CVE
stringlengths
13
16
CVSS Score
float64
0
10
CVSS_Vector
stringclasses
257 values
EPSS
float64
0
0.95
Description
stringlengths
28
3.79k
Published
stringdate
1990-08-14 00:00:00
2025-10-05 00:00:00
Source
stringclasses
7 values
CPE
stringlengths
33
51k
CVE-2010-4344
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.61461
Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
2010-12-14
Metasploit/CISA
cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
CVE-2010-4345
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.04024
Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
2010-12-14
Metasploit/CISA
cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
CVE-2010-4398
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.12712
Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges, and bypass the User Account Control (UAC) feature, via a crafted REG_BINARY value for a SystemDefaultEUDCFont registry key, aka "Driver Improper Interaction with Windows Kernel Vulnerability."
2010-12-06
CISA
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
CVE-2010-4417
0
null
0.72458
Unspecified vulnerability in the Services for Beehive component in Oracle Fusion Middleware 2.0.1.0, 2.0.1.1, 2.0.1.2, 2.0.1.2.1, and 2.0.1.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that voice-servlet/prompt-qa/Index.jspf does not properly handle null (%00) bytes in the evaluation parameter that is used in a filename, which allows attackers to create a file with an executable extension and execute arbitrary JSP code.
2011-01-19
Metasploit
cpe:2.3:a:oracle:beehive:2.0.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:beehive:2.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:beehive:2.0.1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:beehive:2.0.1.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:beehive:2.0.1.3:*:*:*:*:*:*:*
CVE-2010-4452
0
null
0.87785
Unspecified vulnerability in the Deployment component in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.
2011-02-17
Metasploit
cpe:2.3:a:sun:jdk:*:update_23:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update_23:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
CVE-2010-4566
0
null
0.71849
The web authentication form in the NT4 authentication component in Citrix Access Gateway Enterprise Edition 9.2-49.8 and earlier, and the NTLM authentication component in Access Gateway Standard and Advanced Editions before Access Gateway 5.0, allows attackers to execute arbitrary commands via shell metacharacters in the password field.
2011-01-14
Metasploit
cpe:2.3:a:citrix:access_gateway:*:*:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:.8.0:m50.3:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5.5:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5.6:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5.7:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5:*:advanced:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5:hf1:*:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5:hf1:advanced:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.6.1:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.6.2:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.6.3:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:8.0:m48.7:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:8.0:m49.2:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:8.0:m59.1:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:8.1-69.4:*:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:9.0.71.3:*:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:9.1-104.5:*:enterprise:*:*:*:*:*
CVE-2010-4617
0
null
0.00377
Directory traversal vulnerability in the JotLoader (com_jotloader) component 2.2.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the section parameter to index.php.
2010-12-29
Nuclei
cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:kanich:com_jotloader:2.2.1:*:*:*:*:*:*:*
CVE-2010-4719
0
null
0.03407
Directory traversal vulnerability in JRadio (com_jradio) component before 1.5.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
2011-02-01
Nuclei
cpe:2.3:a:fxwebdesign:com_jradio:*:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
CVE-2010-4740
0
null
0.5913
Stack-based buffer overflow in WTclient.dll in SCADA Engine BACnet OPC Client before 1.0.25 allows user-assisted remote attackers to execute arbitrary code via a crafted .csv file, related to a status log message.
2011-02-16
Metasploit
cpe:2.3:a:scadaengine:bacnet_opc_client:*:*:*:*:*:*:*:*
CVE-2010-4741
0
null
0.48589
Stack-based buffer overflow in MDMUtil.dll in MDMTool.exe in MDM Tool before 2.3 in Moxa Device Manager allows remote MDM Gateways to execute arbitrary code via crafted data in a session on TCP port 54321.
2011-02-18
Metasploit
cpe:2.3:a:moxa:device_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:moxa:mdm_tool:*:*:*:*:*:*:*:*
CVE-2010-4742
0
null
0.50638
Stack-based buffer overflow in a certain ActiveX control in MediaDBPlayback.DLL 2.2.0.5 in the Moxa ActiveX SDK allows remote attackers to execute arbitrary code via a long PlayFileName property value.
2011-02-18
Metasploit
cpe:2.3:a:moxa:activex_sdk:*:*:*:*:*:*:*:*
CVE-2010-4769
0
null
0.02614
Directory traversal vulnerability in the Jimtawl (com_jimtawl) component 1.0.2 Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the task parameter to index.php.
2011-03-23
Nuclei
cpe:2.3:a:janguo:com_jimtawl:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
CVE-2010-4804
0
null
0.63498
The Android browser in Android before 2.3.4 allows remote attackers to obtain SD card contents via crafted content:// URIs, related to (1) BrowserActivity.java and (2) BrowserSettings.java in com/android/browser/.
