CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   

Security Vulnerabilities

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-1999-0497 1999-01-01 2022-08-17
0.0
None Remote Low Not required None None None
Anonymous FTP is enabled.
2 CVE-1999-0523 1999-01-01 2022-08-17
0.0
None Remote Low Not required None None None
ICMP echo (ping) is allowed from arbitrary hosts.
3 CVE-1999-0525 1997-01-01 2022-08-17
0.0
None Remote Low Not required None None None
IP traceroute is allowed from arbitrary hosts.
4 CVE-1999-0532 1997-07-01 2022-08-17
0.0
None Remote Low Not required None None None
A DNS server allows zone transfers.
5 CVE-1999-0586 1999-01-01 2022-08-17
0.0
None Remote Low Not required None None None
A network service is running on a nonstandard port.
6 CVE-1999-0612 1997-03-01 2022-08-17
0.0
None Remote Low Not required None None None
A version of finger is running that exposes valid user information to any entity on the network.
7 CVE-1999-0613 1999-01-01 2022-08-17
0.0
None Remote Low Not required None None None
The rpc.sprayd service is running.
8 CVE-1999-0624 1999-01-01 2022-08-17
0.0
None Remote Low Not required None None None
The rstat/rstatd service is running.
9 CVE-1999-0625 1999-01-01 2022-08-17
0.0
None Remote Low Not required None None None
The rpc.rquotad service is running.
10 CVE-1999-0626 1997-01-01 2022-08-17
0.0
None Remote Low Not required None None None
A version of rusers is running that exposes valid user information to any entity on the network.
11 CVE-1999-0627 Exec Code 1992-03-01 2022-08-17
0.0
None Remote Low Not required None None None
The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.
12 CVE-1999-0629 1999-01-01 2022-08-17
0.0
None Remote Low Not required None None None
The ident/identd service is running.
13 CVE-1999-0632 1999-01-01 2022-08-17
0.0
None Remote Low Not required None None None
The RPC portmapper service is running.
14 CVE-1999-0635 1999-01-01 2007-07-13
0.0
None Remote Low Not required None None None
The echo service is running.
15 CVE-1999-0637 1999-01-01 2022-08-17
0.0
None Remote Low Not required None None None
The systat service is running.
16 CVE-1999-0638 1999-01-01 2022-08-17
0.0
None Remote Low Not required None None None
The daytime service is running.
17 CVE-1999-0639 1999-01-01 2022-08-17
0.0
None Remote Low Not required None None None
The chargen service is running.
18 CVE-1999-0641 1999-01-01 2022-08-17
0.0
None Remote Low Not required None None None
The UUCP service is running.
19 CVE-1999-0657 1999-01-01 2022-08-17
0.0
None Remote Low Not required None None None
WinGate is being used.
20 CVE-2005-0951 2005-05-02 2008-09-10
0.0
None ??? ??? ??? ??? ??? ???
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: this candidate was created as a result of an analysis error for a researcher advisory for an issue that already existed. It stated an incorrect parameter, which was not part of the vulnerability at all. Notes: CVE users should not reference this candidate at all.
21 CVE-2005-1032 Sql +Info 2005-04-06 2008-09-10
0.0
None ??? ??? ??? ??? ??? ???
** REJECT ** cart.php in LiteCommerce might allow remote attackers to obtain sensitive information via invalid (1) category_id or (2) product_id parameters. NOTE: this issue was originally claimed to be due to SQL injection, but the original researcher is known to be frequently inaccurate with respect to bug type and severity. The vendor has disputed this issue, saying "These reports are credited to malicious person we refused to hire. We have not taken legal action against him only because he is located in India. The vulnerabilites reported can not be reproduced, hence information you provide is contrary to fact." Further investigation by CVE personnel shows that an invalid SQL syntax error could be generated, but it only reveals portions of underlying database structure, which is already available in documentation from the vendor, and it does not appear to lead to path disclosure. Therefore, this issue is not a vulnerability or an exposure, and it probably should be REJECTED.
22 CVE-2006-4274 Exec Code 2006-08-21 2008-09-10
0.0
None ??? ??? ??? ??? ??? ???
