From 86aa51beb9015cbaa55b5c9d30b732e1bfb23e14 Mon Sep 17 00:00:00 2001 From: github-actions <41898282+github-actions[bot]@users.noreply.github.com> Date: Sun, 15 Sep 2024 12:32:11 +0000 Subject: [PATCH] Commit from GitHub Actions (Update List) --- data/data.csv | 202 ++++++++++++++++++++++++------------------------- secpatch.ipynb | 58 +++++++------- 2 files changed, 130 insertions(+), 130 deletions(-) diff --git a/data/data.csv b/data/data.csv index 754489d..90a9eb8 100644 --- a/data/data.csv +++ b/data/data.csv @@ -96,7 +96,7 @@ CVE-2003-0201,0.0,0.9705,"Buffer overflow in the call_trans2open function in tra CVE-2003-0213,0.0,0.41623,"ctrlpacket.c in PoPToP PPTP server before 1.1.4-b3 allows remote attackers to cause a denial of service via a length field of 0 or 1, which causes a negative value to be fed into a read operation, leading to a buffer overflow.",2003-05-12 04:00:00.000,Metasploit CVE-2003-0220,0.0,0.52614,Buffer overflow in the administrator authentication process for Kerio Personal Firewall (KPF) 2.1.4 and earlier allows remote attackers to execute arbitrary code via a handshake packet.,2003-05-12 04:00:00.000,Metasploit CVE-2003-0227,0.0,0.95933,"The logging capability for unicast and multicast transmissions in the ISAPI extension for Microsoft Windows Media Services in Microsoft Windows NT 4.0 and 2000, nsiislog.dll, allows remote attackers to cause a denial of service in Internet Information Server (IIS) and execute arbitrary code via a certain network request.",2003-06-09 04:00:00.000,EPSS -CVE-2003-0228,0.0,0.95343,Directory traversal vulnerability in Microsoft Windows Media Player 7.1 and Windows Media Player for Windows XP allows remote attackers to execute arbitrary code via a skins file with a URL containing hex-encoded backslash characters (%5C) that causes an executable to be placed in an arbitrary location.,2003-05-27 04:00:00.000,EPSS +CVE-2003-0228,0.0,0.95034,Directory traversal vulnerability in Microsoft Windows Media Player 7.1 and Windows Media Player for Windows XP allows remote attackers to execute arbitrary code via a skins file with a URL containing hex-encoded backslash characters (%5C) that causes an executable to be placed in an arbitrary location.,2003-05-27 04:00:00.000,EPSS CVE-2003-0245,0.0,0.96634,"Vulnerability in the apr_psprintf function in the Apache Portable Runtime (APR) library for Apache 2.0.37 through 2.0.45 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long strings, as demonstrated using XML objects to mod_dav, and possibly other vectors.",2003-06-09 04:00:00.000,EPSS CVE-2003-0264,0.0,0.2422,"Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server.",2003-05-27 04:00:00.000,Metasploit CVE-2003-0270,0.0,0.02846,"The administration capability for Apple AirPort 802.11 wireless access point devices uses weak encryption (XOR with a fixed key) for protecting authentication credentials, which could allow remote attackers to obtain administrative access via sniffing when the capability is available via Ethernet or non-WEP connections.",2003-06-16 04:00:00.000,Metasploit @@ -115,9 +115,9 @@ CVE-2003-0717,0.0,0.97105,"The Messenger Service for Windows NT through Server 2 CVE-2003-0719,0.0,0.95755,"Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.",2004-06-01 04:00:00.000,EPSS/Metasploit CVE-2003-0722,0.0,0.96925,"The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.",2003-09-22 04:00:00.000,EPSS/Metasploit CVE-2003-0772,0.0,0.95697,Multiple buffer overflows in WS_FTP 3 and 4 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via long (1) APPE (append) or (2) STAT (status) arguments.,2003-09-22 04:00:00.000,EPSS -CVE-2003-0812,0.0,0.96901,"Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote attackers to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file (""NetSetup.LOG""), as demonstrated using the NetAddAlternateComputerName API.",2003-12-15 05:00:00.000,EPSS/Metasploit +CVE-2003-0812,0.0,0.96862,"Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote attackers to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file (""NetSetup.LOG""), as demonstrated using the NetAddAlternateComputerName API.",2003-12-15 05:00:00.000,EPSS/Metasploit CVE-2003-0818,0.0,0.97363,"Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings.",2004-03-03 05:00:00.000,EPSS/Metasploit -CVE-2003-0822,0.0,0.97104,Buffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.,2003-12-15 05:00:00.000,EPSS/Metasploit +CVE-2003-0822,0.0,0.96995,Buffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.,2003-12-15 05:00:00.000,EPSS/Metasploit