CVE
stringlengths 13
16
| CVSS Score
float64 0
10
| CVSS_Vector
stringclasses 257
values | EPSS
float64 0
0.95
| Description
stringlengths 28
3.79k
| Published
stringdate 1990-08-14 00:00:00
2025-10-05 00:00:00
| Source
stringclasses 7
values | CPE
stringlengths 33
51k
⌀ |
|---|---|---|---|---|---|---|---|
CVE-2010-4344
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.61461
|
Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
|
2010-12-14
|
Metasploit/CISA
|
cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
|
CVE-2010-4345
| 7.8
|
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| 0.04024
|
Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
|
2010-12-14
|
Metasploit/CISA
|
cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
|
CVE-2010-4398
| 7.8
|
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| 0.12712
|
Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges, and bypass the User Account Control (UAC) feature, via a crafted REG_BINARY value for a SystemDefaultEUDCFont registry key, aka "Driver Improper Interaction with Windows Kernel Vulnerability."
|
2010-12-06
|
CISA
|
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
|
CVE-2010-4417
| 0
| null | 0.72458
|
Unspecified vulnerability in the Services for Beehive component in Oracle Fusion Middleware 2.0.1.0, 2.0.1.1, 2.0.1.2, 2.0.1.2.1, and 2.0.1.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that voice-servlet/prompt-qa/Index.jspf does not properly handle null (%00) bytes in the evaluation parameter that is used in a filename, which allows attackers to create a file with an executable extension and execute arbitrary JSP code.
|
2011-01-19
|
Metasploit
|
cpe:2.3:a:oracle:beehive:2.0.1.0:*:*:*:*:*:*:*;cpe:2.3:a:oracle:beehive:2.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:beehive:2.0.1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:beehive:2.0.1.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:beehive:2.0.1.3:*:*:*:*:*:*:*
|
CVE-2010-4452
| 0
| null | 0.87785
|
Unspecified vulnerability in the Deployment component in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.
|
2011-02-17
|
Metasploit
|
cpe:2.3:a:sun:jdk:*:update_23:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*;cpe:2.3:a:sun:jre:*:update_23:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*;cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
|
CVE-2010-4566
| 0
| null | 0.71849
|
The web authentication form in the NT4 authentication component in Citrix Access Gateway Enterprise Edition 9.2-49.8 and earlier, and the NTLM authentication component in Access Gateway Standard and Advanced Editions before Access Gateway 5.0, allows attackers to execute arbitrary commands via shell metacharacters in the password field.
|
2011-01-14
|
Metasploit
|
cpe:2.3:a:citrix:access_gateway:*:*:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:.8.0:m50.3:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5.5:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5.6:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5.7:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5:*:advanced:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5:hf1:*:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.5:hf1:advanced:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.6.1:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.6.2:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:4.6.3:*:standard:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:8.0:m48.7:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:8.0:m49.2:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:8.0:m59.1:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:8.1-69.4:*:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:9.0.71.3:*:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:9.1-104.5:*:enterprise:*:*:*:*:*
|
CVE-2010-4617
| 0
| null | 0.00377
|
Directory traversal vulnerability in the JotLoader (com_jotloader) component 2.2.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the section parameter to index.php.
|
2010-12-29
|
Nuclei
|
cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:kanich:com_jotloader:2.2.1:*:*:*:*:*:*:*
|
CVE-2010-4719
| 0
| null | 0.03407
|
Directory traversal vulnerability in JRadio (com_jradio) component before 1.5.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
|
2011-02-01
|
Nuclei
|
cpe:2.3:a:fxwebdesign:com_jradio:*:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
CVE-2010-4740
| 0
| null | 0.5913
|
Stack-based buffer overflow in WTclient.dll in SCADA Engine BACnet OPC Client before 1.0.25 allows user-assisted remote attackers to execute arbitrary code via a crafted .csv file, related to a status log message.
|
2011-02-16
|
Metasploit
|
cpe:2.3:a:scadaengine:bacnet_opc_client:*:*:*:*:*:*:*:*
|
CVE-2010-4741
| 0
| null | 0.48589
|
Stack-based buffer overflow in MDMUtil.dll in MDMTool.exe in MDM Tool before 2.3 in Moxa Device Manager allows remote MDM Gateways to execute arbitrary code via crafted data in a session on TCP port 54321.
|
2011-02-18
|
Metasploit
|
cpe:2.3:a:moxa:device_manager:*:*:*:*:*:*:*:*;cpe:2.3:a:moxa:mdm_tool:*:*:*:*:*:*:*:*
|
CVE-2010-4742
| 0
| null | 0.50638
|
Stack-based buffer overflow in a certain ActiveX control in MediaDBPlayback.DLL 2.2.0.5 in the Moxa ActiveX SDK allows remote attackers to execute arbitrary code via a long PlayFileName property value.
|
2011-02-18
|
Metasploit
|
cpe:2.3:a:moxa:activex_sdk:*:*:*:*:*:*:*:*
|
CVE-2010-4769
| 0
| null | 0.02614
|
Directory traversal vulnerability in the Jimtawl (com_jimtawl) component 1.0.2 Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the task parameter to index.php.
|
2011-03-23
|
Nuclei
|
cpe:2.3:a:janguo:com_jimtawl:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
CVE-2010-4804
| 0
| null | 0.63498
|
The Android browser in Android before 2.3.4 allows remote attackers to obtain SD card contents via crafted content:// URIs, related to (1) BrowserActivity.java and (2) BrowserSettings.java in com/android/browser/.
