Latest CVE Feed
-
5.0
MEDIUMCVE-2005-2652
Zorum 3.5 allows remote attackers to obtain the full installation path via direct requests to (1) gorum/notification.php, (2) user.php, (3) attach.php, (4) blacklist.php, (5) zorum/forum.php, (6) globalstat.php, (7) gorum/trace.php, (8) gorum/badwords.php... Read more
Affected Products : zorum- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2005-2632
SQL injection vulnerability in login_admin_mediabox404.php in mediabox404 1.2 and earlier allows remote attackers to execute arbitrary SQL commands via the User field.... Read more
Affected Products : mediabox404- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
6.4
MEDIUMCVE-2005-2646
Unknown vulnerability in Xerox MicroServer Web Server in Document Centre 220 through 265, 332 and 340, 420 through 490, and 535 through 555 allows remote attackers to cause a denial of service or read files via unknown vectors involving crafted HTTP reque... Read more
- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2005-2459
The huft_build function in inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 returns the wrong value, which allows remote attackers to cause a denial of service (kernel crash) via a certain compressed file that leads to a null pointer der... Read more
- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2005-2683
Multiple SQL injection vulnerabilities in PHPKit 1.6.1 allow remote attackers to execute arbitrary SQL commands via the (1) letter parameter to login/member.php or (2) im_receiver parameter to login/imcenter.php.... Read more
Affected Products : phpkit- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2005-0357
EMC Legato NetWorker, Sun Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 7.0 through 7.2 rely on AUTH_UNIX authentication, which relies on user ID for authentication and allows remote attackers to bypass authentication and gain privileges by ... Read more
- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
4.3
MEDIUMCVE-2005-2674
Note: the vendor has disputed this issue. Multiple cross-site scripting (XSS) vulnerabilities in Land Down Under (LDU) 800 allow remote attackers to inject arbitrary web script or HTML via the (1) c or (2) m parameters to index.php or (3) w parameter to j... Read more
Affected Products : land_down_under- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2005-2672
pwmconfig in LM_sensors before 2.9.1 creates temporary files insecurely, which allows local users to overwrite arbitrary files via a symlink attack on the fancontrol temporary file.... Read more
Affected Products : lm_sensors- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
4.3
MEDIUMCVE-2005-2649
Cross-site scripting (XSS) vulnerability in ATutor 1.5.1 allows remote attackers to inject arbitrary web script or HTML via (1) course parameter in login.php or (2) words parameter in search.php.... Read more
Affected Products : atutor- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
4.3
MEDIUMCVE-2005-2647
Cross-site scripting (XSS) vulnerability in Xerox MicroServer Web Server in Document Centre 220 through 265, 332 and 340, 420 through 490, and 535 through 555 allows remote attackers to inject arbitrary web script or HTML and modify web pages via unknown ... Read more
- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
4.3
MEDIUMCVE-2005-2653
Cross-site scripting (XSS) vulnerability in BBCaffe 2.0 allows remote attackers to inject arbitrary web script or HTML via e-mail data in a message.... Read more
Affected Products : bbcaffe- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2005-2667
Unknown vulnerability in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows attackers to cause a denial of service via unknown vectors, aka the "CAM TCP port vulnerability."... Read more
- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2005-2631
Cisco Clean Access (CCA) 3.3.0 to 3.3.9, 3.4.0 to 3.4.5, and 3.5.0 to 3.5.3 does not properly authenticate users when invoking API methods, which could allow remote attackers to bypass security checks, change the assigned role of a user, or disconnect use... Read more
Affected Products : network_admission_control_manager_and_server_system_software- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2005-2645
Unknown vulnerability in Xerox MicroServer Web Server in Document Centre 220 through 265, 332 and 340, 420 through 490, and 535 through 555 allows remote attackers to bypass authentication.... Read more
- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2005-2651
gorum/prod.php in Zorum 3.5 allows remote attackers to execute arbitrary code via shell metacharacters in the argv parameter.... Read more
Affected Products : zorum- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2005-2680
Unspecified vulnerability in BEA WebLogic Portal 8.1 through SP4, when using entitlements, allows remote attackers to bypass access restrictions for the pages of a Book via crafted URLs.... Read more
Affected Products : weblogic_portal- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2005-2099
The Linux kernel before 2.6.12.5 does not properly destroy a keyring that is not instantiated properly, which allows local users or remote attackers to cause a denial of service (kernel oops) via a keyring with a payload that is not empty, which causes th... Read more
- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2005-2098
The KEYCTL_JOIN_SESSION_KEYRING operation in the Linux kernel before 2.6.12.5 contains an error path that does not properly release the session management semaphore, which allows local users or remote attackers to cause a denial of service (semaphore hang... Read more
- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2005-0358
EMC Legato NetWorker, Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 6.0 through 7.2 do not properly verify authentication tokens, which allows remote attackers to gain privileges by modifying an authentication token.... Read more
- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2005-2643
Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other system... Read more
- Published: Aug. 23, 2005
- Modified: Apr. 03, 2025