2011-06-09
Metasploit
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:1.5:*:*:*:*:*:*:*;cpe:2.3:o:google:android:1.6:*:*:*:*:*:*:*;cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*;cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*;cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*;cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*;cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*;cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*
CVE-2010-4977
0
null
0.03909
SQL injection vulnerability in menu.php in the Canteen (com_canteen) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the mealid parameter to index.php.
2011-11-01
Nuclei
cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:miniwork:com_canteen:1.0:*:*:*:*:*:*:*
CVE-2010-5028
0
null
0.09308
SQL injection vulnerability in the JExtensions JE Job (com_jejob) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in an item action to index.php.
2011-11-02
Nuclei
cpe:2.3:a:harmistechnology:com_jejob:1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
CVE-2010-5081
0
null
0.59696
Stack-based buffer overflow in Mini-Stream RM-MP3 Converter 3.1.2.1 allows remote attackers to execute arbitrary code via a long URL in a .pls file.
2011-12-25
Metasploit
cpe:2.3:a:mini-stream:rm-mp3_converter:3.1.2.1:*:*:*:*:*:*:*
CVE-2010-5193
0
null
0.55762
Stack-based buffer overflow in the TIFMergeMultiFiles function in the SCRIBBLE.ScribbleCtrl.1 ActiveX control (ImageViewer2.ocx) in Viscom Image Viewer CP Pro 8.0 and Gold 6.0 allows remote attackers to execute arbitrary code via a long strDelimit parameter.
2012-08-31
Metasploit
cpe:2.3:a:viscomsoft:image_viewer_cp_gold_sdk:6.0:*:*:*:*:*:*:*;cpe:2.3:a:viscomsoft:image_viewer_cp_pro_sdk:8.0:*:*:*:*:*:*:*
CVE-2010-5278
0
null
0.19684
Directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter. NOTE: some of these details are obtained from third party information.
2012-10-07
Nuclei
cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:*
CVE-2010-5286
0
null
0.32162
Directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
2012-11-26
Nuclei
cpe:2.3:a:joobi:com_jstore:-:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
CVE-2010-5299
0
null
0.68264
Stack-based buffer overflow in MicroP 0.1.1.1600 allows remote attackers to execute arbitrary code via a crafted .mppl file. NOTE: it has been reported that the overflow is in the lpFileName parameter of the CreateFileA function, but the overflow is probably caused by a separate, unnamed function.
2014-05-23
Metasploit
cpe:2.3:a:microp_project:microp:0.1.1.1600:*:*:*:*:*:*:*
CVE-2010-5324
0
null
0.7407
Directory traversal vulnerability in UploadServlet in the Remote Management component in Novell ZENworks Configuration Management (ZCM) 10 before 10.3 allows remote attackers to execute arbitrary code via a zenworks-fileupload request with a crafted directory name in the type parameter, in conjunction with a WAR filename in the filename parameter and WAR content in the POST data, a different vulnerability than CVE-2010-5323.
2015-06-07
Metasploit
cpe:2.3:a:novell:zenworks_configuration_management:10.0:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:10.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:10.2:*:*:*:*:*:*:*
CVE-2010-5326
10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
0.26416
The Invoker Servlet on SAP NetWeaver Application Server Java platforms, possibly before 7.3, does not require authentication, which allows remote attackers to execute arbitrary code via an HTTP or HTTPS request, as exploited in the wild in 2013 through 2016, aka a "Detour" attack.
2016-05-13
CISA
cpe:2.3:a:sap:netweaver_application_server_java:*:*:*:*:*:*:*:*
CVE-2010-5330
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.52725
On certain Ubiquiti devices, Command Injection exists via a GET request to stainfo.cgi (aka Show AP info) because the ifname variable is not sanitized, as demonstrated by shell metacharacters. The fixed version is v4.0.1 for 802.11 ISP products, v5.3.5 for AirMax ISP products, and v5.4.5 for AirSync firmware. For example, Nanostation5 (Air OS) is affected.
2019-06-11
CISA
cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*
CVE-2011-0049
0
null
0.91269
Directory traversal vulnerability in the _list_file_get function in lib/Majordomo.pm in Majordomo 2 before 20110131 allows remote attackers to read arbitrary files via .. (dot dot) sequences in the help command, as demonstrated using (1) a crafted email and (2) cgi-bin/mj_wwwusr in the web interface.
2011-02-04
Metasploit/Nuclei
cpe:2.3:a:mj2:majordomo_2:*:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110101:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110102:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110103:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110104:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110105:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110106:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110107:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110108:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110109:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110110:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110111:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110112:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110113:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110114:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110115:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110116:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110117:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110118:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110119:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110120:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110121:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110122:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110123:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110124:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110125:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110126:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110127:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110128:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110129:*:*:*:*:*:*:*
CVE-2011-0063
0
null
0.89981
The _list_file_get function in lib/Majordomo.pm in Majordomo 2 20110203 and earlier allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ./.../ sequence in the "extra" parameter to the help command, which causes the regular expression to produce .. (dot dot) sequences. NOTE: this vulnerability is due to an incomplete fix for CVE-2011-0049.
2011-03-15
Metasploit
cpe:2.3:a:mj2:majordomo_2:*:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110101:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110102:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110103:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110104:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110105:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110106:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110107:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110108:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110109:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110110:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110111:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110112:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110113:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110114:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110115:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110116:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110117:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110118:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110119:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110120:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110121:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110122:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110123:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110124:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110125:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110126:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110127:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110128:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110129:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110130:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110131:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110201:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110202:*:*:*:*:*:*:*
CVE-2011-0065
0
null
0.83259
Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.
2011-05-07
Metasploit
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
CVE-2011-0073
0
null
0.81161
Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, does not properly use nsTreeRange data structures, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer."
2011-05-07
Metasploit
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
CVE-2011-0105
0
null
0.89418
Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac obtain a certain length value from an uninitialized memory location, which allows remote attackers to trigger a buffer overflow and execute arbitrary code via a crafted Excel file, aka "Excel Data Initialization Vulnerability."
2011-04-13
Metasploit
cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*;cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*;cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*
CVE-2011-0257
0
null
0.83296
Integer signedness error in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PnSize opcode in a PICT file that triggers a stack-based buffer overflow.
2011-08-15
Metasploit
cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.7:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.8:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.66.71.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.67.75.0:*:*:*:*:*:*:*
CVE-2011-0266
0
null
0.77535
Buffer overflow in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long nameParams parameter, a different vulnerability than CVE-2011-0267.2.
2011-01-13
Metasploit
cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*
CVE-2011-0267
0
null
0.78987
Multiple buffer overflows in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allow remote attackers to execute arbitrary code via a long (1) schdParams or (2) nameParams parameter, a different vulnerability than CVE-2011-0266.
2011-01-13
Metasploit
cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*
CVE-2011-0276
0
null
0.85731
HP OpenView Performance Insight Server 5.2, 5.3, 5.31, 5.4, and 5.41 contains a "hidden account" in the com.trinagy.security.XMLUserManager Java class, which allows remote attackers to execute arbitrary code via the doPost method in the com.trinagy.servlet.HelpManagerServlet class.
2011-02-02
Metasploit
cpe:2.3:a:hp:openview_performance_insight:5.2:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_performance_insight:5.31:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_performance_insight:5.3:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_performance_insight:5.41:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_performance_insight:5.4:*:*:*:*:*:*:*
CVE-2011-0340
0
null
0.47349
Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method.
2011-05-04
Metasploit
cpe:2.3:a:advantech:advantech_studio:6.1:sp6_61.6.01.05:*:*:*:*:*:*;cpe:2.3:a:indusoft:thin_client:7.0:*:*:*:*:*:*:*;cpe:2.3:a:indusoft:web_studio:*:*:*:*:*:*:*:*;cpe:2.3:a:indusoft:web_studio:6.1:*:*:*:*:*:*:*;cpe:2.3:a:indusoft:web_studio:6.1:sp6:*:*:*:*:*:*
CVE-2011-0404
0
null
0.78809
Stack-based buffer overflow in NetSupport Manager Agent for Linux 11.00, for Solaris 9.50, and for Mac OS X 11.00 allows remote attackers to execute arbitrary code via a long control hostname to TCP port 5405, probably a different vulnerability than CVE-2007-5252.
2011-01-11
Metasploit
cpe:2.3:a:netsupport:netsupport_manager_agent:11.00:*:linux:*:*:*:*:*;cpe:2.3:a:netsupport:netsupport_manager_agent:11.00:*:mac_os_x:*:*:*:*:*;cpe:2.3:a:netsupport:netsupport_manager_agent:9.50:*:solaris:*:*:*:*:*
CVE-2011-0499
0
null
0.59532
Buffer overflow in VideoSpirit Pro 1.6.8.1 and possibly earlier versions, and VideoSpirit Lite 1.4.0.1 and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via a VideoSpirit project (.visprj) file containing a valitem element with a long "name" attribute. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
2011-01-20
Metasploit
cpe:2.3:a:verytools:videospirit_lite:*:*:*:*:*:*:*:*;cpe:2.3:a:verytools:videospirit_pro:*:*:*:*:*:*:*:*;cpe:2.3:a:verytools:videospirit_pro:1.68:*:*:*:*:*:*:*
CVE-2011-0500
0
null
0.64306
Buffer overflow in VideoSpirit Pro 1.6.8.1, 1.68, and earlier; and VideoSpirit Lite 1.4.0.1 and possibly other versions; allows user-assisted remote attackers to execute arbitrary code via a VideoSpirit project (.visprj) file containing a valitem element with a long "value" attribute, as demonstrated using a valitem with the mp3 name.