|
2011-06-09
|
Metasploit
|
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:1.5:*:*:*:*:*:*:*;cpe:2.3:o:google:android:1.6:*:*:*:*:*:*:*;cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*;cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*;cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*;cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*;cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*;cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*
|
CVE-2010-4977
| 0
| null | 0.03909
|
SQL injection vulnerability in menu.php in the Canteen (com_canteen) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the mealid parameter to index.php.
|
2011-11-01
|
Nuclei
|
cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*;cpe:2.3:a:miniwork:com_canteen:1.0:*:*:*:*:*:*:*
|
CVE-2010-5028
| 0
| null | 0.09308
|
SQL injection vulnerability in the JExtensions JE Job (com_jejob) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in an item action to index.php.
|
2011-11-02
|
Nuclei
|
cpe:2.3:a:harmistechnology:com_jejob:1.0:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
CVE-2010-5081
| 0
| null | 0.59696
|
Stack-based buffer overflow in Mini-Stream RM-MP3 Converter 3.1.2.1 allows remote attackers to execute arbitrary code via a long URL in a .pls file.
|
2011-12-25
|
Metasploit
|
cpe:2.3:a:mini-stream:rm-mp3_converter:3.1.2.1:*:*:*:*:*:*:*
|
CVE-2010-5193
| 0
| null | 0.55762
|
Stack-based buffer overflow in the TIFMergeMultiFiles function in the SCRIBBLE.ScribbleCtrl.1 ActiveX control (ImageViewer2.ocx) in Viscom Image Viewer CP Pro 8.0 and Gold 6.0 allows remote attackers to execute arbitrary code via a long strDelimit parameter.
|
2012-08-31
|
Metasploit
|
cpe:2.3:a:viscomsoft:image_viewer_cp_gold_sdk:6.0:*:*:*:*:*:*:*;cpe:2.3:a:viscomsoft:image_viewer_cp_pro_sdk:8.0:*:*:*:*:*:*:*
|
CVE-2010-5278
| 0
| null | 0.19684
|
Directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter. NOTE: some of these details are obtained from third party information.
|
2012-10-07
|
Nuclei
|
cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:*
|
CVE-2010-5286
| 0
| null | 0.32162
|
Directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
|
2012-11-26
|
Nuclei
|
cpe:2.3:a:joobi:com_jstore:-:*:*:*:*:*:*:*;cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
CVE-2010-5299
| 0
| null | 0.68264
|
Stack-based buffer overflow in MicroP 0.1.1.1600 allows remote attackers to execute arbitrary code via a crafted .mppl file. NOTE: it has been reported that the overflow is in the lpFileName parameter of the CreateFileA function, but the overflow is probably caused by a separate, unnamed function.
|
2014-05-23
|
Metasploit
|
cpe:2.3:a:microp_project:microp:0.1.1.1600:*:*:*:*:*:*:*
|
CVE-2010-5324
| 0
| null | 0.7407
|
Directory traversal vulnerability in UploadServlet in the Remote Management component in Novell ZENworks Configuration Management (ZCM) 10 before 10.3 allows remote attackers to execute arbitrary code via a zenworks-fileupload request with a crafted directory name in the type parameter, in conjunction with a WAR filename in the filename parameter and WAR content in the POST data, a different vulnerability than CVE-2010-5323.
|
2015-06-07
|
Metasploit
|
cpe:2.3:a:novell:zenworks_configuration_management:10.0:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:10.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:10.2:*:*:*:*:*:*:*
|
CVE-2010-5326
| 10
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
| 0.26416
|
The Invoker Servlet on SAP NetWeaver Application Server Java platforms, possibly before 7.3, does not require authentication, which allows remote attackers to execute arbitrary code via an HTTP or HTTPS request, as exploited in the wild in 2013 through 2016, aka a "Detour" attack.
|
2016-05-13
|
CISA
|
cpe:2.3:a:sap:netweaver_application_server_java:*:*:*:*:*:*:*:*
|
CVE-2010-5330
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.52725
|
On certain Ubiquiti devices, Command Injection exists via a GET request to stainfo.cgi (aka Show AP info) because the ifname variable is not sanitized, as demonstrated by shell metacharacters. The fixed version is v4.0.1 for 802.11 ISP products, v5.3.5 for AirMax ISP products, and v5.4.5 for AirSync firmware. For example, Nanostation5 (Air OS) is affected.
|
2019-06-11
|
CISA
|
cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*
|
CVE-2011-0049
| 0
| null | 0.91269
|
Directory traversal vulnerability in the _list_file_get function in lib/Majordomo.pm in Majordomo 2 before 20110131 allows remote attackers to read arbitrary files via .. (dot dot) sequences in the help command, as demonstrated using (1) a crafted email and (2) cgi-bin/mj_wwwusr in the web interface.
|
2011-02-04
|
Metasploit/Nuclei
|
cpe:2.3:a:mj2:majordomo_2:*:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110101:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110102:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110103:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110104:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110105:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110106:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110107:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110108:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110109:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110110:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110111:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110112:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110113:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110114:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110115:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110116:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110117:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110118:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110119:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110120:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110121:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110122:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110123:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110124:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110125:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110126:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110127:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110128:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110129:*:*:*:*:*:*:*
|
CVE-2011-0063
| 0
| null | 0.89981
|
The _list_file_get function in lib/Majordomo.pm in Majordomo 2 20110203 and earlier allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ./.../ sequence in the "extra" parameter to the help command, which causes the regular expression to produce .. (dot dot) sequences. NOTE: this vulnerability is due to an incomplete fix for CVE-2011-0049.
|
2011-03-15
|
Metasploit
|
cpe:2.3:a:mj2:majordomo_2:*:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110101:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110102:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110103:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110104:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110105:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110106:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110107:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110108:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110109:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110110:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110111:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110112:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110113:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110114:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110115:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110116:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110117:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110118:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110119:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110120:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110121:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110122:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110123:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110124:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110125:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110126:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110127:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110128:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110129:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110130:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110131:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110201:*:*:*:*:*:*:*;cpe:2.3:a:mj2:majordomo_2:20110202:*:*:*:*:*:*:*
|
CVE-2011-0065
| 0
| null | 0.83259
|
Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.
|
2011-05-07
|
Metasploit
|
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
|
CVE-2011-0073
| 0
| null | 0.81161
|
Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, does not properly use nsTreeRange data structures, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer."
|
2011-05-07
|
Metasploit
|
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
|
CVE-2011-0105
| 0
| null | 0.89418
|
Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac obtain a certain length value from an uninitialized memory location, which allows remote attackers to trigger a buffer overflow and execute arbitrary code via a crafted Excel file, aka "Excel Data Initialization Vulnerability."
|
2011-04-13
|
Metasploit
|
cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*;cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*;cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*
|
CVE-2011-0257
| 0
| null | 0.83296
|
Integer signedness error in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PnSize opcode in a PICT file that triggers a stack-based buffer overflow.
|
2011-08-15
|
Metasploit
|
cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.7:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.6.8:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.66.71.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime:7.67.75.0:*:*:*:*:*:*:*
|
CVE-2011-0266
| 0
| null | 0.77535
|
Buffer overflow in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long nameParams parameter, a different vulnerability than CVE-2011-0267.2.
|
2011-01-13
|
Metasploit
|
cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*
|
CVE-2011-0267
| 0
| null | 0.78987
|
Multiple buffer overflows in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allow remote attackers to execute arbitrary code via a long (1) schdParams or (2) nameParams parameter, a different vulnerability than CVE-2011-0266.
|
2011-01-13
|
Metasploit
|
cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*
|
CVE-2011-0276
| 0
| null | 0.85731
|
HP OpenView Performance Insight Server 5.2, 5.3, 5.31, 5.4, and 5.41 contains a "hidden account" in the com.trinagy.security.XMLUserManager Java class, which allows remote attackers to execute arbitrary code via the doPost method in the com.trinagy.servlet.HelpManagerServlet class.
|
2011-02-02
|
Metasploit
|
cpe:2.3:a:hp:openview_performance_insight:5.2:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_performance_insight:5.31:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_performance_insight:5.3:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_performance_insight:5.41:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_performance_insight:5.4:*:*:*:*:*:*:*
|
CVE-2011-0340
| 0
| null | 0.47349
|
Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method.
|
2011-05-04
|
Metasploit
|
cpe:2.3:a:advantech:advantech_studio:6.1:sp6_61.6.01.05:*:*:*:*:*:*;cpe:2.3:a:indusoft:thin_client:7.0:*:*:*:*:*:*:*;cpe:2.3:a:indusoft:web_studio:*:*:*:*:*:*:*:*;cpe:2.3:a:indusoft:web_studio:6.1:*:*:*:*:*:*:*;cpe:2.3:a:indusoft:web_studio:6.1:sp6:*:*:*:*:*:*
|
CVE-2011-0404
| 0
| null | 0.78809
|
Stack-based buffer overflow in NetSupport Manager Agent for Linux 11.00, for Solaris 9.50, and for Mac OS X 11.00 allows remote attackers to execute arbitrary code via a long control hostname to TCP port 5405, probably a different vulnerability than CVE-2007-5252.
|
2011-01-11
|
Metasploit
|
cpe:2.3:a:netsupport:netsupport_manager_agent:11.00:*:linux:*:*:*:*:*;cpe:2.3:a:netsupport:netsupport_manager_agent:11.00:*:mac_os_x:*:*:*:*:*;cpe:2.3:a:netsupport:netsupport_manager_agent:9.50:*:solaris:*:*:*:*:*
|
CVE-2011-0499
| 0
| null | 0.59532
|
Buffer overflow in VideoSpirit Pro 1.6.8.1 and possibly earlier versions, and VideoSpirit Lite 1.4.0.1 and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via a VideoSpirit project (.visprj) file containing a valitem element with a long "name" attribute. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
2011-01-20
|
Metasploit
|
cpe:2.3:a:verytools:videospirit_lite:*:*:*:*:*:*:*:*;cpe:2.3:a:verytools:videospirit_pro:*:*:*:*:*:*:*:*;cpe:2.3:a:verytools:videospirit_pro:1.68:*:*:*:*:*:*:*
|
CVE-2011-0500
| 0
| null | 0.64306
|
Buffer overflow in VideoSpirit Pro 1.6.8.1, 1.68, and earlier; and VideoSpirit Lite 1.4.0.1 and possibly other versions; allows user-assisted remote attackers to execute arbitrary code via a VideoSpirit project (.visprj) file containing a valitem element with a long "value" attribute, as demonstrated using a valitem with the mp3 name.