CVE-2003-0825,0.0,0.96665,"The Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code.",2004-03-03 05:00:00.000,EPSS CVE-2003-0838,0.0,0.95041,"Internet Explorer allows remote attackers to bypass zone restrictions to inject and execute arbitrary programs by creating a popup window and inserting ActiveX object code with a ""data"" tag pointing to the malicious code, which Internet Explorer treats as HTML or Javascript, but later executes as an HTA application, a different vulnerability than CVE-2003-0532, and as exploited using the QHosts Trojan horse (aka Trojan.Qhosts, QHosts-1, VBS.QHOSTS, or aolfix.exe).",2003-11-17 05:00:00.000,EPSS CVE-2003-0990,0.0,0.70166,"The parseAddress code in (1) SquirrelMail 1.4.0 and (2) GPG Plugin 1.1 allows remote attackers to execute commands via shell metacharacters in the ""To:"" field.",2004-01-20 05:00:00.000,Metasploit @@ -142,7 +142,7 @@ CVE-2004-0330,0.0,0.93302,Buffer overflow in Serv-U ftp before 5.0.0.4 allows re CVE-2004-0331,0.0,0.95235,Heap-based buffer overflow in Dell OpenManage Web Server 3.4.0 allows remote attackers to cause a denial of service (crash) via a HTTP POST with a long application variable.,2004-11-23 05:00:00.000,EPSS/Metasploit CVE-2004-0362,0.0,0.96014,"Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.",2004-04-15 04:00:00.000,EPSS/Metasploit CVE-2004-0363,0.0,0.9319,"Stack-based buffer overflow in the SymSpamHelper ActiveX component (symspam.dll) in Norton AntiSpam 2004, as used in Norton Internet Security 2004, allows remote attackers to execute arbitrary code via a long parameter to the LaunchCustomRuleWizard method.",2004-04-15 04:00:00.000,Metasploit -CVE-2004-0380,0.0,0.96759,"The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the ""MHTML URL Processing Vulnerability.""",2004-05-04 04:00:00.000,EPSS +CVE-2004-0380,0.0,0.96707,"The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the ""MHTML URL Processing Vulnerability.""",2004-05-04 04:00:00.000,EPSS CVE-2004-0396,0.0,0.96945,"Heap-based buffer overflow in CVS 1.11.x up to 1.11.15, and 1.12.x up to 1.12.7, when using the pserver mechanism allows remote attackers to execute arbitrary code via Entry lines.",2004-06-14 04:00:00.000,EPSS CVE-2004-0397,0.0,0.96278,Stack-based buffer overflow during the apr_time_t data conversion in Subversion 1.0.2 and earlier allows remote attackers to execute arbitrary code via a (1) DAV2 REPORT query or (2) get-dated-rev svn-protocol command.,2004-07-07 04:00:00.000,EPSS/Metasploit CVE-2004-0420,0.0,0.96765,"The Windows Shell application in Windows 98, Windows ME, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by spoofing the type of a file via a CLSID specifier in the filename, as demonstrated using Internet Explorer 6.0.2800.1106 on Windows XP.",2004-07-07 04:00:00.000,EPSS @@ -365,7 +365,7 @@ CVE-2006-2372,0.0,0.96315,"Buffer overflow in the DHCP Client service for Micros CVE-2006-2447,0.0,0.94666,"SpamAssassin before 3.1.3, when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username.",2006-06-06 21:06:00.000,Metasploit CVE-2006-2492,8.8,0.75579,"Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object pointer, as originally reported by ISC on 20060519 for a zero-day attack.",2006-05-20 00:02:00.000,CISA CVE-2006-2502,0.0,0.8901,"Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.",2006-05-22 16:06:00.000,Metasploit -CVE-2006-2630,0.0,0.97106,Stack-based buffer overflow in Symantec Antivirus 10.1 and Client Security 3.1 allows remote attackers to execute arbitrary code via unknown attack vectors.,2006-05-27 21:02:00.000,EPSS/Metasploit +CVE-2006-2630,0.0,0.97077,Stack-based buffer overflow in Symantec Antivirus 10.1 and Client Security 3.1 allows remote attackers to execute arbitrary code via unknown attack vectors.,2006-05-27 21:02:00.000,EPSS/Metasploit CVE-2006-2685,0.0,0.95265,"PHP remote file inclusion vulnerability in Basic Analysis and Security Engine (BASE) 1.2.4 and earlier, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via a URL in the BASE_path parameter to (1) base_qry_common.php, (2) base_stat_common.php, and (3) includes/base_include.inc.php.",2006-05-31 10:06:00.000,EPSS/Metasploit CVE-2006-2766,0.0,0.95721,"Buffer overflow in INETCOMM.DLL, as used in Microsoft Internet Explorer 6.0 through 6.0 SP2, Windows Explorer, Outlook Express 6, and possibly other programs, allows remote user-assisted attackers to cause a denial of service (application crash) via a long mhtml URI in the URL value in a URL file.",2006-06-02 10:18:00.000,EPSS CVE-2006-2779,0.0,0.9722,"Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested