CVE
stringlengths 13
16
| CVSS Score
float64 0
10
| CVSS_Vector
nullclasses 257
values | EPSS
float64 0
0.95
| Description
stringlengths 28
3.79k
| Published
stringdate 1990-08-14 00:00:00
2025-10-05 00:00:00
| Source
stringclasses 7
values | CPE
stringlengths 33
51k
⌀ |
|---|---|---|---|---|---|---|---|
CVE-1999-0103
| 0
| null | 0.48093
|
Echo and chargen, or other combinations of UDP services, can be used in tandem to flood the server, a.k.a. UDP bomb or UDP packet storm.
|
1996-02-08
|
Metasploit
| null |
CVE-1999-0170
| 0
| null | 0.28135
|
Remote attackers can mount an NFS file system in Ultrix or OSF, even if it is denied on the access list.
|
1997-01-01
|
Metasploit
|
cpe:2.3:o:digital:ultrix:*:*:*:*:*:*:*:*
|
CVE-1999-0209
| 0
| null | 0.42142
|
The SunView (SunTools) selection_svc facility allows remote users to read files.
|
1990-08-14
|
Metasploit
|
cpe:2.3:o:sun:sunos:3.5:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.0.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.0.2:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.0:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*
|
CVE-1999-0256
| 0
| null | 0.82403
|
Buffer overflow in War FTP allows remote execution of commands.
|
1998-02-01
|
Metasploit
|
cpe:2.3:a:jgaa:warftpd:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*
|
CVE-1999-0502
| 0
| null | 0.42282
|
A Unix account has a default, null, blank, or missing password.
|
1998-03-01
|
Metasploit
|
cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11:*:*:*:*:*:*:*;cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
|
CVE-1999-0504
| 0
| null | 0.47095
|
A Windows NT local user or administrator account has a default, null, blank, or missing password.
|
1997-01-01
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*
|
CVE-1999-0506
| 0
| null | 0.08668
|
A Windows NT domain user or administrator account has a default, null, blank, or missing password.
|
1998-10-01
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*
|
CVE-1999-0508
| 0
| null | 0.35839
|
An account on a router, firewall, or other network device has a default, null, blank, or missing password.
|
1998-06-01
|
Metasploit
| null |
CVE-1999-0516
| 0
| null | 0.73977
|
An SNMP community name is guessable.
|
1998-08-01
|
Metasploit
| null |
CVE-1999-0517
| 0
| null | 0.92333
|
An SNMP community name is the default (e.g. public), null, or missing.
|
1997-01-01
|
Metasploit
|
cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*
|
CVE-1999-0526
| 0
| null | 0.79095
|
An X server's access control is disabled (e.g. through an "xhost +" command) and allows anyone to connect to the server.
|
1997-07-01
|
Metasploit
|
cpe:2.3:a:x.org:x11:7.1_1.1.0:*:*:*:*:*:*:*
|
CVE-1999-0532
| 0
| null | 0.82224
|
A DNS server allows zone transfers.
|
1997-07-01
|
Metasploit
| null |
CVE-1999-0554
| 0
| null | 0.25262
|
NFS exports system-critical data to the world, e.g. / or a password file.
|
1999-01-01
|
Metasploit
| null |
CVE-1999-0651
| 0
| null | 0.50061
|
The rsh/rlogin service is running.
|
1999-01-01
|
Metasploit
| null |
CVE-1999-0667
| 0
| null | 0.37846
|
The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service.
|
1997-09-19
|
Metasploit
|
cpe:2.3:h:arp_protocol:arp_protocol:*:*:*:*:*:*:*:*
|
CVE-1999-0874
| 0
| null | 0.85831
|
Buffer overflow in IIS 4.0 allows remote attackers to cause a denial of service via a malformed request for files with .HTR, .IDC, or .STM extensions.
|
1999-06-16
|
Metasploit
|
cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
|
CVE-1999-1011
| 0
| null | 0.79296
|
The Remote Data Service (RDS) DataFactory component of Microsoft Data Access Components (MDAC) in IIS 3.x and 4.x exposes unsafe methods, which allows remote attackers to execute arbitrary commands.
|
1999-07-19
|
Metasploit
|
cpe:2.3:a:microsoft:data_access_components:1.5:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:index_server:2.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*
|
CVE-1999-1053
| 0
| null | 0.88552
|
guestbook.pl cleanses user-inserted SSI commands by removing text between "<!--" and "-->" separators, which allows remote attackers to execute arbitrary commands when guestbook.pl is run on Apache 1.3.9 and possibly other versions, since Apache allows other closing sequences besides "-->".