|
2011-01-20
|
Metasploit
|
cpe:2.3:a:verytools:videospirit_lite:1.4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:verytools:videospirit_pro:*:*:*:*:*:*:*:*;cpe:2.3:a:verytools:videospirit_pro:1.6.8.1:*:*:*:*:*:*:*
|
CVE-2011-0514
| 0
| null | 0.71443
|
The RDS service (rds.exe) in HP Data Protector Manager 6.11 allows remote attackers to cause a denial of service (crash) via a packet with a large data size to TCP port 1530.
|
2011-01-20
|
Metasploit
|
cpe:2.3:a:hp:data_protector_manager:6.11:*:*:*:*:*:*:*
|
CVE-2011-0517
| 0
| null | 0.71601
|
Stack-based buffer overflow in Sielco Sistemi Winlog Pro 2.07.00 and earlier, when Run TCP/IP server is enabled, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted 0x02 opcode to TCP port 46823.
|
2011-01-20
|
Metasploit
|
cpe:2.3:a:sielcosistemi:winlog_pro:*:*:*:*:*:*:*:*
|
CVE-2011-0518
| 0
| null | 0.6172
|
Directory traversal vulnerability in core/lib/router.php in LotusCMS Fraise 3.0, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via the system parameter to index.php.
|
2011-01-20
|
Metasploit
|
cpe:2.3:a:lotuscms:fraise:3.0:*:*:*:*:*:*:*
|
CVE-2011-0531
| 0
| null | 0.73766
|
demux/mkv/mkv.hpp in the MKV demuxer plugin in VideoLAN VLC media player 1.1.6.1 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary commands via a crafted MKV (WebM or Matroska) file that triggers memory corruption, related to "class mismatching" and the MKV_IS_ID macro.
|
2011-02-07
|
Metasploit
|
cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
|
CVE-2011-0609
| 7.8
|
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| 0.92398
|
Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011.
|
2011-03-15
|
Metasploit/CISA
|
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*
|
CVE-2011-0611
| 8.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| 0.92899
|
Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011.
|
2011-04-13
|
Metasploit/CISA
|
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:google:android:-:*:*:*:*:*:*:*;cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
|
CVE-2011-0647
| 0
| null | 0.72633
|
The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542.
|
2011-02-10
|
Metasploit
|
cpe:2.3:a:emc:networker_module:2.1:-:microsoft_applications:*:*:*:*:*;cpe:2.3:a:emc:networker_module:2.2:-:microsoft_applications:*:*:*:*:*;cpe:2.3:a:emc:replication_manager:*:*:client:*:*:*:*:*;cpe:2.3:a:emc:replication_manager:2.0:*:client:*:*:*:*:*;cpe:2.3:a:emc:replication_manager:5.2.2:*:client:*:*:*:*:*;cpe:2.3:a:emc:replication_manager:5.2:*:client:*:*:*:*:*
|
CVE-2011-0654
| 0
| null | 0.81012
|
Integer underflow in the BowserWriteErrorLogEntry function in the Common Internet File System (CIFS) browser service in Mrxsmb.sys or bowser.sys in Active Directory in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via a malformed BROWSER ELECTION message, leading to a heap-based buffer overflow, aka "Browser Pool Corruption Vulnerability." NOTE: some of these details are obtained from third party information.
|
2011-02-16
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:r2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:r2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
|
CVE-2011-0657
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.46929
|
DNSAPI.dll in the DNS client in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process DNS queries, which allows remote attackers to execute arbitrary code via (1) a crafted LLMNR broadcast query or (2) a crafted application, aka "DNS Query Vulnerability."
|
2011-04-13
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
|
CVE-2011-0762
| 0
| null | 0.36866
|
The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.
|
2011-03-02
|
Metasploit/Nuclei
|
cpe:2.3:a:vsftpd_project:vsftpd:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
|
CVE-2011-0807
| 0
| null | 0.87545
|
Unspecified vulnerability in Oracle Sun GlassFish Enterprise Server 2.1, 2.1.1, and 3.0.1, and Sun Java System Application Server 9.1, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Administration.
|
2011-04-20
|
Metasploit
|
cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:glassfish_server:2.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:sun:java_system_application_server:9.1:*:*:*:*:*:*:*
|
CVE-2011-0922
| 0
| null | 0.82006
|
The client in HP Data Protector allows remote attackers to execute arbitrary programs via an EXEC_SETUP command that references a UNC share pathname.
|
2011-02-09
|
Metasploit
|
cpe:2.3:a:hp:data_protector:*:*:*:*:*:*:*:*
|
CVE-2011-0923
| 0
| null | 0.89891
|
The client in HP Data Protector does not properly validate EXEC_CMD arguments, which allows remote attackers to execute arbitrary Perl code via a crafted command, related to the "local bin directory."
|
2011-02-09
|
Metasploit
|
cpe:2.3:a:hp:data_protector:*:*:*:*:*:*:*:*
|
CVE-2011-0951
| 0
| null | 0.65335
|
The web-based management interface in Cisco Secure Access Control System (ACS) 5.1 before 5.1.0.44.6 and 5.2 before 5.2.0.26.3 allows remote attackers to change arbitrary user passwords via unspecified vectors, aka Bug ID CSCtl77440.
