Total
27865 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2005-0539 | 1 Ibm | 1 Hardware Management Console | 2008-09-05 | 4.6 MEDIUM | N/A |
Unknown vulnerability in IBM Hardware Management Console (HMC) before 4.4 for POWER5 servers allows local users to gain privileges, related to the Guided Setup Wizard. | |||||
CVE-2005-0538 | 1 Ginp | 1 Ginp | 2008-09-05 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in (1) GinpPictureServlet.java and (2) PicCollection.java in ginp (Java Photo Gallery Web Application) before 0.22 allows remote attackers to read arbitrary files. | |||||
CVE-2005-0489 | 1 Linux | 1 Linux Kernel | 2008-09-05 | 4.9 MEDIUM | N/A |
The /proc handling (proc/base.c) Linux kernel 2.4 before 2.4.17 allows local users to cause a denial of service via unknown vectors that cause an invalid access of free memory. | |||||
CVE-2005-0523 | 1 Prozilla | 1 Prozilla Download Accelerator | 2008-09-05 | 7.5 HIGH | N/A |
Format string vulnerability in ProZilla 1.3.7.3 and earlier allows remote attackers to execute arbitrary code via format string specifiers in the Location header. | |||||
CVE-2005-0522 | 1 Lionmax Software | 1 Chat Anywhere | 2008-09-05 | 4.6 MEDIUM | N/A |
Chat Anywhere 2.72a stores sensitive information such as passwords in plaintext in the .INI file for a chatroom, which allows local users to gain privileges. | |||||
CVE-2005-0521 | 1 Sendlink | 1 Sendlink | 2008-09-05 | 2.1 LOW | N/A |
SendLink 1.5 stores sensitive information, possibly including passwords, in plaintext in the data.eat file, which allows local users to gain privileges. | |||||
CVE-2005-0518 | 1 Exeem | 1 Exeem | 2008-09-05 | 2.1 LOW | N/A |
eXeem 0.21 stores sensitive information such as passwords in plaintext in the Exeem registry key, which allows local users to gain privileges via the proxy_user and proxy_password values. | |||||
CVE-2005-0517 | 1 Peerftp 5 | 1 Peerftp 5 | 2008-09-05 | 2.1 LOW | N/A |
PeerFTP_5 stores sensitive information such as passwords in plaintext in the PeerFTP.ini files, which allows local users to gain privileges. | |||||
CVE-2005-0515 | 1 Webroot Software | 1 My Firewall Plus | 2008-09-05 | 2.1 LOW | N/A |
Smc.exe in My Firewall Plus 5.0 build 1117, and possibly other versions, does not drop privileges before launching the Log Viewer export functionality, which allows local users to corrupt arbitrary files by saving log files. | |||||
CVE-2005-0514 | 1 Verity | 1 Verity Ultraseek | 2008-09-05 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in Verity Ultraseek before 5.3.3 allows remote attackers to inject arbitrary HTML and web script via search parameters. | |||||
CVE-2005-0512 | 1 Mambo | 1 Mambo | 2008-09-05 | 7.5 HIGH | N/A |
PHP remote file inclusion vulnerability in Tar.php in Mambo 4.5.2 allows remote attackers to execute arbitrary PHP code by modifying the mosConfig_absolute_path parameter to reference a URL on a remote web server that contains the code, a different vulnerability than CVE-2004-1693. | |||||
CVE-2005-0360 | 1 Microsoft | 1 Log Sink Class Activex Control | 2008-09-05 | 5.0 MEDIUM | N/A |
The Microsoft Log Sink Class ActiveX control in pkmcore.dll is marked as "safe for scripting" for Internet Explorer, which allows remote attackers to create or append to arbitrary files. | |||||
CVE-2005-0608 | 1 Webmod | 1 Webmod | 2008-09-05 | 7.5 HIGH | N/A |
Heap-based buffer overflow in server.cpp for WebMod 0.47 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a POST request with a Content-Length that is less than the amount of data that is actually sent. | |||||
CVE-2005-0594 | 1 Apple | 1 Mac Os X Server | 2008-09-05 | 7.2 HIGH | N/A |
Buffer overflow in the Netinfo Setup Tool (NeST) allows local users to execute arbitrary code. | |||||
CVE-2005-0038 | 1 Powerdns | 1 Powerdns | 2008-09-05 | 5.0 MEDIUM | N/A |
The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop. | |||||
CVE-2005-0070 | 1 Synaesthesia | 1 Synaesthesia | 2008-09-05 | 7.2 HIGH | N/A |
Synaesthesia 2.1 and earlier, and possibly other versions, when installed setuid root, does not drop privileges before processing configuration and mixer files, which allows local users to read arbitrary files. | |||||
CVE-2005-0073 | 1 Debian | 1 Sympa | 2008-09-05 | 4.6 MEDIUM | N/A |
Buffer overflow in queue.c in a support script for sympa 3.3.3, when running setuid, allows local users to execute arbitrary code. | |||||
CVE-2005-0160 | 1 E-merge | 1 Unace | 2008-09-05 | 5.1 MEDIUM | N/A |
Multiple buffer overflows in unace 1.2b allow attackers to execute arbitrary code via (1) 2 overflows in ACE archives, (2) a long command line argument, or (3) certain "Ready for next volume" messages. | |||||
CVE-2005-0158 | 1 Bidwatcher | 1 Bidwatcher | 2008-09-05 | 7.5 HIGH | N/A |
Format string vulnerability in bidwatcher before 1.3.17 allows remote malicious web servers from eBay, or a spoofed eBay server, to cause a denial of service and possibly execute arbitrary code via certain responses. | |||||
CVE-2005-0065 | 1 Tcp | 1 Tcp | 2008-09-05 | 10.0 HIGH | N/A |
The original design of TCP does not check that the TCP sequence number in an ICMP error message is within the range of sequence numbers for data that has been sent but not acknowledged (aka "TCP sequence number checking"), which makes it easier for attackers to forge ICMP error messages for specific TCP connections and cause a denial of service, as demonstrated using (1) blind connection-reset attacks with forged "Destination Unreachable" messages, (2) blind throughput-reduction attacks with forged "Source Quench" messages, or (3) blind throughput-reduction attacks with forged ICMP messages that cause the Path MTU to be reduced. NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. |