|
1999-09-13
|
Metasploit
|
cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*;cpe:2.3:a:matt_wright:matt_wright_guestbook:2.3:*:*:*:*:*:*:*
|
CVE-1999-1510
| 0
| null | 0.77641
|
Buffer overflows in Bisonware FTP server prior to 4.1 allow remote attackers to cause a denial of service, and possibly execute arbitrary commands, via long (1) USER, (2) LIST, or (3) CWD commands.
|
1999-05-17
|
Metasploit
|
cpe:2.3:a:bisonware:bisonware_ftp_server:*:*:*:*:*:*:*:*
|
CVE-2000-0114
| 0
| null | 0.07682
|
Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
|
2000-02-02
|
Nuclei
|
cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*
|
CVE-2000-0248
| 0
| null | 0.7588
|
The web GUI for the Linux Virtual Server (LVS) software in the Red Hat Linux Piranha package has a backdoor password that allows remote attackers to execute arbitrary commands.
|
2000-04-24
|
Metasploit
|
cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*;cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*;cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*
|
CVE-2000-0284
| 0
| null | 0.79855
|
Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
|
2000-04-16
|
Metasploit
|
cpe:2.3:a:university_of_washington:imap:12.264:*:*:*:*:*:*:*
|
CVE-2000-0322
| 0
| null | 0.77767
|
The passwd.php3 CGI script in the Red Hat Piranha Virtual Server Package allows local users to execute arbitrary commands via shell metacharacters.
|
2000-04-24
|
Metasploit
|
cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*;cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*;cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*
|
CVE-2000-0380
| 0
| null | 0.85118
|
The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a URL that contains a %% string.
|
2000-04-26
|
Metasploit
|
cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(10\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(10\)bc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(17\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(4\)f1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(8\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(8\)p:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(9\)p:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2\(9\)xa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3\(1\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3\(1\)ed:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3\(1\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(1\)w:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(1\)xa3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(1\)xb:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(1\)xe:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(2\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(2\)xc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(2\)xd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(2\)xf:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(2\)xg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(3\)t2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(4\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(4\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(4\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(5\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(5\)t1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(6\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(7\)t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(8\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(9\)s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*
|
CVE-2000-0402
| 0
| null | 0.78483
|
The Mixed Mode authentication capability in Microsoft SQL Server 7.0 stores the System Administrator (sa) account in plaintext in a log file which is readable by any user, aka the "SQL Server 7.0 Service Pack Password" vulnerability.
|
2000-05-30
|
Metasploit
|
cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:7.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:7.0:sp2:*:*:*:*:*:*
|
CVE-2000-0573
| 0
| null | 0.91378
|
The lreply function in wu-ftpd 2.6.0 and earlier does not properly cleanse an untrusted format string, which allows remote attackers to execute arbitrary commands via the SITE EXEC command.
|
2000-07-07
|
Metasploit
|
cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
|
CVE-2000-0649
| 0
| null | 0.63657
|
IIS 4.0 allows remote attackers to obtain the internal IP address of the server via an HTTP 1.0 request for a web page which is protected by basic authentication and has no realm defined.
|
2000-07-13
|
Metasploit
|
cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_services:2.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*
|
CVE-2000-0665
| 0
| null | 0.7167
|
GAMSoft TelSrv telnet server 1.5 and earlier allows remote attackers to cause a denial of service via a long username.
|
2000-07-17
|
Metasploit
|
cpe:2.3:a:gamsoft:telsrv:1.4:*:*:*:*:*:*:*;cpe:2.3:a:gamsoft:telsrv:1.5:*:*:*:*:*:*:*
|
CVE-2000-0760
| 0
| null | 0.37735
|
The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.
|
2000-10-20
|
Nuclei
|
cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*;cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*
|
CVE-2000-0917
| 0
| null | 0.86092
|
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.
|
2000-12-19
|
Metasploit
|
cpe:2.3:a:caldera:openlinux_ebuilder:3.0:*:*:*:*:*:*:*;cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*;cpe:2.3:o:caldera:openlinux_edesktop:2.4:*:*:*:*:*:*:*;cpe:2.3:o:caldera:openlinux_eserver:2.3:*:*:*:*:*:*:*;cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*;cpe:2.3:o:trustix:secure_linux:1.0:*:*:*:*:*:*:*;cpe:2.3:o:trustix:secure_linux:1.1:*:*:*:*:*:*:*
|
CVE-2000-0945
| 0
| null | 0.87926
|
The web configuration interface for Catalyst 3500 XL switches allows remote attackers to execute arbitrary commands without authentication when the enable password is not set, via a URL containing the /exec/ directory.