|
2011-04-04
|
Metasploit
|
cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.3:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.4:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.5:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26.2:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26:*:*:*:*:*:*:*;cpe:2.3:a:cisco:secure_access_control_system:5.2:*:*:*:*:*:*:*
|
CVE-2011-1140
| 0
| null | 0.30766
|
Multiple stack consumption vulnerabilities in the dissect_ms_compressed_string and dissect_mscldap_string functions in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allow remote attackers to cause a denial of service (infinite recursion) via a crafted (1) SMB or (2) Connection-less LDAP (CLDAP) packet.
|
2011-03-03
|
Metasploit
|
cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.10:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.11:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.12:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.13:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.14:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.15:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.16:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.10:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.11:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.12:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.13:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.14:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*
|
CVE-2011-1213
| 0
| null | 0.78656
|
Integer underflow in lzhsr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via a crafted header in a .lzh attachment that triggers a stack-based buffer overflow, aka SPR PRAD88MJ2W.
|
2011-05-31
|
Metasploit
|
cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:3.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:3.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:3.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.6.7a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.6.7h:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:4.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.1.02:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.1a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.1b:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.1c:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.2a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.2b:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.2c:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.4a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.5.01:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.5.02:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.6a.01:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.6a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.7a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0.9a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.02:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:5.0a:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.1:cf1:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.1:cf2:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.1:cf3:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.2:cf1:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.2:cf2:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.4.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.5.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.6.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.6.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.6.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.4.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.4.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.4.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2.6:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.0.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.2:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.3:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.4:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1.5:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:lotus_notes:8.5:*:*:*:*:*:*:*
|
CVE-2011-1220
| 0
| null | 0.63306
|
Stack-based buffer overflow in lcfd.exe in Tivoli Endpoint in IBM Tivoli Management Framework 3.7.1, 4.1, 4.1.1, and 4.3.1 allows remote authenticated users to execute arbitrary code via a long opts field.
|
2011-06-02
|
Metasploit
|
cpe:2.3:a:ibm:tivoli_management_framework:3.7.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_management_framework:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_management_framework:4.1:*:*:*:*:*:*:*;cpe:2.3:a:ibm:tivoli_management_framework:4.3.1:*:*:*:*:*:*:*
|
CVE-2011-1260
| 0
| null | 0.85848
|
Microsoft Internet Explorer 8 and 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Layout Memory Corruption Vulnerability."
|
2011-06-16
|
Metasploit
|
cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
|
CVE-2011-1485
| 0
| null | 0.08018
|
Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit) 0.96 allows local users to gain privileges by executing a setuid program from pkexec, related to the use of the effective user ID instead of the real user ID.
|
2011-05-31
|
Metasploit
|
cpe:2.3:a:redhat:policykit:0.96:*:*:*:*:*:*:*
|
CVE-2011-1563
| 0
| null | 0.58365
|
Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified "On_FC_BINFILE_FCS_*FILE", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910.
|
2011-04-05
|
Metasploit
|
cpe:2.3:a:realflex:realwin:*:*:*:*:*:*:*:*;cpe:2.3:a:realflex:realwin:1.06:*:*:*:*:*:*:*;cpe:2.3:a:realflex:realwin:2.0:*:*:*:*:*:*:*
|
CVE-2011-1565
| 0
| null | 0.69054
|
Directory traversal vulnerability in IGSSdataServer.exe 9.00.00.11063 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allows remote attackers to (1) read (opcode 0x3) or (2) create or write (opcode 0x2) arbitrary files via ..\ (dot dot backslash) sequences to TCP port 12401.
|
2011-04-05
|
Metasploit
|
cpe:2.3:a:7t:igss:*:*:*:*:*:*:*:*
|
CVE-2011-1566
| 0
| null | 0.77663
|
Directory traversal vulnerability in dc.exe 9.00.00.11059 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allows remote attackers to execute arbitrary programs via ..\ (dot dot backslash) sequences in opcodes (1) 0xa and (2) 0x17 to TCP port 12397.
|
2011-04-05
|
Metasploit
|
cpe:2.3:a:7t:igss:*:*:*:*:*:*:*:*
|
CVE-2011-1567
| 0
| null | 0.78999
|
Multiple stack-based buffer overflows in IGSSdataServer.exe 9.00.00.11063 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted (1) ListAll, (2) Write File, (3) ReadFile, (4) Delete, (5) RenameFile, and (6) FileInfo commands in an 0xd opcode; (7) the Add, (8) ReadFile, (9) Write File, (10) Rename, (11) Delete, and (12) Add commands in an RMS report templates (0x7) opcode; and (13) 0x4 command in an STDREP request (0x8) opcode to TCP port 12401.
|
2011-04-05
|
Metasploit
|
cpe:2.3:a:7t:igss:*:*:*:*:*:*:*:*
|
CVE-2011-1574
| 0
| null | 0.67035
|
Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
|
2011-05-09
|
Metasploit
|
cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*;cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*
|
CVE-2011-1591
| 0
| null | 0.77801
|
Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.
|
2011-04-29
|
Metasploit
|
cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*;cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*
|
CVE-2011-1653
| 0
| null | 0.74059
|
Multiple SQL injection vulnerabilities in the Unified Network Control (UNC) Server in CA Total Defense (TD) r12 before SE2 allow remote attackers to execute arbitrary SQL commands via vectors involving the (1) UnAssignFunctionalRoles, (2) UnassignAdminRoles, (3) DeleteFilter, (4) NonAssignedUserList, (5) DeleteReportLayout, (6) DeleteReports, and (7) RegenerateReport stored procedures.