** REJECT ** Unknown vulnerability in Microsoft PowerPoint allows user-assisted attackers to execute arbitrary code via a crafted PPT document, as exploited by malware such as TROJ_MDROPPER.BH. NOTE: on 20060822, it was determined that TROJ_MDROPPER.BH was exploiting CVE-2006-0009, so this is not a new vulnerability.
23 CVE-2006-4854 Exec Code 2006-09-19 2008-09-10
0.0
None ??? ??? ??? ??? ??? ???
** REJECT ** Unspecified vulnerability in Microsoft Office 2000 (Chinese Edition) and Microsoft PowerPoint 2000 (Chinese Edition) allows user-assisted attackers to execute arbitrary code via a crafted PPT document, as exploited by malware such as Trojan.PPDropper.E. NOTE: on 20060919, Microsoft notified CVE that this is a duplicate of CVE-2006-0009.
24 CVE-2006-10001 79 XSS 2023-03-05 2023-03-13
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability, which was classified as problematic, was found in Subscribe to Comments Plugin up to 2.0.7. This affects an unknown part of the file subscribe-to-comments.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.8 is able to address this issue. The name of the patch is 9683bdf462fcac2f32b33be98f0b96497fbd1bb6. It is recommended to upgrade the affected component. The identifier VDB-222321 was assigned to this vulnerability.
25 CVE-2006-20001 787 2023-01-17 2023-01-25
0.0
None ??? ??? ??? ??? ??? ???
A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier.
26 CVE-2007-2056 2007-04-30 2008-09-10
0.0
None ??? ??? ??? ??? ??? ???
** REJECT ** The getlock function in aimage/aimage.cpp in AFFLIB 2.2.8 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary lock files (aka "time-of-check-time-of-use file race"). NOTE: the researcher has retracted the original advisory, stating that "the portion of vulnerable code is not called in any current version of AFFLIB and is therefore not exploitable."
27 CVE-2007-4044 2007-07-27 2008-09-10
0.0
None ??? ??? ??? ??? ??? ???
** REJECT ** The MS-RPC functionality in smbd in Samba 3 on SUSE Linux before 20070720 does not include "one character in the shell escape handling." NOTE: this issue was originally characterized as a shell metacharacter issue due to an incomplete fix for CVE-2007-2447, which was interpreted by CVE to be security relevant. However, SUSE and Red Hat have disputed the problem, stating that the only impact is that scripts will not be executed if they have a "c" in their name, but even this limitation might not exist. This does not have security implications, so should not be included in CVE.
28 CVE-2007-5421 Exec Code Overflow 2007-10-12 2008-09-10
0.0
None ??? ??? ??? ??? ??? ???
** REJECT ** Multiple stack-based buffer overflows in Cisco IOS 12.x and IOS XR allow attackers to execute arbitrary code, as demonstrated via the "Bind Shell", "Reverse Shell", and "Two byte rootshell (Tiny Shell)" attacks. NOTE: the vendor and researcher agree that this issue does not cross privilege boundaries, saying they do not "represent a vulnerability." The disclosure was intended to demonstrate techniques for exploitation, which is not covered by CVE.
29 CVE-2007-5908 DoS Exec Code Overflow 2007-11-09 2008-09-10
0.0
None ??? ??? ??? ??? ??? ???
** REJECT ** Buffer overflow in the (1) sysfs_show_available_clocksources and (2) sysfs_show_current_clocksources functions in Linux kernel 2.6.23 and earlier might allow local users to cause a denial of service or execute arbitrary code via crafted clock source names. NOTE: follow-on analysis by Linux developers states that "There is no way for unprivileged users (or really even the root user) to add new clocksources."
30 CVE-2007-10001 89 Sql 2023-01-05 2023-01-11
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability classified as problematic has been found in web-cyradm. This affects an unknown part of the file search.php. The manipulation of the argument searchstring leads to sql injection. It is recommended to apply a patch to fix this issue. The identifier VDB-217449 was assigned to this vulnerability.