|
2000-12-19
|
Metasploit
|
cpe:2.3:h:cisco:catalyst_3500_xl:*:*:*:*:*:*:*:*
|
CVE-2000-1089
| 0
| null | 0.73777
|
Buffer overflow in Microsoft Phone Book Service allows local users to execute arbitrary commands, aka the "Phone Book Service Buffer Overflow" vulnerability.
|
2001-01-09
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
|
CVE-2000-1209
| 0
| null | 0.89725
|
The "sa" account is installed with a default null password on (1) Microsoft SQL Server 2000, (2) SQL Server 7.0, and (3) Data Engine (MSDE) 1.0, including third party packages that use these products such as (4) Tumbleweed Secure Mail (MMS) (5) Compaq Insight Manager, and (6) Visio 2000, which allows remote attackers to gain privileges, as exploited by worms such as Voyager Alpha Force and Spida.
|
2002-08-12
|
Metasploit
|
cpe:2.3:a:compaq:insight_manager:7.0:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager:7.0:sp1:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:1.1:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:1.21:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:2.1:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:2.1b:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:2.1c:*:*:*:*:*:*:*;cpe:2.3:a:compaq:insight_manager_xe:2.2:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_engine:1.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:msde:2000:*:*:*:*:*:*:*
|
CVE-2001-0152
| 0
| null | 0.08356
|
The password protection option for the Compressed Folders feature in Plus! for Windows 98 and Windows Me writes password information to a file, which allows local users to recover the passwords and read the compressed folders.
|
2001-05-03
|
Metasploit
|
cpe:2.3:a:microsoft:plus:*:*:*:*:*:*:*:*
|
CVE-2001-0167
| 0
| null | 0.65403
|
Buffer overflow in AT&T WinVNC (Virtual Network Computing) client 3.3.3r7 and earlier allows remote attackers to execute arbitrary commands via a long rfbConnFailed packet with a long reason string.
|
2001-05-03
|
Metasploit
|
cpe:2.3:a:att:winvnc:*:*:*:*:*:*:*:*
|
CVE-2001-0168
| 0
| null | 0.67361
|
Buffer overflow in AT&T WinVNC (Virtual Network Computing) server 3.3.3r7 and earlier allows remote attackers to execute arbitrary commands via a long HTTP GET request when the DebugLevel registry key is greater than 0.
|
2001-05-03
|
Metasploit
|
cpe:2.3:a:att:winvnc:*:*:*:*:*:*:*:*
|
CVE-2001-0241
| 0
| null | 0.87613
|
Buffer overflow in Internet Printing ISAPI extension in Windows 2000 allows remote attackers to gain root privileges via a long print request that is passed to the extension through IIS 5.0.
|
2001-06-27
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
|
CVE-2001-0311
| 0
| null | 0.45881
|
Vulnerability in OmniBackII A.03.50 in HP 11.x and earlier allows attackers to gain unauthorized access to an OmniBack client.
|
2001-06-02
|
Metasploit
|
cpe:2.3:a:hp:omniback_ii:a.03.50:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*
|
CVE-2001-0333
| 0
| null | 0.8447
|
Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.
|
2001-06-27
|
Metasploit
|
cpe:2.3:a:microsoft:internet_information_server:*:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*
|
CVE-2001-0414
| 0
| null | 0.87296
|
Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long readvar argument.
|
2001-06-18
|
Metasploit
|
cpe:2.3:a:dave_mills:ntpd:*:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99a:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99b:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99c:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99d:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99e:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99f:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99g:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99h:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99i:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:ntpd:4.0.99j:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93a:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93b:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93c:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93d:*:*:*:*:*:*:*;cpe:2.3:a:dave_mills:xntp3:5.93e:*:*:*:*:*:*:*
|
CVE-2001-0499
| 0
| null | 0.74942
|
Buffer overflow in Transparent Network Substrate (TNS) Listener in Oracle 8i 8.1.7 and earlier allows remote attackers to gain privileges via a long argument to the commands (1) STATUS, (2) PING, (3) SERVICES, (4) TRC_FILE, (5) SAVE_CONFIG, or (6) RELOAD.
|
2001-07-21
|
Metasploit
|
cpe:2.3:a:oracle:oracle8i:*:*:*:*:*:*:*:*
|
CVE-2001-0500
| 0
| null | 0.90865
|
Buffer overflow in ISAPI extension (idq.dll) in Index Server 2.0 and Indexing Service 2000 in IIS 6.0 beta and earlier allows remote attackers to execute arbitrary commands via a long argument to Internet Data Administration (.ida) and Internet Data Query (.idq) files such as default.ida, as commonly exploited by Code Red.
