Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 4.6

    MEDIUM
    CVE-2005-2657

    Unknown vulnerability in common-lisp-controller 4.18 and earlier allows local users to gain privileges by compiling arbitrary code in the cache directory, which is executed by another user if the user has not run Common Lisp before.... Read more

    Affected Products : common-lisp-controller
    • Published: Sep. 16, 2005
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2005-2952

    Directory traversal vulnerability in s.pl in Subscribe Me Pro 2.044.09P and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the l parameter.... Read more

    Affected Products : subscribe_me_pro
    • Published: Sep. 16, 2005
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-2005-2948

    KillProcess 2.20 and earlier allows local users to bypass kill list restrictions by launching multiple processes at the same time, which are not all killed by KillProcess.... Read more

    Affected Products : killprocess
    • Published: Sep. 16, 2005
    • Modified: Apr. 03, 2025
  • 4.3

    MEDIUM
    CVE-2005-2953

    Cross-site scripting (XSS) vulnerability in merchant.mvc in MIVA Merchant 5 allows remote attackers to inject arbitrary web script or HTML via the Customer_Login parameter.... Read more

    Affected Products : miva_merchant
    • Published: Sep. 16, 2005
    • Modified: Apr. 03, 2025
  • 5.1

    MEDIUM
    CVE-2005-2947

    Buffer overflow in KillProcess 2.20 and earlier allows user-assisted attackers to execute arbitrary code via an exe file with a long FileDescription in the version resource.... Read more

    Affected Products : killprocess
    • Published: Sep. 16, 2005
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2005-2951

    Directory traversal vulnerability in security.inc.php in AzDGDatingLite 2.1.3, and possibly earlier versions, allows remote attackers to execute arbitrary PHP commands via ".." sequences and "%00" (trailing null byte) characters in the l parameter, which ... Read more

    Affected Products : azdgdating
    • Published: Sep. 16, 2005
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-2005-2955

    config.inc.php in ATutor 1.5.1, and possibly earlier versions, uses an incomplete blacklist to check for dangerous file extensions, which allows authenticated administrators or educators to execute arbitrary code by uploading files with other executable e... Read more

    Affected Products : atutor
    • Published: Sep. 16, 2005
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2005-2954

    SQL injection vulnerability in password_reminder.php in ATutor before 1.5.1 pl1 allows remote attackers to execute arbitrary SQL commands via the email field.... Read more

    Affected Products : atutor
    • Published: Sep. 16, 2005
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-2005-2945

    arc 5.21j and earlier create temporary files with world-readable permissions, which allows local users to read sensitive information from files created by (1) arc (arc.c) or (2) marc (marc.c).... Read more

    Affected Products : arc
    • Published: Sep. 16, 2005
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2005-2877

    The history (revision control) function in TWiki 02-Sep-2004 and earlier allows remote attackers to execute arbitrary code via shell metacharacters, as demonstrated via the rev parameter to TWikiUsers.... Read more

    Affected Products : twiki
    • Published: Sep. 16, 2005
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-2005-2944

    The perform_file_save function in GNOME Workstation Command Center (gwcc) 0.9.6 and earlier allows local users to create and overwrite arbitrary files via a symlink attack on the gwcc_out.txt temporary file.... Read more

    Affected Products : gnome_workstation_command_center
    • Published: Sep. 16, 2005
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-2005-2935

    Unquoted Windows search path vulnerability in Microsoft AntiSpyware might allow local users to execute code via a malicious c:\program.exe file, which is run by AntiSpywareMain.exe when it attempts to execute gsasDtServ.exe. NOTE: it is not clear whether... Read more

    Affected Products : antispyware
    • Published: Sep. 15, 2005
    • Modified: Apr. 03, 2025
  • 5.1

    MEDIUM
    CVE-2005-2495

    Multiple integer overflows in XFree86 before 4.3.0 allow user-assisted attackers to execute arbitrary code via a crafted pixmap image.... Read more

    Affected Products : xfree86
    • Published: Sep. 15, 2005
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2005-2658

    Buffer overflow in utility.cpp in Turquoise SuperStat (turqstat) 2.2.4 and earlier might allow remote NNTP servers to execute arbitrary code via a date with a long month.... Read more

    Affected Products : turquoise_superstat
    • Published: Sep. 15, 2005
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2005-2799

    Buffer overflow in apply.cgi in Linksys WRT54G 3.01.03, 3.03.6, and possibly other versions before 4.20.7, allows remote attackers to execute arbitrary code via a long HTTP POST request.... Read more

    Affected Products : wrt54g
    • Published: Sep. 15, 2005
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2005-2918

    The open_cmd_tube function in mount.c for gtkdiskfree 1.9.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the gtkdiskfree temporary file.... Read more

    Affected Products : gtkdiskfree
    • Published: Sep. 15, 2005
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2005-2914

    ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, does not use an authentication initialization function, which allows remote attackers to obtain encrypted configuration information a... Read more

    Affected Products : wrt54g
    • Published: Sep. 14, 2005
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2005-2915

    ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, uses weak encryption (XOR encoding with a fixed byte mask) for configuration information, which could allow attackers to decrypt the ... Read more

    Affected Products : wrt54g
    • Published: Sep. 14, 2005
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2005-2916

    Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions before 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote attackers to (1) modify configuration using restore.cgi or (2) ... Read more

    Affected Products : wrt54g
    • Published: Sep. 14, 2005
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2005-2912

    Linksys WRT54G router allows remote attackers to cause a denial of service (CPU consumption and server hang) via an HTTP POST request with a negative Content-Length value.... Read more

    Affected Products : wrt54g
    • Published: Sep. 14, 2005
    • Modified: Apr. 03, 2025
Showing 20 of 292834 Results