31 CVE-2007-10002 89 Sql 2023-01-08 2023-01-12
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability, which was classified as critical, has been found in web-cyradm. Affected by this issue is some unknown functionality of the file auth.inc.php. The manipulation of the argument login/login_password/LANG leads to sql injection. The attack may be launched remotely. The name of the patch is 2bcbead3bdb5f118bf2c38c541eaa73c29dcc90f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217640.
32 CVE-2008-6049 Exec Code Sql 2009-02-04 2009-03-21
0.0
None ??? ??? ??? ??? ??? ???
** REJECT ** SQL injection vulnerability in index.php in TinyMCE 2.0.1 allows remote attackers to execute arbitrary SQL commands via the menuID parameter. NOTE: CVE and multiple reliable third parties dispute this issue, since TinyMCE does not contain index.php or any PHP code. This may be an issue in a product that has integrated TinyMCE.
33 CVE-2008-10002 79 XSS 2023-03-05 2023-03-09
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability has been found in cfire24 ajaxlife up to 0.3.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.3.3 is able to address this issue. The name of the patch is 9fb53b67312fe3f4336e01c1e3e1bedb4be0c1c8. It is recommended to upgrade the affected component. VDB-222286 is the identifier assigned to this vulnerability.
34 CVE-2008-10003 89 Sql 2023-03-05 2023-03-09
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability was found in iGamingModules flashgames 1.1.0. It has been classified as critical. Affected is an unknown function of the file game.php. The manipulation of the argument lid leads to sql injection. It is possible to launch the attack remotely. The name of the patch is 6e57683704885be32eea2ea614f80c9bb8f012c5. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-222288.
35 CVE-2008-10004 89 Sql 2023-03-06 2023-03-13
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability was found in Email Registration 5.x-2.1. It has been declared as critical. This vulnerability affects the function email_registration_user of the file email_registration.module. The manipulation of the argument namenew leads to sql injection. The attack can be initiated remotely. Upgrading to version 6.x-1.0 is able to address this issue. The name of the patch is 126c141b7db038c778a2dc931d38766aad8d1112. It is recommended to upgrade the affected component. VDB-222334 is the identifier assigned to this vulnerability.
36 CVE-2009-0242 DoS 2009-01-21 2009-02-05
0.0
None ??? ??? ??? ??? ??? ???
** REJECT ** gmetad in Ganglia 3.1.1, when supporting multiple requests per connection on an interactive port, allows remote attackers to cause a denial of service via a request to the gmetad service with a path does not exist, which causes Ganglia to (1) perform excessive CPU computation and (2) send the entire tree, which consumes network bandwidth. NOTE: the vendor and original researcher have disputed this issue, since legitimate requests can generate the same amount of resource consumption. CVE concurs with the dispute, so this identifier should not be used.
37 CVE-2009-0671 Exec Code 2009-02-22 2009-02-26
0.0
None ??? ??? ??? ??? ??? ???
** REJECT ** Format string vulnerability in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit imap-2007d and other applications, allows remote attackers to execute arbitrary code via format string specifiers in the initial request to the IMAP port (143/tcp). NOTE: Red Hat has disputed the vulnerability, stating "The Red Hat Security Response Team have been unable to confirm the existence of this format string vulnerability in the toolkit, and the sample published exploit is not complete or functional." CVE agrees that the exploit contains syntax errors and uses Unix-only include files while invoking Windows functions.
38 CVE-2009-1142 59 +Priv 2022-11-23 2022-11-28
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in open-vm-tools 2009.03.18-154848. Local users can gain privileges via a symlink attack on /tmp files if vmware-user-suid-wrapper is setuid root and the ChmodChownDirectory function is enabled.
39 CVE-2009-1143 59 Bypass 2022-11-23 2022-11-28
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in open-vm-tools 2009.03.18-154848. Local users can bypass intended access restrictions on mounting shares via a symlink attack that leverages a realpath race condition in mount.vmhgfs (aka hgfsmounter).
40 CVE-2009-10001 79 XSS 2023-01-13 2023-01-23
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability classified as problematic was found in jianlinwei cool-php-captcha up to 0.2. This vulnerability affects unknown code of the file example-form.php. The manipulation of the argument captcha with the input %3Cscript%3Ealert(1)%3C/script%3E leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.3 is able to address this issue. The name of the patch is c84fb6b153bebaf228feee0cbf50728d27ae3f80. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218296.
