Total
29559 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2000-1015 | 1 Open Source Development Network | 1 Slashcode | 2025-04-03 | 7.5 HIGH | N/A |
The default configuration of Slashcode before version 2.0 Alpha has a default administrative password, which allows remote attackers to gain Slashcode privileges and possibly execute arbitrary commands. | |||||
CVE-2005-3913 | 1 Vchs | 1 Vchs | 2025-04-03 | 5.0 MEDIUM | N/A |
Unspecified vulnerability in the domain alias management in Virtual Hosting Control System (VHCS) 2.4.6.2, related to "creating and deleting forwards for domain aliases," allows users to hijack the forwardings of other users. | |||||
CVE-2002-2222 | 2 Freebsd, Openbsd | 2 Ports Collection, Openbsd | 2025-04-03 | 5.1 MEDIUM | N/A |
isakmpd/message.c in isakmpd in FreeBSD before isakmpd-20020403_1, and in OpenBSD 3.1, allows remote attackers to cause a denial of service (crash) by sending Internet Key Exchange (IKE) payloads out of sequence. | |||||
CVE-2004-0247 | 1 Cauldron | 2 Chaser Client, Chaser Server | 2025-04-03 | 5.0 MEDIUM | N/A |
The client and server of Chaser 1.50 and earlier allow remote attackers to cause a denial of service (crash via exception) via a UDP packet with a length field that is greater than the actual data length, which causes Chaser to read unexpected memory. | |||||
CVE-2005-1455 | 1 Freeradius | 1 Freeradius | 2025-04-03 | 7.5 HIGH | N/A |
Buffer overflow in the sql_escape_func function in the SQL module for FreeRADIUS 1.0.2 and earlier allows remote attackers to cause a denial of service (crash). | |||||
CVE-2002-0426 | 1 Linksys | 1 Befvp41 | 2025-04-03 | 7.5 HIGH | N/A |
VPN Server module in Linksys EtherFast BEFVP41 Cable/DSL VPN Router before 1.40.1 reduces the key lengths for keys that are supplied via manual key entry, which makes it easier for attackers to crack the keys. | |||||
CVE-2005-3384 | 1 Techno Dreams | 1 Techno Dreams Guest Book | 2025-04-03 | 7.5 HIGH | N/A |
SQL injection vulnerability in Techno Dreams Guest Book script allows remote attackers to execute arbitrary SQL commands and bypass authentication via the userid parameter in admin/login.asp. | |||||
CVE-1999-0854 | 1 Infopop | 1 Ultimate Bulletin Board | 2025-04-03 | 5.0 MEDIUM | N/A |
Ultimate Bulletin Board stores data files in the cgi-bin directory, allowing remote attackers to view the data if an error occurs when the HTTP server attempts to execute the file. | |||||
CVE-2005-2576 | 1 Calogic | 1 Calogic | 2025-04-03 | 5.0 MEDIUM | N/A |
CaLogic 1.22, and possibly earlier versions, allows remote attackers to obtain sensitive information via a direct request to (1) doclsqlres.php, (2) clmcpreload.php, (3) viewhistlog.php, (4) mcconfig.php, (5) doclsqlbak.php, (6) defcalsel.php, or (7) cl_minical.php, which reveals the path in an error message. | |||||
CVE-2005-2843 | 1 Helpdesk Software | 1 Hesk | 2025-04-03 | 7.5 HIGH | N/A |
Helpdesk software Hesk 0.92 does not properly verify usernames and passwords, which allows remote attackers to bypass authentication via a direct request to admin_main.php. | |||||
CVE-2005-2710 | 1 Realnetworks | 2 Helix Player, Realplayer | 2025-04-03 | 5.1 MEDIUM | N/A |
Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file. | |||||
CVE-1999-1178 | 1 Sambar | 1 Sambar Server | 2025-04-03 | 5.0 MEDIUM | N/A |
Sambar Server 4.1 beta allows remote attackers to obtain sensitive information about the server via an HTTP request for the dumpenv.pl script. | |||||
CVE-2002-2121 | 1 Surfcontrol | 1 Superscout Email Filter | 2025-04-03 | 5.0 MEDIUM | N/A |
SurfControl SuperScout Email filter for SMTP 3.5.1 allows remote attackers to cause a denial of service (crash) via a long SMTP (1) HELO or (2) RCPT TO command, possibly due to a buffer overflow. | |||||
CVE-2005-0440 | 1 Stefan Ritt | 1 Elog Web Logbook | 2025-04-03 | 7.5 HIGH | N/A |
ELOG before 2.5.7 allows remote attackers to bypass authentication and download a configuration file that contains a sensitive write password via a modified URL. | |||||
CVE-2004-2298 | 1 Novell | 2 Internet Messaging System, Netmail | 2025-04-03 | 6.4 MEDIUM | N/A |
Novell Internet Messaging System (NIMS) 2.6 and 3.0, and NetMail 3.1 and 3.5, is installed with a default NMAP authentication credential, which allows remote attackers to read and write mail store data if the administrator does not change the credential by using the NMAP Credential Generator. | |||||
CVE-1999-1174 | 1 Iomega | 1 Zip 100 Mb Drive | 2025-04-03 | 4.6 MEDIUM | N/A |
ZIP drive for Iomega ZIP-100 disks allows attackers with physical access to the drive to bypass password protection by inserting a known disk with a known password, waiting for the ZIP drive to power down, manually replacing the known disk with the target disk, and using the known password to access the target disk. | |||||
CVE-2003-0658 | 2 Caldera, Sco | 4 Openlinux Server, Openlinux Workstation, Openserver and 1 more | 2025-04-03 | 5.0 MEDIUM | N/A |
Docview before 1.1-18 in Caldera OpenLinux 3.1.1, SCO Linux 4.0, OpenServer 5.0.7, configures the Apache web server in a way that allows remote attackers to read arbitrary publicly readable files via a certain URL, possibly related to rewrite rules. | |||||
CVE-2004-0064 | 1 Suse | 1 Suse Linux | 2025-04-03 | 2.1 LOW | N/A |
The SuSEconfig.gnome-filesystem script for YaST in SuSE 9.0 allows local users to overwrite arbitrary files via a symlink attack on files within the tmp.SuSEconfig.gnome-filesystem.$RANDOM temporary directory. | |||||
CVE-2005-4574 | 1 Paperthin | 1 Commonspot Content Server | 2025-04-03 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in loader.cfm in PaperThin CommonSpot Content Server 4.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the bNewWindow parameter. | |||||
CVE-2004-1976 | 1 Smc Networks | 1 Smc7004vbr | 2025-04-03 | 7.5 HIGH | N/A |
SMC Barricade broadband router 7008ABR and 7004VBR enable remote administration by default, which allows remote attackers to gain access by connecting to port 1900. |