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp1_hf12:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp2:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r10:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r11:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r12:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r13:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r2:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r3:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r4:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r5:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r6:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r7:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r8:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r9:*:*:*:*:*:*;cpe:2.3:a:symantec:management_platform:7.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:management_platform:7.0:rc5:*:*:*:*:*:*;cpe:2.3:a:symantec:management_platform:7.0:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:management_platform:7.0:sp2:*:*:*:*:*:*;cpe:2.3:a:symantec:management_platform:7.0:sp3:*:*:*:*:*:*;cpe:2.3:a:symantec:management_platform:7.0:sp4:*:*:*:*:*:*;cpe:2.3:a:symantec:management_platform:7.0:sp5:*:*:*:*:*:*
CVE-2009-3031
0
null
0.76853
Stack-based buffer overflow in the BrowseAndSaveFile method in the Altiris eXpress NS ConsoleUtilities ActiveX control 6.0.0.1846 in AeXNSConsoleUtilities.dll in Symantec Altiris Notification Server (NS) 6.0 before R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution 6.9 SP3, and Symantec Management Platform (SMP) 7.0 before SP3 allows remote attackers to execute arbitrary code via a long string in the second argument.
2009-11-03
Metasploit
cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp2:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp3:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_management_platform:7.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_management_platform:7.0:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:*:sp1:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp2:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r7:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:7.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:7.0:sp3:*:*:*:*:*:*
CVE-2009-3033
0
null
0.72538
Buffer overflow in the RunCmd method in the Altiris eXpress NS Console Utilities ActiveX control in AeXNSConsoleUtilities.dll in the web console in Symantec Altiris Deployment Solution 6.9.x, Altiris Notification Server 6.0.x, and Management Platform 7.0.x allows remote attackers to execute arbitrary code via a long string in the second argument.
2009-11-25
Metasploit
cpe:2.3:a:symantec:altiris_deployment_solution:6.9.164:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9.176:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9.355:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9.355:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp2:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp3:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_management_platform:7.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_management_platform:7.0:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp2:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r7:*:*:*:*:*:*;cpe:2.3:a:symantec:altiris_notification_server:6.0_sp3:*:*:*:*:*:*:*
CVE-2009-3053
0
null
0.01573
Directory traversal vulnerability in the Agora (com_agora) component 3.0.0b for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action parameter to the avatars page, reachable through index.php.
2009-09-03
Nuclei
cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*;cpe:2.3:a:jvitals:com_agora:3.0.0b:*:*:*:*:*:*:*
CVE-2009-3068
0
null
0.90721
Unrestricted file upload vulnerability in the RoboHelpServer Servlet (robohelp/server) in Adobe RoboHelp Server 8 allows remote attackers to execute arbitrary code by uploading a Java Archive (.jsp) file during a PUBLISH action, then accessing it via a direct request to the file in the robohelp/robo/reserved/web directory under its sessionid subdirectory, as demonstrated by the vd_adobe module in VulnDisco Pack Professional 8.7 through 8.11.
2009-09-04
Metasploit
cpe:2.3:a:adobe:robohelp_server:8:*:*:*:*:*:*:*
CVE-2009-3103
0
null
0.92944
Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka "SMBv2 Negotiation Vulnerability." NOTE: some of these details are obtained from third party information.
2009-09-08
Metasploit
cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:sp2:x32:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:sp2:x64:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
CVE-2009-3129
7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.91029
Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset, aka "Excel Featheader Record Memory Corruption Vulnerability."
2009-11-11
Metasploit/CISA
cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel_viewer:-:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel_viewer:-:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:excel_viewer:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*;cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:*:*:*:macos:*:*
CVE-2009-3214
0
null
0.64782
Multiple stack-based buffer overflows in Photodex ProShow Gold 4.0.2549 allow remote attackers to execute arbitrary code via a crafted Slideshow project (.psh) file, related to the (1) cell[n].images[m].image and (2) cell[n].sound.file fields.
2009-09-16
Metasploit
cpe:2.3:a:photodex:proshow_gold:4.0.2549:*:*:*:*:*:*:*
CVE-2009-3318
0
null
0.01442
Directory traversal vulnerability in the Roland Breedveld Album (com_album) component 1.14 for Joomla! allows remote attackers to access arbitrary directories and have unspecified other impact via a .. (dot dot) in the target parameter to index.php.
2009-09-23
Nuclei
cpe:2.3:a:breedveld:com_album:1.14:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
CVE-2009-3429
0
null
0.7195
Stack-based buffer overflow in Pirate Radio Destiny Media Player 1.61 allows remote attackers to execute arbitrary code via a long string in a .pls playlist file.
2009-09-25
Metasploit
cpe:2.3:a:pirateradio:destiny_media_player:1.61:*:*:*:*:*:*:*
CVE-2009-3459
0
null
0.88364
Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.
2009-10-13
Metasploit
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:3.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:4.0.5a:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:4.0.5c:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:4.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:4.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:5.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:6.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.0.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.0.7:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.0.8:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.0.9:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:8.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:8.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:8.1.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:8.1.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:9.1.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:reader:9.1:*:*:*:*:*:*:*
CVE-2009-3548
0
null
0.88353
The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.
2009-11-12
Metasploit
cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.37:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.38:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.39:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*
CVE-2009-3563
0
null
0.86927
ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
2009-12-09
Metasploit
cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.72:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.73:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.90:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.91:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.92:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.93:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.94:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.95:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.96:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.97:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.98:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.0.99:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.2p1:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.2p2:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.2p3:*:*:*:*:*:*:*;cpe:2.3:a:ntp:ntp:4.2.5:*:*:*:*:*:*:*
CVE-2009-3591
0
null
0.71287
Dopewars 1.5.12 allows remote attackers to cause a denial of service (segmentation fault) via a REQUESTJET message with an invalid location.
2009-10-08
Metasploit
cpe:2.3:a:ben_webb:dopewars:1.5.12:*:*:*:*:*:*:*
CVE-2009-3672
0
null
0.79013
Microsoft Internet Explorer 6 and 7 does not properly handle objects in memory that (1) were not properly initialized or (2) are deleted, which allows remote attackers to execute arbitrary code via vectors involving a call to the getElementsByTagName method for the STYLE tag name, selection of the single element in the returned list, and a change to the outerHTML property of this element, related to Cascading Style Sheets (CSS) and mshtml.dll, aka "HTML Object Memory Corruption Vulnerability." NOTE: some of these details are obtained from third party information. NOTE: this issue was originally assigned CVE-2009-4054, but Microsoft assigned a duplicate identifier of CVE-2009-3672. CVE consumers should use this identifier instead of CVE-2009-4054.
2009-12-02
Metasploit
cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
CVE-2009-3693
0
null
0.71508
Directory traversal vulnerability in the Persits.XUpload.2 ActiveX control (XUpload.ocx) in HP LoadRunner 9.5 allows remote attackers to create arbitrary files via \.. (backwards slash dot dot) sequences in the third argument to the MakeHttpRequest method.
2009-10-13
Metasploit
cpe:2.3:a:hp:loadrunner:9.5:*:*:*:*:*:*:*;cpe:2.3:a:persits:xupload:2.0:*:*:*:*:*:*:*
CVE-2009-3699
0
null
0.78892
Stack-based buffer overflow in libcsa.a (aka the calendar daemon library) in IBM AIX 5.x through 5.3.10 and 6.x through 6.1.3, and VIOS 2.1 and earlier, allows remote attackers to execute arbitrary code via a long XDR string in the first argument to procedure 21 of rpc.cmsd.
2009-10-15
Metasploit
cpe:2.3:a:ibm:vios:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:1.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:vios:1.5.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.1.0.10:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.1l:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2.0.50:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2.0.54:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2.0:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2_l:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.0.20:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.0:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.10:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.7:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.8:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3.9:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3:sp6:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3_l:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.3_ml03:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5l:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1.0:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*
CVE-2009-3711
0
null
0.78944
Stack-based buffer overflow in the h_handlepeer function in http.cpp in httpdx 1.4, and possibly 1.4.3, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP GET request.
2009-10-16
Metasploit
cpe:2.3:a:jasper:httpdx:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:jasper:httpdx:1.4:*:*:*:*:*:*:*
CVE-2009-3733
0
null
0.9006
Directory traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5 allows remote attackers to read arbitrary files via unspecified vectors.
2009-11-02
Metasploit
cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*;cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.1_build_29996:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.4_build_56528:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
CVE-2009-3837
0
null
0.75174
Stack-based buffer overflow in Eureka Email 2.2q allows remote POP3 servers to execute arbitrary code via a long error message.