|
2011-04-18
|
Metasploit
|
cpe:2.3:a:broadcom:total_defense:r12:*:*:*:*:*:*:*
|
CVE-2011-1669
| 0
| null | 0.01195
|
Directory traversal vulnerability in wp-download.php in the WP Custom Pages module 0.5.0.1 for WordPress allows remote attackers to read arbitrary files via ..%2F (encoded dot dot) sequences in the url parameter.
|
2011-04-10
|
Nuclei
|
cpe:2.3:a:mikoviny:wp_custom_pages:0.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
|
CVE-2011-1774
| 0
| null | 0.76747
|
WebKit in Apple Safari before 5.0.6 has improper libxslt security settings, which allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via a crafted web site. NOTE: this may overlap CVE-2011-1425.
|
2011-07-21
|
Metasploit
|
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.6.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.6.9:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.6.9:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
|
CVE-2011-1823
| 7.8
|
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| 0.54882
|
The vold volume manager daemon on Android 3.0 and 2.x before 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative index that bypasses a maximum-only signed integer check in the DirectVolume::handlePartitionAdded method, which triggers memory corruption, as demonstrated by Gingerbreak.
|
2011-06-09
|
CISA
|
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*
|
CVE-2011-1865
| 0
| null | 0.87606
|
Multiple stack-based buffer overflows in the inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allow remote attackers to execute arbitrary code via a request containing crafted parameters.
|
2011-07-01
|
Metasploit
|
cpe:2.3:a:hp:openview_storage_data_protector:6.00:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_storage_data_protector:6.10:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_storage_data_protector:6.11:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_storage_data_protector:6.20:*:*:*:*:*:*:*
|
CVE-2011-1889
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.87382
|
The NSPLookupServiceNext function in the client in Microsoft Forefront Threat Management Gateway (TMG) 2010 allows remote attackers to execute arbitrary code via vectors involving unspecified requests, aka "TMG Firewall Client Memory Corruption Vulnerability."
|
2011-06-16
|
CISA
|
cpe:2.3:a:microsoft:forefront_threat_management_gateway:2010:*:*:*:*:*:*:*
|
CVE-2011-1900
| 0
| null | 0.49258
|
Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 6.1 and 7.x before 7.0+Patch 1 allows remote attackers to execute arbitrary code via an invalid request.
|
2011-05-04
|
Metasploit
|
cpe:2.3:a:indusoft:web_studio:6.1:*:*:*:*:*:*:*;cpe:2.3:a:indusoft:web_studio:7.0:*:*:*:*:*:*:*
|
CVE-2011-1996
| 0
| null | 0.79505
|
Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Option Element Remote Code Execution Vulnerability."
|
2011-10-12
|
Metasploit
|
cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:-:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
|
CVE-2011-2005
| 7.8
|
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| 0.5755
|
afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability."
|
2011-10-12
|
Metasploit/CISA
|
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*;cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
|
CVE-2011-2039
| 0
| null | 0.84123
|
The helper application in Cisco AnyConnect Secure Mobility Client (formerly AnyConnect VPN Client) before 2.3.185 on Windows, and on Windows Mobile, downloads a client executable file (vpndownloader.exe) without verifying its authenticity, which allows remote attackers to execute arbitrary code via the url property to a certain ActiveX control in vpnweb.ocx, aka Bug ID CSCsy00904.
|
2011-06-02
|
Metasploit
|
cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.0:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.1:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.128:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.133:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.136:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.140:*:*:*:*:*:*:*;cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_mobile:*:*:*:*:*:*:*:*
|
CVE-2011-2089
| 0
| null | 0.76007
|
Stack-based buffer overflow in the SetActiveXGUID method in the VersionInfo ActiveX control in GenVersion.dll 8.0.138.0 in the WebHMI subsystem in ICONICS BizViz 9.x before 9.22 and GENESIS32 9.x before 9.22 allows remote attackers to execute arbitrary code via a long string in the argument. NOTE: some of these details are obtained from third party information.
|
2011-05-13
|
Metasploit
|
cpe:2.3:a:iconics:bizviz:9.01:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.0:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.13:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.1:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.20:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.21:*:*:*:*:*:*:*;cpe:2.3:a:iconics:bizviz:9.2:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.01:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.0:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.13:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.1:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.20:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.21:*:*:*:*:*:*:*;cpe:2.3:a:iconics:genesis32:9.2:*:*:*:*:*:*:*
|
CVE-2011-2110
| 0
| null | 0.9143
|
Adobe Flash Player before 10.3.181.26 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.23 and earlier on Android, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in June 2011.
|
2011-06-16
|
Metasploit
|
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.154.25:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.156.12:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.157.51:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.185.21:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*
|
CVE-2011-2140
| 0
| null | 0.89835
|
Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425.
|
2011-08-10
|
Metasploit
|
cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.154.25:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.156.12:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.157.51:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.23:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.185.21:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:10.3.185.23:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*;cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:google:android:*:*:*:*:*:*:*:*;cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*
|
CVE-2011-2217
| 0
| null | 0.88252
|
Certain ActiveX controls in (1) tsgetxu71ex552.dll and (2) tsgetx71ex552.dll in Tom Sawyer GET Extension Factory 5.5.2.237, as used in VI Client (aka VMware Infrastructure Client) 2.0.2 before Build 230598 and 2.5 before Build 204931 in VMware Infrastructure 3, do not properly handle attempted initialization within Internet Explorer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HTML document.
|
2011-06-06
|
Metasploit
|
cpe:2.3:a:tomsawyer:get_extension_factory:5.5.2.237:*:*:*:*:*:*:*;cpe:2.3:a:vmware:infrastructure:3:*:*:*:*:*:*:*;cpe:2.3:a:vmware:virtual_infrastructure_client:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:vmware:virtual_infrastructure_client:2.5:*:*:*:*:*:*:*
|
CVE-2011-2371
| 0
| null | 0.87002
|
Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
|
2011-06-30
|
Metasploit
|
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*;cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*;cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.6:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.7:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.8:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1.9:*:*:*:*:*:*:*;cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*
|
CVE-2011-2386
| 0
| null | 0.74908
|
VisiWaveReport.exe in AZO Technologies, Inc. VisiWave Site Survey before 2.1.9 allows user-assisted remote attackers to execute arbitrary code via a (1) vws and (2) vwr file with an invalid Type property, which triggers an untrusted pointer dereference.
|
2011-06-08
|
Metasploit
|
cpe:2.3:a:visiwave:site_survey:*:*:*:*:*:*:*:*;cpe:2.3:a:visiwave:site_survey:1.6.12:*:*:*:*:*:*:*;cpe:2.3:a:visiwave:site_survey:2.0.12:*:*:*:*:*:*:*
|
CVE-2011-2404
| 0
| null | 0.80489
|
A certain ActiveX control in HPTicketMgr.dll in HP Easy Printer Care Software 2.5 and earlier allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via unspecified vectors, a different vulnerability than CVE-2011-4786 and CVE-2011-4787.
|
2011-08-11
|
Metasploit
|
cpe:2.3:a:hp:easy_printer_care_software:*:*:*:*:*:*:*:*
|
CVE-2011-2462
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.9255
|
Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.
|
2011-12-07
|
Metasploit/CISA
|
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*;cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*;cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*
|
CVE-2011-2474
| 0
| null | 0.08976
|
Directory traversal vulnerability in the HTTP Server in Sybase EAServer 6.3.1 Developer Edition allows remote attackers to read arbitrary files via a /.\../\../\ sequence in a path.
|
2011-06-09
|
Metasploit
|
cpe:2.3:a:sybase:easerver:6.3.1:*:developer:*:*:*:*:*
|
CVE-2011-2523
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.94261
|
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
|
2019-11-27
|
Nuclei
|
cpe:2.3:a:vsftpd_project:vsftpd:2.3.4:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
CVE-2011-2595
| 0
| null | 0.74003
|
Multiple stack-based buffer overflows in ACDSee FotoSlate 4.0 Build 146 allow remote attackers to execute arbitrary code via a long id parameter in a (1) String or (2) Int tag in a FotoSlate Project (aka PLP) file.
|
2011-09-14
|
Metasploit
|
cpe:2.3:a:acdsee:fotoslate:4.0:*:*:*:*:*:*:*
|
CVE-2011-2653
| 0
| null | 0.85146
|
Directory traversal vulnerability in the rtrlet component in Novell ZENworks Asset Management (ZAM) 7.5 allows remote attackers to execute arbitrary code by uploading an executable file.
|
2011-12-08
|
Metasploit
|
cpe:2.3:a:novell:zenworks_asset_management:7.5:*:*:*:*:*:*:*
|
CVE-2011-2657
| 0
| null | 0.74401
|
Directory traversal vulnerability in the LaunchProcess function in the LaunchHelp.HelpLauncher.1 ActiveX control in LaunchHelp.dll in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.2, 10.3, and 11 SP1 allows remote attackers to execute arbitrary commands via a pathname in the first argument.
|
2012-07-26
|
Metasploit
|
cpe:2.3:a:novell:zenworks_configuration_management:10.2:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11:sp1:*:*:*:*:*:*
|
CVE-2011-2744
| 0
| null | 0.11749
|
Directory traversal vulnerability in Chyrp 2.1 and earlier allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the action parameter to the default URI.
|
2011-07-19
|
Nuclei
|
cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:*;cpe:2.3:a:chyrp:chyrp:2.0:*:*:*:*:*:*:*;cpe:2.3:a:chyrp:chyrp:2.1:beta1:*:*:*:*:*:*;cpe:2.3:a:chyrp:chyrp:2.1:beta2:*:*:*:*:*:*;cpe:2.3:a:chyrp:chyrp:2.1:rc:*:*:*:*:*:*
|
CVE-2011-2750
| 0
| null | 0.65376
|
NFRAgent.exe in Novell File Reporter 1.0.4.2 and earlier allows remote attackers to delete arbitrary files via a full pathname in an SRS OPERATION 4 CMD 5 request to /FSF/CMD.
|
2011-07-17
|
Metasploit
|
cpe:2.3:a:novell:file_reporter:*:*:*:*:*:*:*:*;cpe:2.3:a:novell:file_reporter:1.0.1.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:file_reporter:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:file_reporter:1.0.2:*:*:*:*:*:*:*
|
CVE-2011-2763
| 0
| null | 0.7071
|
The web interface on the LifeSize Room appliance LS_RM1_3.5.3 (11) and 4.7.18 allows remote attackers to execute arbitrary commands via a modified request to the LSRoom_Remoting.doCommand function in gateway.php.
|
2011-09-02
|
Metasploit
|
cpe:2.3:a:lifesize:lifesize_room_appliance_software:4.7.18:*:*:*:*:*:*:*;cpe:2.3:a:lifesize:lifesize_room_appliance_software:ls_rm1_3.5.3:*:*:*:*:*:*:*;cpe:2.3:h:lifesize:lifesize_room_appliance:*:*:*:*:*:*:*:*
|
CVE-2011-2780
| 0
| null | 0.05859
|
Directory traversal vulnerability in includes/lib/gz.php in Chyrp 2.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, a different vulnerability than CVE-2011-2744.
|
2011-07-19
|
Nuclei
|
cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:*
|
CVE-2011-2882
| 0
| null | 0.75017
|
Stack-based buffer overflow in the NSEPA.NsepaCtrl.1 ActiveX control in nsepa.ocx in Citrix Access Gateway Enterprise Edition 8.1 before 8.1-67.7, 9.0 before 9.0-70.5, and 9.1 before 9.1-96.4 allows remote attackers to execute arbitrary code via crafted HTTP header data.
|
2011-07-21
|
Metasploit
|
cpe:2.3:a:citrix:access_gateway:8.1:*:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:9.0:*:enterprise:*:*:*:*:*;cpe:2.3:a:citrix:access_gateway:9.1:*:enterprise:*:*:*:*:*
|
CVE-2011-2921
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.71594
|
ktsuss versions 1.4 and prior has the uid set to root and does not drop privileges prior to executing user specified commands, which can result in command execution with root privileges.
|
2019-11-19
|
Metasploit
|
cpe:2.3:a:ktsuss_project:ktsuss:*:*:*:*:*:*:*:*
|
CVE-2011-2950
| 0
| null | 0.70013
|
Heap-based buffer overflow in qcpfformat.dll in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.5 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a crafted QCP file.
|
2011-08-18
|
Metasploit
|
cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*
|
CVE-2011-3011
| 0
| null | 0.65966
|
BaseServiceImpl.class in CA ARCserve D2D r15 does not properly handle sessions, which allows remote attackers to obtain credentials, and consequently execute arbitrary commands, via unspecified vectors.
|
2011-08-15
|
Metasploit
|
cpe:2.3:a:ca:arcserve_d2d:r15:*:*:*:*:*:*:*
|
CVE-2011-3167
| 0
| null | 0.7621
|
Unspecified vulnerability in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1210.
|
2011-11-02
|
Metasploit
|
cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*;cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*
|
CVE-2011-3171
| 0
| null | 0.0002
|
Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwrite arbitrary files via unknown vectors.
|
2011-11-04
|
Nuclei
|
cpe:2.3:a:pureftpd:pure-ftpd:*:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.90:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.91:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.92:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.93:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.94:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre2:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre3:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre4:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.96.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.96:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.96:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97-final:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.3:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.4:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.5:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.6:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre2:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre3:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre2:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre3:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre4:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre5:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.2:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.3:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.4:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.5:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.6:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98.7:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98:final:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.98:pre2:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:b:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.2:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.3:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.4:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99.9:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99:b:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99:pre1:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:0.99:pre2:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.10:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.11:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.12:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.13:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.14:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.15:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:b:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:c:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.17:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.17:a:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.18:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.19:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.20:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.21:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.4:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.5:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.6:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.7:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.8:*:*:*:*:*:*:*;cpe:2.3:a:pureftpd:pure-ftpd:1.0.9:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:vmware:*:*:*:*:*
|
CVE-2011-3175
| 0
| null | 0.76219
|
Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x6c request.
|
2012-04-09
|
Metasploit
|
cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.1a:*:*:*:*:*:*:*
|
CVE-2011-3176
| 0
| null | 0.836
|
Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x4c request.
|
2012-04-09
|
Metasploit
|
cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*;cpe:2.3:a:novell:zenworks_configuration_management:11.1a:*:*:*:*:*:*:*
|
CVE-2011-3192
| 0
| null | 0.92835
|
The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
|
2011-08-29
|
Metasploit
|
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*;cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*;cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*;cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*;cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*;cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:*
|
CVE-2011-3200
| 0
| null | 0.64777
|
Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.
|
2011-09-06
|
Metasploit
|
cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.6:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:4.6.7:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.10:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.4:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.5:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.6:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.7:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.8:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.7.9:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.8.0:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.8.1:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.8.2:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.8.3:*:*:*:*:*:*:*;cpe:2.3:a:rsyslog:rsyslog:5.8.4:*:*:*:*:*:*:*
|
CVE-2011-3230
| 0
| null | 0.67284
|
Apple Safari before 5.1.1 on Mac OS X does not enforce an intended policy for file: URLs, which allows remote attackers to execute arbitrary code via a crafted web site.
|
2011-10-14
|
Metasploit
|
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*;cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*;cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.3:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.5:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0.6:*:*:*:*:*:*:*;cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
|
CVE-2011-3305
| 0
| null | 0.42002
|
Directory traversal vulnerability in Cisco Network Admission Control (NAC) Manager 4.8.x allows remote attackers to read arbitrary files via crafted traffic to TCP port 443, aka Bug ID CSCtq10755.
|
2011-10-06
|
Metasploit
|
cpe:2.3:a:cisco:nac_manager:4.8:*:*:*:*:*:*:*;cpe:2.3:a:cisco:nac_manager:4.8\(1\):*:*:*:*:*:*:*;cpe:2.3:a:cisco:nac_manager:4.8\(2\):*:*:*:*:*:*:*;cpe:2.3:h:cisco:nac_appliance:*:*:*:*:*:*:*:*
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.