|
2001-07-21
|
Metasploit
|
cpe:2.3:a:microsoft:index_server:2.0:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:indexing_service:*:*:windows_2000:*:*:*:*:*;cpe:2.3:a:microsoft:internet_information_server:*:beta:*:*:*:*:*:*
|
CVE-2001-0537
| 0
| null | 0.93696
|
HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.
|
2001-07-21
|
Metasploit/Nuclei
|
cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3da:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3db:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3ha:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3ma:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3na:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:11.3xa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(10\)w5\(18g\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(14\)w5\(20\):*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(5\)xk:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0\(7\)xk:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*
|
CVE-2001-0797
| 0
| null | 0.88681
|
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
|
2001-12-12
|
Metasploit
|
cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.1:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.3:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0.6a:*:*:*:*:*:*:*;cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:3.2:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:3.3.1:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:3.3.2:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:3.3.3:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:3.3:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
|
CVE-2001-0800
| 0
| null | 0.77497
|
lpsched in IRIX 6.5.13f and earlier allows remote attackers to execute arbitrary commands via shell metacharacters.
|
2001-12-06
|
Metasploit
|
cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*
|
CVE-2001-0803
| 0
| null | 0.58736
|
Buffer overflow in the client connection routine of libDtSvc.so.1 in CDE Subprocess Control Service (dtspcd) allows remote attackers to execute arbitrary commands.
|
2001-12-06
|
Metasploit
|
cpe:2.3:a:open_group:cde_common_desktop_environment:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:open_group:cde_common_desktop_environment:1.0.2:*:*:*:*:*:*:*;cpe:2.3:a:open_group:cde_common_desktop_environment:1.1:*:*:*:*:*:*:*;cpe:2.3:a:open_group:cde_common_desktop_environment:1.2:*:*:*:*:*:*:*;cpe:2.3:a:open_group:cde_common_desktop_environment:2.0:*:*:*:*:*:*:*;cpe:2.3:a:open_group:cde_common_desktop_environment:2.1:*:*:*:*:*:*:*
|
CVE-2001-1013
| 0
| null | 0.68119
|
Apache on Red Hat Linux with with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the server.
|
2001-09-12
|
Metasploit
|
cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*
|
CVE-2001-1320
| 0
| null | 0.66694
|
Network Associates PGP Keyserver 7.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via exceptional BER encodings (possibly buffer overflows), as demonstrated by the PROTOS LDAPv3 test suite.
|
2001-07-16
|
Metasploit
|
cpe:2.3:a:pgp:keyserver:7.0:*:*:*:*:*:*:*
|
CVE-2001-1473
| 0
| null | 0.04878
|
The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the attacker to compute the corresponding private key and use the target's Session ID with the compromised key pair to masquerade as the target.
|
2001-01-18
|
Nuclei
|
cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*;cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*
|
CVE-2001-1583
| 0
| null | 0.51992
|
lpd daemon (in.lpd) in Solaris 8 and earlier allows remote attackers to execute arbitrary commands via a job request with a crafted control file that is not properly handled when lpd invokes a mail program. NOTE: this might be the same vulnerability as CVE-2000-1220.
|
2001-12-31
|
Metasploit
|
cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*
|
CVE-2002-0367
| 7.8
| null | 0.01827
|
smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.
|
2002-06-25
|
CISA
|
cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:terminal_server:*:*:*
|
CVE-2002-0392
| 0
| null | 0.59304
|
Apache 1.3 through 1.3.24, and Apache 2.0 through 2.0.36, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a chunk-encoded HTTP request that causes Apache to use an incorrect size.
|
2002-07-03
|
Metasploit
|
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*
|
CVE-2002-0422
| 0
| null | 0.65016
|
IIS 5 and 5.1 supporting WebDAV methods allows remote attackers to determine the internal IP address of the system (which may be obscured by NAT) via (1) a PROPFIND HTTP request with a blank Host header, which leaks the address in an HREF property in a 207 Multi-Status response, or (2) via the WRITE or MKCOL method, which leaks the IP in the Location server header.
|
2002-08-12
|
Metasploit
|
cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*
|
CVE-2002-0649
| 0
| null | 0.86644
|
Multiple buffer overflows in the Resolution Service for Microsoft SQL Server 2000 and Microsoft Desktop Engine 2000 (MSDE) allow remote attackers to cause a denial of service or execute arbitrary code via UDP packets to port 1434 in which (1) a 0x04 byte that causes the SQL Monitor thread to generate a long registry key name, or (2) a 0x08 byte with a long string causes heap corruption, as exploited by the Slammer/Sapphire worm.