2009-11-02
Metasploit
cpe:2.3:a:eureka-email:eureka_email:2.2q:*:*:*:*:*:*:*
CVE-2009-3843
0
null
0.86831
HP Operations Manager 8.10 on Windows contains a "hidden account" in the XML file that specifies Tomcat users, which allows remote attackers to conduct unrestricted file upload attacks, and thereby execute arbitrary code, by using the org.apache.catalina.manager.HTMLManagerServlet class to make requests to manager/html/upload.
2009-11-24
Metasploit
cpe:2.3:a:hp:operations_manager:8.10:*:windows:*:*:*:*:*
CVE-2009-3844
0
null
0.66265
Stack-based buffer overflow in the OmniInet process in HP OpenView Data Protector Application Recovery Manager 5.50 and 6.0 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted MSG_PROTOCOL packet.
2009-12-08
Metasploit
cpe:2.3:a:hp:openview_data_protector_application_recovery_manager:5.50:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_data_protector_application_recovery_manager:6.0:*:*:*:*:*:*:*
CVE-2009-3849
0
null
0.83371
Multiple stack-based buffer overflows in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allow remote attackers to execute arbitrary code via (1) a long Template parameter to nnmRptConfig.exe, related to the strcat function; or (2) a long Oid parameter to snmp.exe.
2009-12-10
Metasploit
cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:hp_ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*
CVE-2009-3853
0
null
0.7393
Stack-based buffer overflow in the client acceptor daemon (CAD) scheduler in the client in IBM Tivoli Storage Manager (TSM) 5.3 before 5.3.6.7, 5.4 before 5.4.3, 5.5 before 5.5.2.2, and 6.1 before 6.1.0.2, and TSM Express 5.3.3.0 through 5.3.6.6, allows remote attackers to execute arbitrary code via crafted data in a TCP packet.
2009-11-04
Metasploit
cpe:2.3:a:ibm:tivoli_storage_manager:5.2.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.3:*:express:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.4:*:express:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.5:*:express:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.6:*:express:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6:*:express:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.4.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_storage_manager:6.1.0:*:*:*:*:*:*:*
CVE-2009-3861
0
null
0.06573
Stack-based buffer overflow in SafeNet SoftRemote 10.8.5 (Build 2) and 10.3.5 (Build 6), and possibly other versions before 10.8.9, allows local users to execute arbitrary code via a long string in a (1) TREENAME or (2) GROUPNAME Policy file (spd).
2009-11-04
Metasploit
cpe:2.3:a:safenet-inc:softremote:*:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.7.7:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.8.1:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:1.9.0:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.3.5:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.7.7:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.0:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.1:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.2:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.3:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.4:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.5:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.6:*:*:*:*:*:*:*;cpe:2.3:a:safenet-inc:softremote:10.8.7:*:*:*:*:*:*:*
CVE-2009-3867
0
null
0.88695
Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
2009-11-05
Metasploit
cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_01a:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*
CVE-2009-3869
0
null
0.77101
Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.
2009-11-05
Metasploit
cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_01a:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.3.1_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.3.1_9:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*;cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*
CVE-2009-3953
8.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.90514
The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF document, related to a CLODProgressiveMeshDeclaration "array boundary issue," a different vulnerability than CVE-2009-2994.
2010-01-13
Metasploit/CISA
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:10.0:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*
CVE-2009-3960
6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
0.86265
Unspecified vulnerability in BlazeDS 3.2 and earlier, as used in LiveCycle 8.0.1, 8.2.1, and 9.0, LiveCycle Data Services 2.5.1, 2.6.1, and 3.0, Flex Data Services 2.0.1, and ColdFusion 7.0.2, 8.0, 8.0.1, and 9.0, allows remote attackers to obtain sensitive information via vectors that are associated with a request, and related to injected tags and external entity references in XML documents.
2010-02-15
Metasploit/CISA
cpe:2.3:a:adobe:blazeds:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:coldfusion:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flex_data_services:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:livecycle:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:livecycle:8.2.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:livecycle:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:livecycle_data_services:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:livecycle_data_services:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:livecycle_data_services:3.0:*:*:*:*:*:*:*
CVE-2009-3976
0
null
0.64448
Buffer overflow in Labtam ProFTP 2.9 allows remote FTP servers to cause a denial of service (application crash) or execute arbitrary code via a long 220 reply (aka connection greeting or welcome message).
