Vulnerabilities (CVE)

Filtered by CWE-264
Total 5238 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2003-1423 4 Linux, Microsoft, Petitforum and 1 more 4 Linux Kernel, All Windows, Petitforum and 1 more 2025-04-03 5.0 MEDIUM N/A
Petitforum stores the liste.txt data file under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information such as e-mail addresses and encrypted passwords.
CVE-2002-2425 1 Sun 1 Solaris Answerbook2 2025-04-03 10.0 HIGH N/A
Sun AnswerBook2 1.2 through 1.4.2 allows remote attackers to execute administrative scripts such as (1) AdminViewError and (2) AdminAddadmin via a direct request.
CVE-2005-4855 1 Ez 1 Ez Publish 2025-04-03 3.5 LOW N/A
Unrestricted file upload vulnerability in eZ publish 3.5 before 3.5.5, 3.6 before 3.6.2, 3.7 before 3.7.0rc2, and 3.8 before 20050922 does not restrict Image datatype uploads to image content types, which allows remote authenticated users to upload certain types of files, as demonstrated by .js files, which may enable cross-site scripting (XSS) attacks or other attacks.
CVE-2006-3443 1 Microsoft 1 Windows 2000 2025-04-03 7.2 HIGH N/A
Untrusted search path vulnerability in Winlogon in Microsoft Windows 2000 SP4, when SafeDllSearchMode is disabled, allows local users to gain privileges via a malicious DLL in the UserProfile directory, aka "User Profile Elevation of Privilege Vulnerability."
CVE-1999-0728 1 Microsoft 1 Windows Nt 2025-04-03 7.8 HIGH N/A
A Windows NT user can disable the keyboard or mouse by directly calling the IOCTLs which control them.
CVE-2000-0219 1 Redhat 1 Linux 2025-04-03 7.2 HIGH N/A
Red Hat 6.0 allows local users to gain root access by booting single user and hitting ^C at the password prompt.
CVE-2005-0970 1 Apple 1 Mac Os X 2025-04-03 7.6 HIGH N/A
Mac OS X 10.3.9 and earlier allows users to install, create, and execute setuid/setgid scripts, contrary to the intended design, which may allow attackers to conduct unauthorized activities with escalated privileges via vulnerable scripts.
CVE-2004-2739 1 Phprojekt 1 Phprojekt 2025-04-03 7.5 HIGH N/A
The setup routine (setup.php) in PHProjekt 4.2.1 and earlier allows remote attackers to modify system configuration via unknown attack vectors.
CVE-1999-0777 1 Microsoft 2 Commercial Internet System, Internet Information Server 2025-04-03 7.5 HIGH N/A
IIS FTP servers may allow a remote attacker to read or delete files on the server, even if they have "No Access" permissions.
CVE-2002-2353 1 Tftpd32 1 Tftpd32 2025-04-03 6.4 MEDIUM N/A
tftpd32 2.50 and 2.50.2 allows remote attackers to read or write arbitrary files via a full pathname in GET and PUT requests.
CVE-2006-4302 1 Sun 2 J2se, Java Web Start 2025-04-03 5.0 MEDIUM N/A
The Java Plug-in J2SE 1.3.0_02 through 5.0 Update 5, and Java Web Start 1.0 through 1.2 and J2SE 1.4.2 through 5.0 Update 5, allows remote attackers to exploit vulnerabilities by specifying a JRE version that contain vulnerabilities.
CVE-2006-3561 1 Bt 1 Voyager 2091 Wireless Adsl Router 2025-04-03 5.0 MEDIUM N/A
BT Voyager 2091 Wireless firmware 2.21.05.08m_A2pB018c1.d16d and earlier, and 3.01m and earlier, allow remote attackers to bypass the authentication process and gain sensitive information, such as configuration information via (1) /btvoyager_getconfig.sh, PPP credentials via (2) btvoyager_getpppcreds.sh, and decode configuration credentials via (3) btvoyager_decoder.c.
CVE-2003-1474 1 Freebsd 1 Slashem-tty 2025-04-03 7.2 HIGH N/A
slashem-tty in the FreeBSD Ports Collection is installed with write permissions for the games group, which allows local users with group games privileges to modify slashem-tty and execute arbitrary code as other users, as demonstrated using a separate vulnerability in LTris.
CVE-2004-0793 1 Debian 1 Bsdmainutils 2025-04-03 7.2 HIGH N/A
The calendar program in bsdmainutils 6.0 through 6.0.14 does not drop root privileges when executed with the -a flag, which allows attackers to execute arbitrary commands via a calendar event file.
CVE-2003-1552 1 Graeme 1 Uploader 2025-04-03 6.8 MEDIUM N/A
Unrestricted file upload vulnerability in uploader.php in Uploader 1.1 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in uploads/.
CVE-2006-0114 1 Joomla 1 Joomla 2025-04-03 5.0 MEDIUM N/A
The vCard functions in Joomla! 1.0.5 use predictable sequential IDs for vcards and do not restrict access to them, which allows remote attackers to obtain valid e-mail addresses to conduct spam attacks by modifying the contact_id parameter to index2.php.
CVE-2002-2405 1 Checkpoint 1 Firewall-1 2025-04-03 4.9 MEDIUM N/A
Check Point FireWall-1 4.1 and Next Generation (NG), with UserAuth configured to proxy HTTP traffic only, allows remote attackers to pass unauthorized HTTPS, FTP and possibly other traffic through the firewall.
CVE-2001-0771 1 Spytech-web 1 Spyanywhere 2025-04-03 7.5 HIGH N/A
Spytech SpyAnywhere 1.50 allows remote attackers to gain administrator access via a single character in the "loginpass" field.
CVE-2004-1029 5 Conectiva, Gentoo, Hp and 2 more 8 Linux, Linux, Hp-ux and 5 more 2025-04-03 9.3 HIGH N/A
The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote attackers to load unsafe classes and execute arbitrary code by using the reflection API to access private Java packages.
CVE-2003-1081 1 Sun 2 Solaris, Sunos 2025-04-03 10.0 HIGH N/A
Aspppls for Solaris 8 allows local users to overwrite arbitrary files via a symlink attack on the .asppp.fifo temporary file.