|
2002-08-12
|
Metasploit
|
cpe:2.3:a:microsoft:data_engine:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:sp2:*:*:*:*:*:*
|
CVE-2002-0965
| 0
| null | 0.77669
|
Buffer overflow in TNS Listener for Oracle 9i Database Server on Windows systems, and Oracle 8 on VM, allows local users to execute arbitrary code via a long SERVICE_NAME parameter, which is not properly handled when writing an error message to a log file.
|
2002-10-04
|
Metasploit
|
cpe:2.3:a:oracle:oracle9i:9.0.1:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle9i:9.0.2:*:*:*:*:*:*:*;cpe:2.3:a:oracle:oracle9i:9.0:*:*:*:*:*:*:*
|
CVE-2002-1059
| 0
| null | 0.73111
|
Buffer overflow in Van Dyke SecureCRT SSH client before 3.4.6, and 4.x before 4.0 beta 3, allows an SSH server to execute arbitrary code via a long SSH1 protocol version string.
|
2002-10-04
|
Metasploit
|
cpe:2.3:a:van_dyke_technologies:securecrt:2.4:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.0:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.1.1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.1.2:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.2:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.3.1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.3.2:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.3.3:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.3:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4.1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4.2:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4.3:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4.4:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4.5:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:3.4:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:4.0_beta_1:*:*:*:*:*:*:*;cpe:2.3:a:van_dyke_technologies:securecrt:4.0_beta_2:*:*:*:*:*:*:*
|
CVE-2002-1120
| 0
| null | 0.72553
|
Buffer overflow in Savant Web Server 3.1 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request.
|
2002-09-24
|
Metasploit
|
cpe:2.3:a:savant:savant_web_server:*:*:*:*:*:*:*:*
|
CVE-2002-1123
| 0
| null | 0.89144
|
Buffer overflow in the authentication function for Microsoft SQL Server 2000 and Microsoft Desktop Engine (MSDE) 2000 allows remote attackers to execute arbitrary code via a long request to TCP port 1433, aka the "Hello" overflow.
|
2002-09-24
|
Metasploit
|
cpe:2.3:a:microsoft:data_engine:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:sql_server:2000:sp2:*:*:*:*:*:*
|
CVE-2002-1131
| 0
| null | 0.03877
|
Cross-site scripting vulnerabilities in SquirrelMail 1.2.7 and earlier allows remote attackers to execute script as other web users via (1) addressbook.php, (2) options.php, (3) search.php, or (4) help.php.
|
2002-10-04
|
Nuclei
|
cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
CVE-2002-1142
| 0
| null | 0.83043
|
Heap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub.
|
2002-11-29
|
Metasploit
|
cpe:2.3:a:microsoft:data_access_components:2.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.5:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:data_access_components:2.6:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*
|
CVE-2002-1214
| 0
| null | 0.78344
|
Buffer overflow in Microsoft PPTP Service on Windows XP and Windows 2000 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a certain PPTP packet with malformed control data.
|
2002-10-28
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
|
CVE-2002-1318
| 0
| null | 0.73412
|
Buffer overflow in samba 2.2.2 through 2.2.6 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-endian UCS2 unicode string.
|
2002-12-11
|
Metasploit
|
cpe:2.3:a:hp:cifs-9000_server:a.01.08.01:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.08:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.09:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.17:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.18:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
|
CVE-2002-1359
| 0
| null | 0.86998
|
Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite.
|
2002-12-23
|
Metasploit
|
cpe:2.3:a:fissh:ssh_client:1.0a_for_windows:*:*:*:*:*:*:*;cpe:2.3:a:intersoft:securenetterm:5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:netcomposite:shellguard_ssh:3.4.6:*:*:*:*:*:*:*;cpe:2.3:a:pragma_systems:secureshell:2.0:*:*:*:*:*:*:*;cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:*;cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:*;cpe:2.3:a:putty:putty:0.53:*:*:*:*:*:*:*;cpe:2.3:a:winscp:winscp:2.0.0:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*;cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*
|
CVE-2002-1473
| 0
| null | 0.09365
|
Multiple buffer overflows in lp subsystem for HP-UX 10.20 through 11.11 (11i) allow local users to cause a denial of service and possibly execute arbitrary code.
|
2003-04-22
|
Metasploit
|
cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
|
CVE-2002-1643
| 0
| null | 0.81942
|
Multiple buffer overflows in RealNetworks Helix Universal Server 9.0 (9.0.2.768) allow remote attackers to execute arbitrary code via (1) a long Transport field in a SETUP RTSP request, (2) a DESCRIBE RTSP request with a long URL argument, or (3) two simultaneous HTTP GET requests with long arguments.