2009-11-18
Metasploit
cpe:2.3:a:labtam-inc:proftp:2.9:*:*:*:*:*:*:*
CVE-2009-3999
0
null
0.699
Stack-based buffer overflow in goform/formExportDataLogs in HP Power Manager before 4.2.10 allows remote attackers to execute arbitrary code via a long fileName parameter.
2010-01-20
Metasploit
cpe:2.3:a:hp:power_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:hp:power_manager:4.2.5:*:*:*:*:*:*:*;cpe:2.3:a:hp:power_manager:4.2.6:*:*:*:*:*:*:*
CVE-2009-4006
0
null
0.7787
Stack-based buffer overflow in the TEA decoding algorithm in RhinoSoft Serv-U FTP server 7.0.0.1, 9.0.0.5, and other versions before 9.1.0.0 allows remote attackers to execute arbitrary code via a long hexadecimal string.
2009-11-20
Metasploit
cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:7.4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:8.2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:9.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:9.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:9.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:solarwinds:serv-u_file_server:9.1.0.0:*:*:*:*:*:*:*
CVE-2009-4098
0
null
0.50581
Unrestricted file upload vulnerability in banner-edit.php in OpenX adserver 2.8.1 and earlier allows remote authenticated users with banner / file upload permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an images directory.
2009-11-29
Metasploit
cpe:2.3:a:openx:openx:*:*:*:*:*:*:*:*;cpe:2.3:a:openx:openx:2.4:*:*:*:*:*:*:*;cpe:2.3:a:openx:openx:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:openx:openx:2.6.3:*:*:*:*:*:*:*;cpe:2.3:a:openx:openx:2.8:*:*:*:*:*:*:*
CVE-2009-4140
0
null
0.91085
Unrestricted file upload vulnerability in ofc_upload_image.php in Open Flash Chart v2 Beta 1 through v2 Lug Wyrm Charmer, as used in Piwik 0.2.35 through 0.4.3, Woopra Analytics Plugin before 1.4.3.2, and possibly other products, when register_globals is enabled, allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension through the name parameter with the code in the HTTP_RAW_POST_DATA parameter, then accessing it via a direct request to the file in tmp-upload-images/.
2009-12-22
Metasploit
cpe:2.3:a:matomo:matomo:0.2.37:*:*:*:*:*:*:*;cpe:2.3:a:matomo:matomo:0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:matomo:matomo:0.4.3:*:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:gamera:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:hyperion:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:ichor:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:j_rmungandr-2:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:j_rmungandr:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:kvasir:*:*:*:*:*:*;cpe:2.3:a:teethgrinder.co.uk:open_flash_chart:2.0:lug_wyrm_charmer:*:*:*:*:*:*
CVE-2009-4146
0
null
0.1817
The _rtld function in the Run-Time Link-Editor (rtld) in libexec/rtld-elf/rtld.c in FreeBSD 7.1, 7.2, and 8.0 does not clear the LD_PRELOAD environment variable, which allows local users to gain privileges by executing a setuid or setguid program with a modified LD_PRELOAD variable containing an untrusted search path that points to a Trojan horse library, a different vector than CVE-2009-4147.
2009-12-02
Metasploit
cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:7.2:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:8.0:*:*:*:*:*:*:*
CVE-2009-4147
0
null
0.12579
The _rtld function in the Run-Time Link-Editor (rtld) in libexec/rtld-elf/rtld.c in FreeBSD 7.1 and 8.0 does not clear the (1) LD_LIBMAP, (2) LD_LIBRARY_PATH, (3) LD_LIBMAP_DISABLE, (4) LD_DEBUG, and (5) LD_ELF_HINTS_PATH environment variables, which allows local users to gain privileges by executing a setuid or setguid program with a modified variable containing an untrusted search path that points to a Trojan horse library, different vectors than CVE-2009-4146.
2009-12-02
Metasploit
cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:8.0:*:*:*:*:*:*:*
CVE-2009-4178
0
null
0.86098
Heap-based buffer overflow in OvWebHelp.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a long Topic parameter.
2009-12-10
Metasploit
cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:hp_ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*
CVE-2009-4179
0
null
0.77533
Stack-based buffer overflow in ovalarm.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a long HTTP Accept-Language header in an OVABverbose action.
2009-12-10
Metasploit
cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:hp_ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*
CVE-2009-4188
0
null
0.85992
HP Operations Dashboard has a default password of j2deployer for the j2deployer account, which allows remote attackers to execute arbitrary code via a session that uses the manager role to conduct unrestricted file upload attacks against the /manager servlet in the Tomcat servlet container. NOTE: this might overlap CVE-2009-3098.
2009-12-03
Metasploit
cpe:2.3:a:hp:operations_dashboard:*:*:*:*:*:*:*:*
CVE-2009-4189
0
null
0.83488
HP Operations Manager has a default password of OvW*busr1 for the ovwebusr account, which allows remote attackers to execute arbitrary code via a session that uses the manager role to conduct unrestricted file upload attacks against the /manager servlet in the Tomcat servlet container. NOTE: this might overlap CVE-2009-3099 and CVE-2009-3843.
2009-12-03
Metasploit
cpe:2.3:a:hp:operations_manager:*:*:*:*:*:*:*:*
CVE-2009-4195
0
null
0.87197
Buffer overflow in Adobe Illustrator CS4 14.0.0, CS3 13.0.3 and earlier, and CS3 13.0.0 allows remote attackers to execute arbitrary code via a long DSC comment in an Encapsulated PostScript (.eps) file. NOTE: some of these details are obtained from third party information.
2009-12-04
Metasploit
cpe:2.3:a:adobe:illustrator:13.0.0:cs4:*:*:*:*:*:*;cpe:2.3:a:adobe:illustrator:14.0.0:cs4:*:*:*:*:*:*
CVE-2009-4202
0
null
0.1537
Directory traversal vulnerability in the Omilen Photo Gallery (com_omphotogallery) component Beta 0.5 for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the controller parameter to index.php.
2009-12-04
Nuclei
cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:omilenitsolutions:com_omphotogallery:0.5:beta:*:*:*:*:*:*
CVE-2009-4223
0
null
0.04664
PHP remote file inclusion vulnerability in adm/krgourl.php in KR-Web 1.1b2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the DOCUMENT_ROOT parameter.
2009-12-07
Nuclei
cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:*;cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:1.1:*:*:*:*:*:*:*;cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:1.1:beta:*:*:*:*:*:*
CVE-2009-4225
0
null
0.61454
Stack-based buffer overflow in the PestPatrol ActiveX control (ppctl.dll) 5.6.7.9 in CA eTrust PestPatrol allows remote attackers to execute arbitrary code via a long argument to the Initialize method.
2009-12-08
Metasploit
cpe:2.3:a:ca:etrust_pestpatrole_ppctl.dll_activex:5.6.7.9:*:*:*:*:*:*:*
CVE-2009-4265
0
null
0.67067
Stack-based buffer overflow in Ideal Administration 2009 9.7.1, and possibly other versions, allows remote attackers to execute arbitrary code via a long Computer value in an .ipj project file.
2009-12-10
Metasploit
cpe:2.3:a:pointdev:ideal_administration_2009:9.7.1:*:*:*:*:*:*:*
CVE-2009-4324
7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.92892
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
2009-12-15
Metasploit/CISA
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:10.0:sp2:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*
CVE-2009-4484
0
null
0.74607
Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld in MySQL 5.0.x before 5.0.90, MySQL 5.1.x before 5.1.43, MySQL 5.5.x through 5.5.0-m2, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field, as demonstrated by mysql_overflow1.py and the vd_mysql5 module in VulnDisco Pack Professional 8.11. NOTE: this was originally reported for MySQL 5.0.51a.
2009-12-30
Metasploit
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.0:milestone1:*:*:*:*:*:*;cpe:2.3:a:oracle:mysql:5.0.0:milestone2:*:*:*:*:*:*;cpe:2.3:a:wolfssl:yassl:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
CVE-2009-4498
0
null
0.71776
The node_process_command function in Zabbix Server before 1.8 allows remote attackers to execute arbitrary commands via a crafted request.
2009-12-31
Metasploit
cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*
CVE-2009-4502
0
null
0.61272
The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.
2009-12-31
Metasploit
cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*;cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*
CVE-2009-4588
0
null
0.64987
Heap-based buffer overflow in the WindsPlayerIE.View.1 ActiveX control in WindsPly.ocx 3.5.0.0 Beta, 3.0.0.5, and earlier in AwingSoft Awakening Web3D Player and Winds3D Viewer allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long SceneUrl property value, a different vulnerability than CVE-2009-2386. NOTE: some of these details are obtained from third party information.
2010-01-07
Metasploit
cpe:2.3:a:awingsoft:awakening_winds3d_player:3.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:awingsoft:awakening_winds3d_player:3.5.0.0:beta:*:*:*:*:*:*;cpe:2.3:a:awingsoft:awakening_winds3d_viewer:3.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:awingsoft:awakening_winds3d_viewer:3.5.0.0:beta:*:*:*:*:*:*
CVE-2009-4655
0
null
0.6034
The dhost web service in Novell eDirectory 8.8.5 uses a predictable session cookie, which makes it easier for remote attackers to hijack sessions via a modified cookie.
2010-02-26
Metasploit
cpe:2.3:a:novell:edirectory:8.8.5:*:*:*:*:*:*:*
CVE-2009-4656
0
null
0.68422
Stack-based buffer overflow in E-Soft DJ Studio Pro 4.2 including 4.2.2.7.5, and 5.x including 5.1.4.3.1, allows user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a playlist file (.pls) containing a long string. NOTE: some of these details are obtained from third party information.
2010-03-03
Metasploit
cpe:2.3:a:e-soft.co:dj_studio_pro:4.2.2.7.5:*:*:*:*:*:*:*;cpe:2.3:a:e-soft.co:dj_studio_pro:4.2:*:*:*:*:*:*:*;cpe:2.3:a:e-soft.co:dj_studio_pro:5.1.4.3.1:*:*:*:*:*:*:*;cpe:2.3:a:e-soft.co:dj_studio_pro:5.1:*:*:*:*:*:*:*
CVE-2009-4660
0
null
0.80719
Stack-based buffer overflow in the AntServer Module (AntServer.exe) in BigAnt IM Server 2.50 allows remote attackers to execute arbitrary code via a long GET request to TCP port 6660.
2010-03-03
Metasploit
cpe:2.3:a:bigantsoft:bigant_messenger:2.50:*:*:*:*:*:*:*
CVE-2009-4679
0
null
0.23302
Directory traversal vulnerability in the inertialFATE iF Portfolio Nexus (com_if_nexus) component 1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
2010-03-08
Nuclei
cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
CVE-2009-4769
0
null
0.62136
Multiple format string vulnerabilities in the tolog function in httpdx 1.4, 1.4.5, 1.4.6, 1.4.6b, and 1.5 allow (1) remote attackers to execute arbitrary code via format string specifiers in a GET request to the HTTP server component when logging is enabled, and allow (2) remote authenticated users to execute arbitrary code via format string specifiers in a PWD command to the FTP server component.
2010-04-20
Metasploit
cpe:2.3:a:jasper:httpdx:1.4.5:*:*:*:*:*:*:*;cpe:2.3:a:jasper:httpdx:1.4.6:*:*:*:*:*:*:*;cpe:2.3:a:jasper:httpdx:1.4.6b:*:*:*:*:*:*:*;cpe:2.3:a:jasper:httpdx:1.4:*:*:*:*:*:*:*;cpe:2.3:a:jasper:httpdx:1.5:*:*:*:*:*:*:*
CVE-2009-4850
0
null
0.55791
The Awingsoft Awakening Winds3D Viewer plugin 3.5.0.9 allows remote attackers to execute arbitrary programs via a SceneURL property value with a URL for a .exe file.
2010-05-07
Metasploit
cpe:2.3:a:awingsoft:awakening_winds3d_viewer_plugin:3.5.0.9:*:*:*:*:*:*:*
CVE-2009-4962
0
null
0.69332
Stack-based buffer overflow in Fat Player 0.6b allows remote attackers to execute arbitrary code via a long string in a .wav file. NOTE: some of these details are obtained from third party information.
2010-07-28
Metasploit
cpe:2.3:a:adammo:fat_player:0.6:b:*:*:*:*:*:*
CVE-2009-4988
0
null
0.80845
Stack-based buffer overflow in NT_Naming_Service.exe in SAP Business One 2005 A 6.80.123 and 6.80.320 allows remote attackers to execute arbitrary code via a long GIOP request to TCP port 30000.