41 CVE-2009-10002 79 XSS 2023-01-13 2023-01-23
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability, which was classified as problematic, has been found in dpup fittr-flickr. This issue affects some unknown processing of the file fittr-flickr/features/easy-exif.js of the component EXIF Preview Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 08875dd8a2e5d0d16568bb0d67cb4328062fccde. It is recommended to apply a patch to fix this issue. The identifier VDB-218297 was assigned to this vulnerability.
42 CVE-2009-10003 79 XSS 2023-01-29 2023-02-07
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability was found in capnsquarepants wordcraft up to 0.6. It has been classified as problematic. Affected is an unknown function of the file tag.php. The manipulation of the argument tag leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 0.7 is able to address this issue. The name of the patch is be23028633e8105de92f387036871c03f34d3124. It is recommended to upgrade the affected component. VDB-219714 is the identifier assigned to this vulnerability.
43 CVE-2010-10002 79 XSS 2023-01-01 2023-01-09
0.0
None ??? ??? ??? ??? ??? ???
** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in SimpleSAMLphp simplesamlphp-module-openid. Affected is an unknown function of the file templates/consumer.php of the component OpenID Handler. The manipulation of the argument AuthState leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0 is able to address this issue. The name of the patch is d652d41ccaf8c45d5707e741c0c5d82a2365a9a3. It is recommended to upgrade the affected component. VDB-217170 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
44 CVE-2010-10003 89 Sql 2023-01-04 2023-01-10
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability classified as critical was found in gesellix titlelink. Affected by this vulnerability is an unknown functionality of the file plugin_content_title.php. The manipulation of the argument phrase leads to sql injection. The name of the patch is b4604e523853965fa981a4e79aef4b554a535db0. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217351.
45 CVE-2010-10004 79 XSS 2023-01-09 2023-01-12
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability was found in Information Cards Module and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.0 is able to address this issue. The name of the patch is f6bfea49ae16dc6e179df8306d39c3694f1ef186. It is recommended to upgrade the affected component. The identifier VDB-217661 was assigned to this vulnerability.
46 CVE-2010-10005 121 Overflow 2023-01-16 2023-01-17
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability was found in msmania poodim. It has been declared as critical. This vulnerability affects unknown code of the component Command Line Argument Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The name of the patch is 6340d5d2c81e55e61522c4b40a6cdd5c39738cc6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218392.
47 CVE-2010-10006 203 2023-01-18 2023-01-24
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability, which was classified as problematic, was found in michaelliao jopenid. Affected is the function getAuthentication of the file JOpenId/src/org/expressme/openid/OpenIdManager.java. The manipulation leads to observable timing discrepancy. Upgrading to version 1.08 is able to address this issue. The name of the patch is c9baaa976b684637f0d5a50268e91846a7a719ab. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218460.
48 CVE-2010-10007 89 Sql 2023-01-18 2023-01-25
0.0
None ??? ??? ??? ??? ??? ???
** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in lierdakil click-reminder. It has been rated as critical. This issue affects the function db_query of the file src/backend/include/BaseAction.php. The manipulation leads to sql injection. The name of the patch is 41213b660e8eb01b22c8074f06208f59a73ca8dc. It is recommended to apply a patch to fix this issue. The identifier VDB-218465 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
49 CVE-2010-10008 79 XSS 2023-01-17 2023-01-24
0.0
None ??? ??? ??? ??? ??? ???
** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in simplesamlphp simplesamlphp-module-openidprovider up to 0.8.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file templates/trust.tpl.php. The manipulation of the argument StateID leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.9.0 is able to address this issue. The name of the patch is 8365d48c863cf06ccf1465cc0a161cefae29d69d. It is recommended to upgrade the affected component. The identifier VDB-218473 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
50 CVE-2010-10009 89 Sql 2023-01-18 2023-01-25
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability was found in frioux ptome. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The name of the patch is 26829bba67858ca0bd4ce49ad50e7ce653914276. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218519.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.