Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 4.6

    MEDIUM
    CVE-2004-1001

    Unknown vulnerability in the passwd_check function in Shadow 4.0.4.1, and possibly other versions before 4.0.5, allows local users to conduct unauthorized activities when an error from a pam_chauthtok function call is not properly handled.... Read more

    Affected Products : shadow
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-2004-1030

    fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to gain sensitive information by calling fcronsighup with an arbitrary file, which reveals the contents of the file that can not be parsed in an error message.... Read more

    Affected Products : linux fcron
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2004-1003

    Trend ScanMail allows remote attackers to obtain potentially sensitive information or disable the anti-virus capability via the smency.nsf file.... Read more

    Affected Products : scanmail_domino
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-2004-1033

    Fcron 2.0.1, 2.9.4, and possibly earlier versions leak file descriptors of open files, which allows local users to bypass access restrictions and read fcron.allow and fcron.deny via the EDITOR environment variable.... Read more

    Affected Products : linux fcron
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2004-0983

    The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.... Read more

    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2005-0622

    RaidenHTTPD 1.1.32, and possibly other versions before 1.1.34, allows remote attackers to view the PHP source code via an HTTP GET request for a filename with a trailing (1) . (dot) or (2) space.... Read more

    Affected Products : raidenhttpd
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 4.3

    MEDIUM
    CVE-2005-0628

    Multiple cross-site scripting (XSS) vulnerabilities in Forumwa 1.0 allow remote attackers to inject arbitrary web script or HTML via (1) the keyword parameter in search.php or the (2) body or (3) subject of a forum message.... Read more

    Affected Products : forumwa
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 9.3

    HIGH
    CVE-2004-1029

    The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote attackers to load unsafe ... Read more

    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-2004-1031

    fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is... Read more

    Affected Products : linux fcron
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2004-1007

    The quoted-printable decoder in bogofilter 0.17.4 to 0.92.7 allows remote attackers to cause a denial of service (application crash) via mail headers that cause a line feed (LF) to be replaced by a null byte that is written to an incorrect memory address.... Read more

    Affected Products : ubuntu_linux email_filter
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-2004-1032

    fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to delete arbitrary files or create arbitrary empty files via a target filename with a large number of leading slash (/) characters such that fcronsighup does not properly... Read more

    Affected Products : linux fcron
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2004-0992

    Format string vulnerability in the -a option (daemon mode) in Proxytunnel before 1.2.3 allows remote attackers to execute arbitrary code via format string specifiers in an invalid proxy answer.... Read more

    Affected Products : proxytunnel
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2004-0986

    Iptables before 1.2.11, under certain conditions, does not properly load the required modules at system startup, which causes the firewall rules to fail to load and protect the system from remote attackers.... Read more

    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2004-1027

    Directory traversal vulnerability in the -x (extract) command line option in unarj allows remote attackers to overwrite arbitrary files via an arj archive with filenames that contain .. (dot dot) sequences.... Read more

    Affected Products : debian_linux linux unarj
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-2004-1038

    A design error in the IEEE1394 specification allows attackers with physical access to a device to read and write to sensitive memory using a modified FireWire/IEEE 1394 client, thus bypassing intended restrictions that would normally require greater degre... Read more

    Affected Products : firewire_ieee
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2004-1037

    The search function in TWiki 20030201 allows remote attackers to execute arbitrary commands via shell metacharacters in a search string.... Read more

    Affected Products : twiki linux
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2004-1052

    Buffer overflow in the getnickuserhost function in BNC 2.8.9, and possibly other versions, allows remote IRC servers to execute arbitrary code via an IRC server response that contains many (1) ! (exclamation) or (2) @ (at sign) characters.... Read more

    Affected Products : debian_linux linux bnc
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2004-1021

    iCal before 1.5.4 on Mac OS X 10.2.3, and other later versions, does not alert the user when handling calendars that use alarms, which allows attackers to execute programs and send e-mail via alarms.... Read more

    Affected Products : ical
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2004-0988

    Integer overflow on Apple QuickTime before 6.5.2, when running on Windows systems, allows remote attackers to cause a denial of service (memory consumption) via certain inputs that cause a large memory operation.... Read more

    Affected Products : quicktime
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2004-1006

    Format string vulnerability in the log functions in dhcpd for dhcp 2.x allows remote DNS servers to execute arbitrary code via certain DNS messages, a different vulnerability than CVE-2002-0702.... Read more

    Affected Products : enterprise_linux dhcpd
    • Published: Mar. 01, 2005
    • Modified: Apr. 03, 2025
Showing 20 of 293632 Results