Total
5279 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-2824 | 1 Xerox | 1 Workcentre | 2017-08-07 | 10.0 HIGH | N/A |
Unspecified vulnerability in the Extensible Interface Platform in Web Services in Xerox WorkCentre 7655, 7665, and 7675 allows remote attackers to make configuration changes via unknown vectors. | |||||
CVE-2008-2830 | 1 Apple | 1 Mac Os X | 2017-08-07 | 7.2 HIGH | N/A |
Open Scripting Architecture in Apple Mac OS X 10.4.11 and 10.5.4, and some other 10.4 and 10.5 versions, does not properly restrict the loading of scripting addition plugins, which allows local users to gain privileges via scripting addition commands to a privileged application, as originally demonstrated by an osascript tell command to ARDAgent. | |||||
CVE-2008-2794 | 1 Symantec | 1 Altiris Notification Server | 2017-08-07 | 6.8 MEDIUM | N/A |
Unspecified vulnerability in the GUI in Symantec Altiris Notification Server Agent 6.x before 6.0 SP3 R8 allows local users to gain privileges via unknown attack vectors. | |||||
CVE-2008-2784 | 1 Spamdyke | 1 Spamdyke | 2017-08-07 | 6.4 MEDIUM | N/A |
The smtp_filter function in spamdyke before 3.1.8 does not filter RCPT commands after encountering the first DATA command, which allows remote attackers to use the server as an open mail relay by sending RCPT commands with invalid recipients, followed by a DATA command, followed by arbitrary RCPT commands and a second DATA command. | |||||
CVE-2008-2771 | 1 Drupal | 2 Drupal, Node Hierarchy Module | 2017-08-07 | 5.0 MEDIUM | N/A |
The Node Hierarchy module 5.x before 5.x-1.1 and 6.x before 6.x-1.0 for Drupal does not properly implement access checks, which allows remote attackers with "access content" permissions to bypass restrictions and modify the node hierarchy via unspecified attack vectors. | |||||
CVE-2008-2724 | 1 Menalto | 1 Gallery | 2017-08-07 | 5.0 MEDIUM | N/A |
Menalto Gallery before 2.2.5 does not enforce permissions for non-album items that have been protected by a password, which might allow remote attackers to bypass intended access restrictions. | |||||
CVE-2008-2722 | 1 Menalto | 1 Gallery | 2017-08-07 | 7.5 HIGH | N/A |
Menalto Gallery before 2.2.5 allows remote attackers to bypass permissions for sub-albums via a ZIP archive. | |||||
CVE-2008-2707 | 2 Intel, Sun | 4 Network Interface Controller, Opensolaris, Solaris and 1 more | 2017-08-07 | 7.8 HIGH | N/A |
Unspecified vulnerability in the e1000g driver in Sun Solaris 10 and OpenSolaris before snv_93 allows remote attackers to cause a denial of service (network connectivity loss) via unknown vectors. | |||||
CVE-2008-2539 | 1 Sun | 1 Cluster | 2017-08-07 | 7.2 HIGH | N/A |
The Sun Cluster Global File System in Sun Cluster 3.1 on Sun Solaris 8 through 10, when an underlying ufs filesystem is used, might allow local users to read data from arbitrary deleted files, or corrupt files in global filesystems, via unspecified vectors. | |||||
CVE-2008-2420 | 1 Stunnel | 1 Stunnel | 2017-08-07 | 6.8 MEDIUM | N/A |
The OCSP functionality in stunnel before 4.24 does not properly search certificate revocation lists (CRL), which allows remote attackers to bypass intended access restrictions by using revoked certificates. | |||||
CVE-2008-2402 | 1 Sun | 1 Java Asp Server | 2017-08-07 | 5.0 MEDIUM | N/A |
The Admin Server in Sun Java Active Server Pages (ASP) Server before 4.0.3 stores sensitive information under the web root with insufficient access control, which allows remote attackers to read password hashes and configuration data via direct requests for unspecified documents. | |||||
CVE-2008-2400 | 1 Stunnel | 1 Stunnel | 2017-08-07 | 7.2 HIGH | N/A |
Unspecified vulnerability in stunnel before 4.23, when running as a service on Windows, allows local users to gain privileges via unknown attack vectors. | |||||
CVE-2008-1475 | 1 Roundup-tracker | 1 Roundup | 2017-08-07 | 6.4 MEDIUM | N/A |
The xml-rpc server in Roundup 1.4.4 does not check property permissions, which allows attackers to bypass restrictions and edit or read restricted properties via the (1) list, (2) display, and (3) set methods. | |||||
CVE-2008-2378 | 1 Hf | 1 Hf | 2017-08-07 | 7.2 HIGH | N/A |
Untrusted search path vulnerability in hfkernel in hf 0.7.3 and 0.8 allows local users to gain privileges via a Trojan horse killall program in a directory in the PATH, related to improper handling of the -k option. | |||||
CVE-2008-2367 | 1 Redhat | 1 Certificate System | 2017-08-07 | 2.1 LOW | N/A |
Red Hat Certificate System 7.2 uses world-readable permissions for password.conf and unspecified other configuration files, which allows local users to discover passwords by reading these files. | |||||
CVE-2008-2331 | 1 Apple | 2 Mac Os X, Mac Os X Server | 2017-08-07 | 5.0 MEDIUM | N/A |
Finder in Apple Mac OS X 10.5 through 10.5.4 does not properly update permission data in the Get Info window after a lock operation that modifies Sharing & Permissions in a filesystem, which might allow local users to leverage weak permissions that were not intended by an administrator. | |||||
CVE-2008-2324 | 1 Apple | 2 Mac Os X, Mac Os X Server | 2017-08-07 | 4.6 MEDIUM | N/A |
The Repair Permissions tool in Disk Utility in Apple Mac OS X 10.4.11 adds the setuid bit to the emacs executable file, which allows local users to gain privileges by executing commands within emacs. | |||||
CVE-2008-2313 | 1 Apple | 2 Mac Os X, Mac Os X Server | 2017-08-07 | 4.6 MEDIUM | N/A |
Apple Mac OS X before 10.5 uses weak permissions for the User Template directory, which allows local users to gain privileges by inserting a Trojan horse file into this directory. | |||||
CVE-2008-2309 | 1 Apple | 2 Mac Os X, Mac Os X Server | 2017-08-07 | 6.8 MEDIUM | N/A |
Incomplete blacklist vulnerability in CoreTypes in Apple Mac OS X before 10.5.4 allows user-assisted remote attackers to execute arbitrary code via a (1) .xht or (2) .xhtm file, which does not trigger a "potentially unsafe" warning message in (a) the Download Validation feature in Mac OS X 10.4 or (b) the Quarantine feature in Mac OS X 10.5. | |||||
CVE-2008-2308 | 1 Apple | 2 Mac Os X, Mac Os X Server | 2017-08-07 | 4.6 MEDIUM | N/A |
Unspecified vulnerability in Alias Manager in Apple Mac OS X 10.5.1 and earlier on Intel platforms allows local users to gain privileges or cause a denial of service (memory corruption and application crash) by resolving an alias that contains crafted AFP volume mount information. |