2011-01-20
Metasploit
cpe:2.3:a:verytools:videospirit_lite:1.4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:verytools:videospirit_pro:*:*:*:*:*:*:*:*;cpe:2.3:a:verytools:videospirit_pro:1.6.8.1:*:*:*:*:*:*:*
CVE-2011-0514
0
null
0.71443
The RDS service (rds.exe) in HP Data Protector Manager 6.11 allows remote attackers to cause a denial of service (crash) via a packet with a large data size to TCP port 1530.
2011-01-20
Metasploit
cpe:2.3:a:hp:data_protector_manager:6.11:*:*:*:*:*:*:*
CVE-2011-0517
0
null
0.71601
Stack-based buffer overflow in Sielco Sistemi Winlog Pro 2.07.00 and earlier, when Run TCP/IP server is enabled, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted 0x02 opcode to TCP port 46823.
2011-01-20
Metasploit
cpe:2.3:a:sielcosistemi:winlog_pro:*:*:*:*:*:*:*:*
CVE-2011-0518
0
null
0.6172
Directory traversal vulnerability in core/lib/router.php in LotusCMS Fraise 3.0, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via the system parameter to index.php.
2011-01-20
Metasploit
cpe:2.3:a:lotuscms:fraise:3.0:*:*:*:*:*:*:*
CVE-2011-0531
0
null
0.73766
demux/mkv/mkv.hpp in the MKV demuxer plugin in VideoLAN VLC media player 1.1.6.1 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary commands via a crafted MKV (WebM or Matroska) file that triggers memory corruption, related to "class mismatching" and the MKV_IS_ID macro.
2011-02-07
Metasploit
cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
CVE-2011-0609
7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.92398
Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011.
2011-03-15
Metasploit/CISA
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*
CVE-2011-0611
8.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.92899
Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011.
2011-04-13
Metasploit/CISA
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
CVE-2011-0647
0
null
0.72633
The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542.
2011-02-10
Metasploit
cpe:2.3:a:emc:networker_module:2.1:-:microsoft_applications:*:*:*:*:*;cpe:2.3:a:emc:networker_module:2.2:-:microsoft_applications:*:*:*:*:*;cpe:2.3:a:emc:replication_manager:*:*:client:*:*:*:*:*;cpe:2.3:a:emc:replication_manager:2.0:*:client:*:*:*:*:*;cpe:2.3:a:emc:replication_manager:5.2.2:*:client:*:*:*:*:*;cpe:2.3:a:emc:replication_manager:5.2:*:client:*:*:*:*:*
CVE-2011-0654
0
null
0.81012
Integer underflow in the BowserWriteErrorLogEntry function in the Common Internet File System (CIFS) browser service in Mrxsmb.sys or bowser.sys in Active Directory in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via a malformed BROWSER ELECTION message, leading to a heap-based buffer overflow, aka "Browser Pool Corruption Vulnerability." NOTE: some of these details are obtained from third party information.
2011-02-16
Metasploit
cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:r2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:r2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
CVE-2011-0657
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.46929
DNSAPI.dll in the DNS client in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process DNS queries, which allows remote attackers to execute arbitrary code via (1) a crafted LLMNR broadcast query or (2) a crafted application, aka "DNS Query Vulnerability."
2011-04-13
Metasploit
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
CVE-2011-0762
0
null
0.36866
The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.
2011-03-02
Metasploit/Nuclei
cpe:2.3:a:vsftpd_project:vsftpd:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
CVE-2011-0807
0
null
0.87545
Unspecified vulnerability in Oracle Sun GlassFish Enterprise Server 2.1, 2.1.1, and 3.0.1, and Sun Java System Application Server 9.1, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Administration.
2011-04-20
Metasploit
cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:glassfish_server:2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:sun:java_system_application_server:9.1:*:*:*:*:*:*:*
CVE-2011-0922
0
null
0.82006
The client in HP Data Protector allows remote attackers to execute arbitrary programs via an EXEC_SETUP command that references a UNC share pathname.
2011-02-09
Metasploit
cpe:2.3:a:hp:data_protector:*:*:*:*:*:*:*:*
CVE-2011-0923
0
null
0.89891
The client in HP Data Protector does not properly validate EXEC_CMD arguments, which allows remote attackers to execute arbitrary Perl code via a crafted command, related to the "local bin directory."