|
2002-12-19
|
Metasploit
|
cpe:2.3:a:realnetworks:helix_universal_server:9.0.2.768:*:*:*:*:*:*:*;cpe:2.3:a:realnetworks:helix_universal_server:9.0:*:*:*:*:*:*:*
|
CVE-2002-1864
| 0
| null | 0.59336
|
Directory traversal vulnerability in Simple Web Server (SWS) 0.0.4 through 0.1.0 allows remote attackers to read arbitrary files via a ".." (dot dot) in an HTTP request.
|
2002-12-31
|
Metasploit
|
cpe:2.3:a:sws:sws_simple_web_server:0.0.3:*:*:*:*:*:*:*;cpe:2.3:a:sws:sws_simple_web_server:0.0.4:*:*:*:*:*:*:*;cpe:2.3:a:sws:sws_simple_web_server:0.1.0:*:*:*:*:*:*:*;cpe:2.3:a:sws:sws_simple_web_server:0.1.1:*:*:*:*:*:*:*
|
CVE-2002-2226
| 0
| null | 0.7461
|
Buffer overflow in tftpd of TFTP32 2.21 and earlier allows remote attackers to execute arbitrary code via a long filename argument.
|
2002-12-31
|
Metasploit
|
cpe:2.3:a:tftpd32:tftpd32:*:*:*:*:*:*:*:*
|
CVE-2002-2268
| 0
| null | 0.74538
|
Buffer overflow in Webster HTTP Server allows remote attackers to execute arbitrary code via a long URL.
|
2002-12-31
|
Metasploit
|
cpe:2.3:a:netdave:webster_http_server:*:*:*:*:*:*:*:*
|
CVE-2003-0027
| 0
| null | 0.65152
|
Directory traversal vulnerability in Sun Kodak Color Management System (KCMS) library service daemon (kcms_server) allows remote attackers to read arbitrary files via the KCS_OPEN_PROFILE procedure.
|
2003-02-07
|
Metasploit
|
cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
|
CVE-2003-0050
| 0
| null | 0.87791
|
parse_xml.cgi in Apple Darwin Streaming Administration Server 4.1.2 and QuickTime Streaming Server 4.1.1 allows remote attackers to execute arbitrary code via shell metacharacters.
|
2003-03-07
|
Metasploit
|
cpe:2.3:a:apple:darwin_streaming_server:4.1.2:*:*:*:*:*:*:*;cpe:2.3:a:apple:quicktime_streaming_server:4.1.1:*:*:*:*:*:*:*
|
CVE-2003-0109
| 0
| null | 0.88713
|
Buffer overflow in ntdll.dll on Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote attackers to execute arbitrary code, as demonstrated via a WebDAV request to IIS 5.0.
|
2003-03-31
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp3:*:*:*:*:*:*
|
CVE-2003-0190
| 0
| null | 0.1361
|
OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.
|
2003-05-12
|
Metasploit
|
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*;cpe:2.3:a:openbsd:openssh:3.6.1:p1:*:*:*:*:*:*;cpe:2.3:a:openpkg:openpkg:1.2:*:*:*:*:*:*:*;cpe:2.3:a:openpkg:openpkg:1.3:*:*:*:*:*:*:*;cpe:2.3:h:siemens:scalance_x204rna:-:*:*:*:*:*:*:*;cpe:2.3:h:siemens:scalance_x204rna_ecc:-:*:*:*:*:*:*:*;cpe:2.3:o:siemens:scalance_x204rna_ecc_firmware:*:*:*:*:*:*:*:*;cpe:2.3:o:siemens:scalance_x204rna_firmware:*:*:*:*:*:*:*:*
|
CVE-2003-0201
| 0
| null | 0.80508
|
Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code.
|
2003-05-05
|
Metasploit
|
cpe:2.3:a:hp:cifs-9000_server:a.01.05:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.06:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.07:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.08.01:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.08:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.09.01:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.09.02:*:*:*:*:*:*:*;cpe:2.3:a:hp:cifs-9000_server:a.01.09:*:*:*:*:*:*:*;cpe:2.3:a:samba-tng:samba-tng:0.3.1:*:*:*:*:*:*:*;cpe:2.3:a:samba-tng:samba-tng:0.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*;cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0b:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0d:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0d_pk9_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f_pk6_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f_pk7_bl18:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0g_pk3_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0_pk4_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0_pk4_bl18:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0a:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0a_pk3_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.0f:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1b:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1b_pk1_bl1:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
|
CVE-2003-0213
| 0
| null | 0.74735
|
ctrlpacket.c in PoPToP PPTP server before 1.1.4-b3 allows remote attackers to cause a denial of service via a length field of 0 or 1, which causes a negative value to be fed into a read operation, leading to a buffer overflow.