2010-08-25
Metasploit
cpe:2.3:a:sap:business_one_2005-a:6.80.123:*:*:*:*:*:*:*;cpe:2.3:a:sap:business_one_2005-a:6.80.320:*:*:*:*:*:*:*
CVE-2009-5020
0
null
0.01389
Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
2010-12-02
Nuclei
cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:1.0:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:2.1.:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:3.0:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:3.1:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:3.2:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:4.1:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*;cpe:2.3:a:awstats:awstats:6.8:*:*:*:*:*:*:*
CVE-2009-5109
0
null
0.62221
Stack-based buffer overflow in Mini-Stream Ripper 3.0.1.1 allows remote attackers to execute arbitrary code via a long entry in a .pls file.
2011-12-25
Metasploit
cpe:2.3:a:mini-stream:ripper:3.0.1.1:*:*:*:*:*:*:*
CVE-2009-5114
0
null
0.26552
Directory traversal vulnerability in wgarcmin.cgi in WebGlimpse 2.18.7 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the DOC parameter.
2012-03-19
Nuclei
cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:1.7.6:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:1.7.9:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.0.03:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.0.04:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.0.07:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.1.01:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.1.04:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.10.2:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.10.4:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.10.5:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.11.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.12.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.12.1:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.12.2:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.12.3:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.13.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.13.1:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.13.2:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.14.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.14.1:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.14.3:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.14.6:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.14.8:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.15.2:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.15.3:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.16.1:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.17.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.17.2:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.18.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.18.2:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.18.3:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.18.4:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.18.5:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.3.1:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.4.3:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.4.6:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.5.1:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.5.4:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.6.7:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.7.4:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.7.6:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.7.7:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.8.0:*:*:*:*:*:*:*;cpe:2.3:a:iwork:webglimpse:2.8.1:*:*:*:*:*:*:*
CVE-2010-0017
0
null
0.43931
Race condition in the SMB client implementation in Microsoft Windows Server 2008 R2 and Windows 7 allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code, and in the SMB client implementation in Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2 allows local users to gain privileges, via a crafted SMB Negotiate response, aka "SMB Client Race Condition Vulnerability."
2010-02-10
Metasploit
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:-:x64:*:*:*:*:*
CVE-2010-0033
0
null
0.79579
Stack-based buffer overflow in Microsoft Office PowerPoint 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "PowerPoint Viewer TextBytesAtom Record Stack Overflow Vulnerability."
2010-02-10
Metasploit
cpe:2.3:a:microsoft:powerpoint:2003:sp3:*:*:*:*:*:*
CVE-2010-0094
0
null
0.88908
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18 and 5.0 Update 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is due to missing privilege checks during deserialization of RMIConnectionImpl objects, which allows remote attackers to call system-level Java functions via the ClassLoader of a constructor that is being deserialized.
2010-04-01
Metasploit
cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
CVE-2010-0103
0
null
0.76775
UsbCharger.dll in the Energizer DUO USB battery charger software contains a backdoor that is implemented through the Arucer.dll file in the %WINDIR%\system32 directory, which allows remote attackers to download arbitrary programs onto a Windows PC, and execute these programs, via a request to TCP port 7777.
2010-03-10
Metasploit
cpe:2.3:a:energizer:duo_usb:*:*:*:*:*:*:*:*
CVE-2010-0111
0
null
0.60589
HDNLRSVC.EXE in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (aka AMS or AMS2), as used in Symantec AntiVirus Corporate Edition (SAVCE) 10.x before 10.1 MR10, Symantec System Center (SSC) 10.x, and Symantec Quarantine Server 3.5 and 3.6, allows remote attackers to execute arbitrary programs by sending msgsys.exe a UNC share pathname, which is used directly in a CreateProcessA (aka CreateProcess) call.
2011-01-31
Metasploit
cpe:2.3:a:symantec:antivirus:10.0.1.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.3:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.4:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.5:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.6:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.7:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.8:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0.9:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0:mr1:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.0:mr2:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.0.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.4.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.4:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.5.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.5:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.6.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.6:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.7:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.8:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1.9:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1:mp1:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1:mr4:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1:mr5:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1:mr6:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.1:mr7:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.2:*:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.2:mr2:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus:10.2:mr3:corporate:*:*:*:*:*;cpe:2.3:a:symantec:antivirus_central_quarantine_server:3.5:*:*:*:*:*:*:*;cpe:2.3:a:symantec:antivirus_central_quarantine_server:3.6:*:*:*:*:*:*:*;cpe:2.3:a:symantec:system_center:10.0:*:*:*:*:*:*:*;cpe:2.3:a:symantec:system_center:10.1:*:*:*:*:*:*:*
CVE-2010-0157
0
null
0.07582
Directory traversal vulnerability in the Bible Study (com_biblestudy) component 6.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter in a studieslist action to index.php.