2011-02-09
Metasploit
cpe:2.3:a:hp:data_protector:*:*:*:*:*:*:*:*
CVE-2011-0951
0
null
0.65335
The web-based management interface in Cisco Secure Access Control System (ACS) 5.1 before 5.1.0.44.6 and 5.2 before 5.2.0.26.3 allows remote attackers to change arbitrary user passwords via unspecified vectors, aka Bug ID CSCtl77440.
2011-04-04
Metasploit
cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.3:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.4:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.5:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26.2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.2:*:*:*:*:*:*:*
CVE-2011-1140
0
null
0.30766
Multiple stack consumption vulnerabilities in the dissect_ms_compressed_string and dissect_mscldap_string functions in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allow remote attackers to cause a denial of service (infinite recursion) via a crafted (1) SMB or (2) Connection-less LDAP (CLDAP) packet.
2011-03-03
Metasploit
cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.10:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.11:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.12:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.13:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.14:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.15:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.16:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.10:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.11:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.12:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.13:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.14:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*
CVE-2011-1213
0
null
0.78656
Integer underflow in lzhsr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via a crafted header in a .lzh attachment that triggers a stack-based buffer overflow, aka SPR PRAD88MJ2W.
2011-05-31
Metasploit
cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:3.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:3.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.6.7a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.6.7h:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.1.02:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.1a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.1b:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.1c:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.2a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.2b:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.2c:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.4a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.5.01:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.5.02:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.6a.01:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.6a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.7a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.9a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.02:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.1:cf1:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.1:cf2:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.1:cf3:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.2:cf1:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.2:cf2:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.4.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.6.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.6.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.6.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5:*:*:*:*:*:*:*
CVE-2011-1220
0
null
0.63306
Stack-based buffer overflow in lcfd.exe in Tivoli Endpoint in IBM Tivoli Management Framework 3.7.1, 4.1, 4.1.1, and 4.3.1 allows remote authenticated users to execute arbitrary code via a long opts field.
2011-06-02
Metasploit
cpe:2.3:a:ibm:tivoli_management_framework:3.7.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_management_framework:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_management_framework:4.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_management_framework:4.3.1:*:*:*:*:*:*:*
CVE-2011-1260
0
null
0.85848
Microsoft Internet Explorer 8 and 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Layout Memory Corruption Vulnerability."
2011-06-16
Metasploit
cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
CVE-2011-1485
0
null
0.08018
Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit) 0.96 allows local users to gain privileges by executing a setuid program from pkexec, related to the use of the effective user ID instead of the real user ID.
2011-05-31
Metasploit
cpe:2.3:a:redhat:policykit:0.96:*:*:*:*:*:*:*
CVE-2011-1563
0
null
0.58365
Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified "On_FC_BINFILE_FCS_*FILE", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910.
2011-04-05
Metasploit
cpe:2.3:a:realflex:realwin:*:*:*:*:*:*:*:*;cpe:2.3:a:realflex:realwin:1.06:*:*:*:*:*:*:*;cpe:2.3:a:realflex:realwin:2.0:*:*:*:*:*:*:*
CVE-2011-1565
0
null
0.69054
Directory traversal vulnerability in IGSSdataServer.exe 9.00.00.11063 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allows remote attackers to (1) read (opcode 0x3) or (2) create or write (opcode 0x2) arbitrary files via ..\ (dot dot backslash) sequences to TCP port 12401.
2011-04-05
Metasploit
cpe:2.3:a:7t:igss:*:*:*:*:*:*:*:*
CVE-2011-1566
0
null
0.77663
Directory traversal vulnerability in dc.exe 9.00.00.11059 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allows remote attackers to execute arbitrary programs via ..\ (dot dot backslash) sequences in opcodes (1) 0xa and (2) 0x17 to TCP port 12397.
2011-04-05
Metasploit
cpe:2.3:a:7t:igss:*:*:*:*:*:*:*:*
CVE-2011-1567
0
null
0.78999
Multiple stack-based buffer overflows in IGSSdataServer.exe 9.00.00.11063 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted (1) ListAll, (2) Write File, (3) ReadFile, (4) Delete, (5) RenameFile, and (6) FileInfo commands in an 0xd opcode; (7) the Add, (8) ReadFile, (9) Write File, (10) Rename, (11) Delete, and (12) Add commands in an RMS report templates (0x7) opcode; and (13) 0x4 command in an STDREP request (0x8) opcode to TCP port 12401.
2011-04-05
Metasploit
cpe:2.3:a:7t:igss:*:*:*:*:*:*:*:*
CVE-2011-1574
0
null
0.67035
Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
2011-05-09
Metasploit
cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*
CVE-2011-1591
0
null
0.77801
Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.
2011-04-29
Metasploit
cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*
CVE-2011-1653
0
null
0.74059
Multiple SQL injection vulnerabilities in the Unified Network Control (UNC) Server in CA Total Defense (TD) r12 before SE2 allow remote attackers to execute arbitrary SQL commands via vectors involving the (1) UnAssignFunctionalRoles, (2) UnassignAdminRoles, (3) DeleteFilter, (4) NonAssignedUserList, (5) DeleteReportLayout, (6) DeleteReports, and (7) RegenerateReport stored procedures.
2011-04-18
Metasploit
cpe:2.3:a:broadcom:total_defense:r12:*:*:*:*:*:*:*
CVE-2011-1669
0
null
0.01195
Directory traversal vulnerability in wp-download.php in the WP Custom Pages module 0.5.0.1 for WordPress allows remote attackers to read arbitrary files via ..%2F (encoded dot dot) sequences in the url parameter.
2011-04-10
Nuclei
cpe:2.3:a:mikoviny:wp_custom_pages:0.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
CVE-2011-1774
0
null
0.76747
WebKit in Apple Safari before 5.0.6 has improper libxslt security settings, which allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via a crafted web site. NOTE: this may overlap CVE-2011-1425.
2011-07-21
Metasploit
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.6.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.6.9:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.6.9:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
CVE-2011-1823
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.54882
The vold volume manager daemon on Android 3.0 and 2.x before 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative index that bypasses a maximum-only signed integer check in the DirectVolume::handlePartitionAdded method, which triggers memory corruption, as demonstrated by Gingerbreak.
2011-06-09
CISA
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*
CVE-2011-1865
0
null
0.87606
Multiple stack-based buffer overflows in the inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allow remote attackers to execute arbitrary code via a request containing crafted parameters.
2011-07-01
Metasploit
cpe:2.3:a:hp:openview_storage_data_protector:6.00:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_storage_data_protector:6.10:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_storage_data_protector:6.11:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_storage_data_protector:6.20:*:*:*:*:*:*:*
CVE-2011-1889
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.87382
The NSPLookupServiceNext function in the client in Microsoft Forefront Threat Management Gateway (TMG) 2010 allows remote attackers to execute arbitrary code via vectors involving unspecified requests, aka "TMG Firewall Client Memory Corruption Vulnerability."
2011-06-16
CISA
cpe:2.3:a:microsoft:forefront_threat_management_gateway:2010:*:*:*:*:*:*:*
CVE-2011-1900
0
null
0.49258
Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 6.1 and 7.x before 7.0+Patch 1 allows remote attackers to execute arbitrary code via an invalid request.
2011-05-04
Metasploit
cpe:2.3:a:indusoft:web_studio:6.1:*:*:*:*:*:*:*;cpe:2.3:a:indusoft:web_studio:7.0:*:*:*:*:*:*:*
CVE-2011-1996
0
null
0.79505
Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Option Element Remote Code Execution Vulnerability."
2011-10-12
Metasploit
cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
CVE-2011-2005
7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.5755
afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability."
2011-10-12
Metasploit/CISA
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
CVE-2011-2039
0
null
0.84123
The helper application in Cisco AnyConnect Secure Mobility Client (formerly AnyConnect VPN Client) before 2.3.185 on Windows, and on Windows Mobile, downloads a client executable file (vpndownloader.exe) without verifying its authenticity, which allows remote attackers to execute arbitrary code via the url property to a certain ActiveX control in vpnweb.ocx, aka Bug ID CSCsy00904.
2011-06-02
Metasploit
cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.128:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.133:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.136:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.140:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_mobile:*:*:*:*:*:*:*:*
CVE-2011-2089
0
null
0.76007
Stack-based buffer overflow in the SetActiveXGUID method in the VersionInfo ActiveX control in GenVersion.dll 8.0.138.0 in the WebHMI subsystem in ICONICS BizViz 9.x before 9.22 and GENESIS32 9.x before 9.22 allows remote attackers to execute arbitrary code via a long string in the argument. NOTE: some of these details are obtained from third party information.
2011-05-13
Metasploit
cpe:2.3:a:iconics:bizviz:9.01:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.0:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.13:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.1:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.20:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.21:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.2:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.01:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.0:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.13:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.1:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.20:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.21:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.2:*:*:*:*:*:*:*
CVE-2011-2110
0
null
0.9143
Adobe Flash Player before 10.3.181.26 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.23 and earlier on Android, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in June 2011.
2011-06-16
Metasploit
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.154.25:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.156.12:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.157.51:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.185.21:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*
CVE-2011-2140
0
null
0.89835
Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425.
2011-08-10
Metasploit
cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.154.25:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.156.12:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.157.51:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.23:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.185.21:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.185.23:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*
CVE-2011-2217
0
null
0.88252
Certain ActiveX controls in (1) tsgetxu71ex552.dll and (2) tsgetx71ex552.dll in Tom Sawyer GET Extension Factory 5.5.2.237, as used in VI Client (aka VMware Infrastructure Client) 2.0.2 before Build 230598 and 2.5 before Build 204931 in VMware Infrastructure 3, do not properly handle attempted initialization within Internet Explorer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HTML document.
2011-06-06
Metasploit
cpe:2.3:a:tomsawyer:get_extension_factory:5.5.2.237:*:*:*:*:*:*:*;cpe:2.3:a:vmware:infrastructure:3:*:*:*:*:*:*:*;cpe:2.3:a:vmware:virtual_infrastructure_client:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:vmware:virtual_infrastructure_client:2.5:*:*:*:*:*:*:*
CVE-2011-2371
0
null
0.87002
Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
2011-06-30
Metasploit
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*
CVE-2011-2386
0
null
0.74908
VisiWaveReport.exe in AZO Technologies, Inc. VisiWave Site Survey before 2.1.9 allows user-assisted remote attackers to execute arbitrary code via a (1) vws and (2) vwr file with an invalid Type property, which triggers an untrusted pointer dereference.
2011-06-08
Metasploit
cpe:2.3:a:visiwave:site_survey:*:*:*:*:*:*:*:*;cpe:2.3:a:visiwave:site_survey:1.6.12:*:*:*:*:*:*:*;cpe:2.3:a:visiwave:site_survey:2.0.12:*:*:*:*:*:*:*
CVE-2011-2404
0
null
0.80489
A certain ActiveX control in HPTicketMgr.dll in HP Easy Printer Care Software 2.5 and earlier allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via unspecified vectors, a different vulnerability than CVE-2011-4786 and CVE-2011-4787.
2011-08-11
Metasploit
cpe:2.3:a:hp:easy_printer_care_software:*:*:*:*:*:*:*:*
CVE-2011-2462
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.9255
Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.
2011-12-07
Metasploit/CISA
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*
CVE-2011-2474
0
null
0.08976
Directory traversal vulnerability in the HTTP Server in Sybase EAServer 6.3.1 Developer Edition allows remote attackers to read arbitrary files via a /.\../\../\ sequence in a path.
2011-06-09
Metasploit
cpe:2.3:a:sybase:easerver:6.3.1:*:developer:*:*:*:*:*
CVE-2011-2523
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.94261
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
2019-11-27
Nuclei
cpe:2.3:a:vsftpd_project:vsftpd:2.3.4:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2011-2595
0
null
0.74003
Multiple stack-based buffer overflows in ACDSee FotoSlate 4.0 Build 146 allow remote attackers to execute arbitrary code via a long id parameter in a (1) String or (2) Int tag in a FotoSlate Project (aka PLP) file.
2011-09-14
Metasploit
cpe:2.3:a:acdsee:fotoslate:4.0:*:*:*:*:*:*:*
CVE-2011-2653
0
null
0.85146
Directory traversal vulnerability in the rtrlet component in Novell ZENworks Asset Management (ZAM) 7.5 allows remote attackers to execute arbitrary code by uploading an executable file.
2011-12-08
Metasploit
cpe:2.3:a:novell:zenworks_asset_management:7.5:*:*:*:*:*:*:*
CVE-2011-2657
0
null
0.74401
Directory traversal vulnerability in the LaunchProcess function in the LaunchHelp.HelpLauncher.1 ActiveX control in LaunchHelp.dll in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.2, 10.3, and 11 SP1 allows remote attackers to execute arbitrary commands via a pathname in the first argument.
2012-07-26
Metasploit
cpe:2.3:a:novell:zenworks_configuration_management:10.2:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11:sp1:*:*:*:*:*:*
CVE-2011-2744
0
null
0.11749
Directory traversal vulnerability in Chyrp 2.1 and earlier allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the action parameter to the default URI.
2011-07-19
Nuclei
cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:*;cpe:2.3:a:chyrp:chyrp:2.0:*:*:*:*:*:*:*;cpe:2.3:a:chyrp:chyrp:2.1:beta1:*:*:*:*:*:*;cpe:2.3:a:chyrp:chyrp:2.1:beta2:*:*:*:*:*:*;cpe:2.3:a:chyrp:chyrp:2.1:rc:*:*:*:*:*:*
CVE-2011-2750
0
null
0.65376
NFRAgent.exe in Novell File Reporter 1.0.4.2 and earlier allows remote attackers to delete arbitrary files via a full pathname in an SRS OPERATION 4 CMD 5 request to /FSF/CMD.