|
2003-05-12
|
Metasploit
|
cpe:2.3:a:poptop:pptp_server:1.0.1:*:*:*:*:*:*:*;cpe:2.3:a:poptop:pptp_server:1.1.2:*:*:*:*:*:*:*;cpe:2.3:a:poptop:pptp_server:1.1.3:*:*:*:*:*:*:*;cpe:2.3:a:poptop:pptp_server:1.1.3_2002-10-09:*:*:*:*:*:*:*;cpe:2.3:a:poptop:pptp_server:1.1.4b1:*:*:*:*:*:*:*;cpe:2.3:a:poptop:pptp_server:1.1.4b2:*:*:*:*:*:*:*
|
CVE-2003-0220
| 0
| null | 0.85491
|
Buffer overflow in the administrator authentication process for Kerio Personal Firewall (KPF) 2.1.4 and earlier allows remote attackers to execute arbitrary code via a handshake packet.
|
2003-05-12
|
Metasploit
|
cpe:2.3:a:kerio:personal_firewall_2:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:kerio:personal_firewall_2:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:kerio:personal_firewall_2:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:kerio:personal_firewall_2:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:kerio:personal_firewall_2:2.1:*:*:*:*:*:*:*
|
CVE-2003-0264
| 0
| null | 0.6681
|
Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server.
|
2003-05-27
|
Metasploit
|
cpe:2.3:a:seattle_lab_software:slmail:5.1.0.4420:*:*:*:*:*:*:*
|
CVE-2003-0270
| 0
| null | 0.22098
|
The administration capability for Apple AirPort 802.11 wireless access point devices uses weak encryption (XOR with a fixed key) for protecting authentication credentials, which could allow remote attackers to obtain administrative access via sniffing when the capability is available via Ethernet or non-WEP connections.
|
2003-06-16
|
Metasploit
|
cpe:2.3:h:apple:802.11n:7.3.1:*:*:*:*:*:*:*
|
CVE-2003-0344
| 0
| null | 0.79213
|
Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.
|
2003-06-16
|
Metasploit
|
cpe:2.3:a:microsoft:ie:6.0:*:windows_server_2003:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*
|
CVE-2003-0349
| 0
| null | 0.87981
|
Buffer overflow in the streaming media component for logging multicast requests in the ISAPI for the logging capability of Microsoft Windows Media Services (nsiislog.dll), as installed in IIS 5.0, allows remote attackers to execute arbitrary code via a large POST request to nsiislog.dll.
|
2003-07-24
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
|
CVE-2003-0352
| 0
| null | 0.90169
|
Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.
|
2003-08-18
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
|
CVE-2003-0471
| 0
| null | 0.68925
|
Buffer overflow in WebAdmin.exe for WebAdmin allows remote attackers to execute arbitrary code via an HTTP request to WebAdmin.dll with a long USER argument.
|
2003-08-07
|
Metasploit
|
cpe:2.3:a:alt-n:webadmin:*:*:*:*:*:*:*:*
|
CVE-2003-0533
| 0
| null | 0.88406
|
Stack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file, as exploited by the Sasser worm.
|
2004-06-01
|
Metasploit
|
cpe:2.3:a:microsoft:netmeeting:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
|
CVE-2003-0558
| 0
| null | 0.7578
|
Buffer overflow in LeapFTP 2.7.3.600 allows remote FTP servers to execute arbitrary code via a long IP address response to a PASV request.
|
2003-08-18
|
Metasploit
|
cpe:2.3:a:leapware:leapftp:2.7.3.600:*:*:*:*:*:*:*
|
CVE-2003-0694
| 0
| null | 0.7608
|
The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
|
2003-10-06
|
Metasploit
|
cpe:2.3:a:sendmail:advanced_message_server:1.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:advanced_message_server:1.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:2.6.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:2.6.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:2.6:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:3.0:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_pro:8.9.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_pro:8.9.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1.5:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2.5:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:3.0.3:*:*:*:*:*:*:*;cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*;cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f_pk6_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f_pk7_bl18:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0f_pk8_bl22:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0g_pk3_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:4.0g_pk4_bl22:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1b:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1b_pk1_bl1:*:*:*:*:*:*:*;cpe:2.3:o:compaq:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:3.0:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*;cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*;cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*;cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*;cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*;cpe:2.3:o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.20f:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.20m:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*;cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*;cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*;cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*;cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*;cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_advanced_server:6.0:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_server:6.5:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_workstation:6.0:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*;cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
|
CVE-2003-0714
| 0
| null | 0.67793
|
The Internet Mail Service in Exchange Server 5.5 and Exchange 2000 allows remote attackers to cause a denial of service (memory exhaustion) by directly connecting to the SMTP service and sending a certain extended verb request, possibly triggering a buffer overflow in Exchange 2000.
