Latest CVE Feed
-
7.5
HIGHCVE-2003-0321
Multiple buffer overflows in BitchX IRC client 1.0-0c19 and earlier allow remote malicious IRC servers to cause a denial of service (crash) and possibly execute arbitrary code via long hostnames, nicknames, or channel names, which are not properly handled... Read more
Affected Products : bitchx- Published: Jun. 09, 2003
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2003-0324
Buffer overflows in EPIC IRC Client (EPIC4) 1.0.1 allows remote malicious IRC servers to cause a denial of service (crash) and possibly execute arbitrary code via long replies that are not properly handled by the (1) userhost_cmd_returned function, or (2)... Read more
Affected Products : epic4- Published: Jun. 09, 2003
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2003-0305
The Service Assurance Agent (SAA) in Cisco IOS 12.0 through 12.2, aka Response Time Reporter (RTR), allows remote attackers to cause a denial of service (crash) via malformed RTR packets to port 1967.... Read more
Affected Products : ios- Published: Jun. 09, 2003
- Modified: Apr. 03, 2025
-
7.6
HIGHCVE-2003-0332
The ISAPI extension in BadBlue 1.7 through 2.2, and possibly earlier versions, modifies the first two letters of a filename extension after performing a security check, which allows remote attackers to bypass authentication via a filename with a .ats exte... Read more
Affected Products : badblue- Published: Jun. 09, 2003
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2003-0328
EPIC IRC Client (EPIC4) pre2.002, pre2.003, and possibly later versions, allows remote malicious IRC servers to cause a denial of service (crash) and possibly execute arbitrary code via a CTCP request from a large nickname, which causes an incorrect lengt... Read more
- Published: Jun. 09, 2003
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2003-0361
gPS before 1.1.0 does not properly follow the rgpsp connection source acceptation policy as specified in the rgpsp.conf file, which could allow unauthorized remote attackers to connect to rgpsp.... Read more
Affected Products : debian_linux- Published: Jun. 09, 2003
- Modified: Apr. 03, 2025
-
4.6
MEDIUMCVE-2003-0329
CesarFTP 0.99g stores user names and passwords in plaintext in the settings.ini file, which could allow local users to gain privileges.... Read more
Affected Products : cesarftp- Published: Jun. 09, 2003
- Modified: Apr. 03, 2025
-
7.2
HIGHCVE-2003-1068
Buffer overflow in utmp_update for Solaris 2.6 through 9 allows local users to gain root privileges, as identified by Sun BugID 4659277, a different vulnerability than CVE-2003-1082.... Read more
- Published: Jun. 06, 2003
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2003-1206
Format string vulnerability in Crob FTP Server 2.60.1 allows remote attackers to cause a denial of service (crash) via "%s" or "%n" sequences in (1) the username during login, or other FTP commands such as (2) dir.... Read more
Affected Products : crob_ftp_server- Published: Jun. 03, 2003
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2003-1069
The Telnet daemon (in.telnetd) for Solaris 2.6 through 9 allows remote attackers to cause a denial of service (CPU consumption by infinite loop).... Read more
- Published: Jun. 03, 2003
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-2003-0274
Buffer overflow in catmail for ListProc 8.2.09 and earlier allows remote attackers to execute arbitrary code via a long ULISTPROC_UMASK value.... Read more
Affected Products : listproc- Published: May. 27, 2003
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2003-0256
The GnuPG plugin in kopete before 0.6.2 does not properly cleanse the command line when executing gpg, which allows remote attackers to execute arbitrary commands.... Read more
Affected Products : kopete- Published: May. 27, 2003
- Modified: Apr. 03, 2025
-
6.2
MEDIUMCVE-2003-0265
Race condition in SDBINST for SAP database 7.3.0.29 creates critical files with world-writable permissions before initializing the setuid bits, which allows local attackers to gain root privileges by modifying the files before the permissions are changed.... Read more
Affected Products : sap_db- Published: May. 27, 2003
- Modified: Apr. 03, 2025
-
6.8
MEDIUMCVE-2003-0273
Cross-site scripting (XSS) vulnerability in the web interface for Request Tracker (RT) 1.0 through 1.0.7 allows remote attackers to execute script via message bodies.... Read more
Affected Products : request_tracker- Published: May. 27, 2003
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2003-0237
The "ICQ Features on Demand" functionality for Mirabilis ICQ Pro 2003a does not properly verify the authenticity of software upgrades, which allows remote attackers to install arbitrary software via a spoofing attack.... Read more
Affected Products : icq- Published: May. 27, 2003
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2003-0244
The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.... Read more
Affected Products : linux_kernel- Published: May. 27, 2003
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2003-0236
Integer signedness errors in the POP3 client for Mirabilis ICQ Pro 2003a allow remote attackers to execute arbitrary code via the (1) Subject or (2) Date headers.... Read more
Affected Products : icq- Published: May. 27, 2003
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2003-0266
Multiple buffer overflows in SLWebMail 3 on Windows systems allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long Language parameter to showlogin.dll, (2) a long CompanyID parameter to recman.dll, (3) a lo... Read more
Affected Products : slwebmail- Published: May. 27, 2003
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2003-0268
SLWebMail 3 on Windows systems allows remote attackers to identify the full path of the server via invalid requests to DLLs such as WebMailReq.dll, which reveals the path in an error message.... Read more
Affected Products : slwebmail- Published: May. 27, 2003
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-2003-0255
The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with multiple user IDs and assigns the greatest validity of the most valid user ID, which prevents GnuPG from warning the encrypting user when a user ID does no... Read more
Affected Products : privacy_guard- Published: May. 27, 2003
- Modified: Apr. 03, 2025