2011-07-17
Metasploit
cpe:2.3:a:novell:file_reporter:*:*:*:*:*:*:*:*;cpe:2.3:a:novell:file_reporter:1.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:file_reporter:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:file_reporter:1.0.2:*:*:*:*:*:*:*
CVE-2011-2763
0
null
0.7071
The web interface on the LifeSize Room appliance LS_RM1_3.5.3 (11) and 4.7.18 allows remote attackers to execute arbitrary commands via a modified request to the LSRoom_Remoting.doCommand function in gateway.php.
2011-09-02
Metasploit
cpe:2.3:a:lifesize:lifesize_room_appliance_software:4.7.18:*:*:*:*:*:*:*;cpe:2.3:a:lifesize:lifesize_room_appliance_software:ls_rm1_3.5.3:*:*:*:*:*:*:*;cpe:2.3:h:lifesize:lifesize_room_appliance:*:*:*:*:*:*:*:*
CVE-2011-2780
0
null
0.05859
Directory traversal vulnerability in includes/lib/gz.php in Chyrp 2.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, a different vulnerability than CVE-2011-2744.
2011-07-19
Nuclei
cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:*
CVE-2011-2882
0
null
0.75017
Stack-based buffer overflow in the NSEPA.NsepaCtrl.1 ActiveX control in nsepa.ocx in Citrix Access Gateway Enterprise Edition 8.1 before 8.1-67.7, 9.0 before 9.0-70.5, and 9.1 before 9.1-96.4 allows remote attackers to execute arbitrary code via crafted HTTP header data.
2011-07-21
Metasploit
cpe:2.3:a:citrix:access_gateway:8.1:*:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:9.0:*:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:9.1:*:enterprise:*:*:*:*:*
CVE-2011-2921
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.71594
ktsuss versions 1.4 and prior has the uid set to root and does not drop privileges prior to executing user specified commands, which can result in command execution with root privileges.
2019-11-19
Metasploit
cpe:2.3:a:ktsuss_project:ktsuss:*:*:*:*:*:*:*:*
CVE-2011-2950
0
null
0.70013
Heap-based buffer overflow in qcpfformat.dll in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.5 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a crafted QCP file.
2011-08-18
Metasploit
cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*
CVE-2011-3011
0
null
0.65966
BaseServiceImpl.class in CA ARCserve D2D r15 does not properly handle sessions, which allows remote attackers to obtain credentials, and consequently execute arbitrary commands, via unspecified vectors.
2011-08-15
Metasploit
cpe:2.3:a:ca:arcserve_d2d:r15:*:*:*:*:*:*:*
CVE-2011-3167
0
null
0.7621
Unspecified vulnerability in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1210.
2011-11-02
Metasploit
cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*
CVE-2011-3171
0
null
0.0002
Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwrite arbitrary files via unknown vectors.
2011-11-04
Nuclei
cpe:2.3:a:pureftpd:pure-ftpd:*:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.90:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.91:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.92:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.93:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.94:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre2:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre3:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre4:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.96.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.96:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.96:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97-final:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.3:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.4:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.5:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.6:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre2:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre3:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre2:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre3:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre4:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre5:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.2:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.3:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.4:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.5:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.6:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.7:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98:final:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98:pre2:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:b:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.2:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.3:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.4:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.9:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99:b:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99:pre2:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.10:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.11:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.12:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.13:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.14:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.15:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:b:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:c:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.17:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.17:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.18:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.19:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.20:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.21:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.9:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:vmware:*:*:*:*:*
CVE-2011-3175
0
null
0.76219
Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x6c request.
2012-04-09
Metasploit
cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.1a:*:*:*:*:*:*:*
CVE-2011-3176
0
null
0.836
Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x4c request.
2012-04-09
Metasploit
cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.1a:*:*:*:*:*:*:*
CVE-2011-3192
0
null
0.92835
The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
2011-08-29
Metasploit
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:*
CVE-2011-3200
0
null
0.64777
Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.
2011-09-06
Metasploit
cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.6:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.7:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.10:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.4:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.5:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.6:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.7:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.8:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.9:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.8.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.8.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.8.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.8.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.8.4:*:*:*:*:*:*:*
CVE-2011-3230
0
null
0.67284
Apple Safari before 5.1.1 on Mac OS X does not enforce an intended policy for file: URLs, which allows remote attackers to execute arbitrary code via a crafted web site.
2011-10-14
Metasploit
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
CVE-2011-3305
0
null
0.42002
Directory traversal vulnerability in Cisco Network Admission Control (NAC) Manager 4.8.x allows remote attackers to read arbitrary files via crafted traffic to TCP port 443, aka Bug ID CSCtq10755.
2011-10-06
Metasploit
cpe:2.3:a:cisco:nac_manager:4.8:*:*:*:*:*:*:*;cpe:2.3:a:cisco:nac_manager:4.8\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:nac_manager:4.8\(2\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:nac_appliance:*:*:*:*:*:*:*:*