|
2003-11-17
|
Metasploit
|
cpe:2.3:a:microsoft:exchange_server:2000:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2000:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2000:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:2000:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:5.5:sp1:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:5.5:sp2:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:5.5:sp3:*:*:*:*:*:*;cpe:2.3:a:microsoft:exchange_server:5.5:sp4:*:*:*:*:*:*
|
CVE-2003-0719
| 0
| null | 0.78359
|
Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.
|
2004-06-01
|
Metasploit
|
cpe:2.3:a:microsoft:netmeeting:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
|
CVE-2003-0722
| 0
| null | 0.87095
|
The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.
|
2003-09-22
|
Metasploit
|
cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*
|
CVE-2003-0727
| 0
| null | 0.85761
|
Multiple buffer overflows in the XML Database (XDB) functionality for Oracle 9i Database Release 2 allow local users to cause a denial of service or hijack user sessions.
|
2003-10-20
|
Metasploit
|
cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*
|
CVE-2003-0812
| 0
| null | 0.83586
|
Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote attackers to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the NetAddAlternateComputerName API.
|
2003-12-15
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
|
CVE-2003-0818
| 0
| null | 0.90191
|
Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings.
|
2004-03-03
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
|
CVE-2003-0822
| 0
| null | 0.90176
|
Buffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.
|
2003-12-15
|
Metasploit
|
cpe:2.3:a:microsoft:frontpage_server_extensions:2000:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:frontpage_server_extensions:2002:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:sharepoint_team_services:2002:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
|
CVE-2003-0990
| 0
| null | 0.78049
|
The parseAddress code in (1) SquirrelMail 1.4.0 and (2) GPG Plugin 1.1 allows remote attackers to execute commands via shell metacharacters in the "To:" field.
|
2004-01-20
|
Metasploit
|
cpe:2.3:a:squirrelmail:gpg_plugin:1.1:*:*:*:*:*:*:*;cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*
|
CVE-2003-1141
| 0
| null | 0.78728
|
Buffer overflow in NIPrint 4.10 allows remote attackers to execute arbitrary code via a long string to TCP port 515.
|
2003-11-04
|
Metasploit
|
cpe:2.3:h:network_instruments:niprint_lpd-lpr_print_server:4.10:*:*:*:*:*:*:*
|
CVE-2003-1192
| 0
| null | 0.82653
|
Stack-based buffer overflow in IA WebMail Server 3.1.0 allows remote attackers to execute arbitrary code via a long GET request.
|
2003-11-03
|
Metasploit
|
cpe:2.3:a:truenorth_software:ia_webmail_server:3.0:*:*:*:*:*:*:*;cpe:2.3:a:truenorth_software:ia_webmail_server:3.1:*:*:*:*:*:*:*
|
CVE-2003-1200
| 0
| null | 0.5989
|
Stack-based buffer overflow in FORM2RAW.exe in Alt-N MDaemon 6.5.2 through 6.8.5 allows remote attackers to execute arbitrary code via a long From parameter to Form2Raw.cgi.
|
2003-12-29
|
Metasploit
|
cpe:2.3:a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*;cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*
|
CVE-2003-1336
| 0
| null | 0.66546
|
Buffer overflow in mIRC before 6.11 allows remote attackers to execute arbitrary code via a long irc:// URL.
|
2003-12-31
|
Metasploit
|
cpe:2.3:a:mirc:mirc:*:*:*:*:*:*:*:*
|
CVE-2004-0206
| 0
| null | 0.81052
|
Network Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow.
|
2004-11-03
|
Metasploit
|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*
|
CVE-2004-0210
| 7.8
| null | 0.05637
|
The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.
|
2004-08-06
|
CISA
|
cpe:2.3:a:microsoft:interix:2.2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp2:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp3:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:server:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:terminal_server:*:*:*;cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:workstation:*:*:*
|
CVE-2004-0297
| 0
| null | 0.56961
|
Buffer overflow in the Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) in Ipswitch IMail Server 8.03 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via an LDAP message with a large tag length.
|
2004-11-23
|
Metasploit
|
cpe:2.3:a:ipswitch:imail:8.0.3:*:*:*:*:*:*:*;cpe:2.3:a:ipswitch:imail:8.0.5:*:*:*:*:*:*:*
|
CVE-2004-0313
| 0
| null | 0.77835
|
Buffer overflow in PSOProxy 0.91 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long HTTP request, as demonstrated using a long (1) GET argument or (2) method name.
|
2004-11-23
|
Metasploit
|
cpe:2.3:a:psoproxy:psoproxy_server:0.91:*:*:*:*:*:*:*
|
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 18