2010-01-06
Nuclei
cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:joomlabiblestudy:com_biblestudy:6.1:*:*:*:*:*:*:*
CVE-2010-0188
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.92798
Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
2010-02-22
Metasploit/CISA
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
CVE-2010-0219
0
null
0.93421
Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
2010-10-18
Metasploit/Nuclei
cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*;cpe:2.3:a:apache:axis2:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:axis2:1.4:*:*:*:*:*:*:*;cpe:2.3:a:apache:axis2:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:apache:axis2:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:apache:axis2:1.5:*:*:*:*:*:*:*;cpe:2.3:a:apache:axis2:1.6:*:*:*:*:*:*:*;cpe:2.3:a:sap:businessobjects:3.2:*:enterprise_xi:*:*:*:*:*
CVE-2010-0232
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.7674
The kernel in Microsoft Windows NT 3.1 through Windows 7, including Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, when access to 16-bit applications is enabled on a 32-bit x86 platform, does not properly validate certain BIOS calls, which allows local users to gain privileges by crafting a VDM_TIB data structure in the Thread Environment Block (TEB), and then calling the NtVdmControl function to start the Windows Virtual DOS Machine (aka NTVDM) subsystem, leading to improperly handled exceptions involving the #GP trap handler (nt!KiTrap0D), aka "Windows Kernel Exception Handler Vulnerability."
2010-01-21
Metasploit/CISA
cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:-:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
CVE-2010-0248
8.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
0.78378
Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Object Memory Corruption Vulnerability."
2010-01-22
Metasploit
cpe:2.3:a:microsoft:internet_explorer:6.0.2600:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0.2800.1106:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0.2800:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0.2900.2180:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0.2900:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.2462.0000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.2479.0006:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.2600.0000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.2800.1106:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.2900.2180:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.3663.0000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.3718.0000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.3790.0000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.3790.1830:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.00.3790.3959:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7.0.5730.11:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7.0.5730:unknown:gold:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7.00.5730.1100:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7.00.6000.16386:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7.00.6000.16441:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8.0.6001:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
CVE-2010-0249
8.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.9139
Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4; Windows XP SP2 and SP3; Windows Server 2003 SP2; Windows Vista Gold, SP1, and SP2; Windows Server 2008 Gold, SP2, and R2; and Windows 7 allows remote attackers to execute arbitrary code by accessing a pointer associated with a deleted object, related to incorrectly initialized memory and improper handling of objects in memory, as exploited in the wild in December 2009 and January 2010 during Operation Aurora, aka "HTML Object Memory Corruption Vulnerability."
2010-01-15
Metasploit
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:*:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
CVE-2010-0266
0
null
0.82804
Microsoft Office Outlook 2002 SP3, 2003 SP3, and 2007 SP1 and SP2 does not properly verify e-mail attachments with a PR_ATTACH_METHOD property value of ATTACH_BY_REFERENCE, which allows user-assisted remote attackers to execute arbitrary code via a crafted message, aka "Microsoft Outlook SMB Attachment Vulnerability."
2010-07-15
Metasploit
cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2002:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2003:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2007:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:outlook:2007:sp2:*:*:*:*:*:*
CVE-2010-0304
0
null
0.77116
Multiple buffer overflows in the LWRES dissector in Wireshark 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5 allow remote attackers to cause a denial of service (crash) via a malformed packet, as demonstrated using a stack-based buffer overflow to the dissect_getaddrsbyname_request function.
2010-02-03
Metasploit
cpe:2.3:a:wireshark:wireshark:0.9.15:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.10:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2:*:*:*:*:*:*:*
CVE-2010-0356
0
null
0.65175
Stack-based buffer overflow in the MOVIEPLAYER.MoviePlayerCtrl.1 ActiveX control in MoviePlayer.ocx 6.8.0.0 in Viscom Software Movie Player Pro SDK ActiveX 6.8 allows remote attackers to execute arbitrary code via a long strFontName parameter to the DrawText method.
2010-01-18
Metasploit
cpe:2.3:a:viscomsoft:movie_player_pro_sdk_activex:6.8:*:*:*:*:*:*:*