CVE
stringlengths 13
16
| Description
stringlengths 20
3.95k
| KeyPhrases
stringlengths 2
343
|
---|---|---|
CVE-2005-0218
|
ClamAV 0.80 and earlier allows remote attackers to bypass virus scanning via a base64 encoded image in a data: (RFC 2397) URL.
|
['bypass virus scanning via a base64 encoded image']
|
CVE-2005-0219
|
Multiple cross-site scripting (XSS) vulnerabilities in Gallery 1.3.4-pl1 allow remote attackers to inject arbitrary web script or HTML via (1) the index field in add_comment.php, (2) set_albumName, (3) slide_index, (4) slide_full, (5) slide_loop, (6) slide_pause, (7) slide_dir fields in slideshow_low.php, or (8) username field in search.php.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via (', 'cross-site scripting (xss)']
|
CVE-2005-0220
|
Cross-site scripting vulnerability in login.php in Gallery 1.4.4-pl2 allows remote attackers to inject arbitrary web script or HTML via the username field.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via the', 'cross-site scripting']
|
CVE-2005-0221
|
Cross-site scripting (XSS) vulnerability in login.php in Gallery 2.0 Alpha allows remote attackers to inject arbitrary web script or HTML via the g2_form[subject] field.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via the', 'cross-site scripting (xss)']
|
CVE-2005-0222
|
main.php in Gallery 2.0 Alpha allows remote attackers to gain sensitive information by changing the value of g2_subView parameter, which reveals the path in an error message.
|
['gain sensitive information', 'gain sensitive information by changing the value of']
|
CVE-2005-0223
|
The Software Development Kit (SDK) and Run Time Environment (RTE) 1.4.1 and 1.4.2 for Tru64 UNIX allows remote attackers to cause a denial of service (Java Virtual Machine hang) via object deserialization.
|
['denial of service (Java Virtual Machine hang)', 'cause a denial of service (Java Virtual', 'object deserialization']
|
CVE-2005-0224
|
Unknown vulnerability in HP-UX B.11.04 running Virtualvault 4.5 through 4.7, when running the TGA daemon, allows remote attackers to cause a denial of service via certain network traffic.
|
['cause a denial of service via certain network', 'unknown']
|
CVE-2005-0225
|
firehol.sh in FireHOL before 1.224 creates temporary files with predictable file names, which could allow local users to overwrite arbitrary files via a symlink attack.
|
['overwrite arbitrary files', 'overwrite arbitrary files via a symlink attack', 'predictable file names']
|
CVE-2005-0226
|
Format string vulnerability in the Log_Resolver function in log.c for ngIRCd 0.8.2 and earlier, when compiled with IDENT, logging to SYSLOG, and with DEBUG enabled, allows remote attackers to execute arbitrary code.
|
['execute arbitrary code', 'format string']
|
CVE-2005-0227
|
PostgreSQL (pgsql) 7.4.x, 7.2.x, and other versions allows local users to load arbitrary shared libraries and execute code via the LOAD extension.
|
['load arbitrary shared libraries and execute code via']
|
CVE-2005-0229
|
CitrusDB 0.3.5 and earlier stores the newfile.txt temporary data file under the web root, which allows remote attackers to steal credit card information via a direct request to newfile.txt.
|
['steal credit card information via a direct request']
|
CVE-2005-0230
|
Firefox 1.0 does not prevent the user from dragging an executable file to the desktop when it has an image/gif content type but has a dangerous extension such as .bat or .exe, which allows remote attackers to bypass the intended restriction and execute arbitrary commands via malformed GIF files that can still be parsed by the Windows batch file parser, aka "firedragging."
|
['execute arbitrary commands', 'bypass the intended restriction', 'bypass the intended restriction and execute arbitrary commands', 'malformed gif files']
|
CVE-2005-0231
|
Firefox 1.0 does not invoke the Javascript Security Manager when a user drags a javascript: or data: URL to a tab, which allows remote attackers to bypass the security model, aka "firetabbing."
|
['bypass the security model', 'firetabbing', 'bypass security']
|
CVE-2005-0232
|
Firefox 1.0 allows remote attackers to modify Boolean configuration parameters for the about:config site by using a plugin such as Flash, and the -moz-opacity filter, to display the about:config site then cause the user to double-click at a certain screen position, aka "Fireflashing."
|
['modify Boolean configuration parameters for the about:', 'fireflashing']
|
CVE-2005-0233
|
The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
|
['spoof domain names using punycode encoded domain names', 'phishing', 'spoofing']
|
CVE-2005-0234
|
The International Domain Name (IDN) support in Safari 1.2.5 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
|
['spoof domain names using punycode encoded domain names', 'phishing', 'spoofing']
|
CVE-2005-0235
|
The International Domain Name (IDN) support in Opera 7.54 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
|
['spoof domain names using punycode encoded domain names', 'phishing', 'spoofing']
|
CVE-2005-0236
|
The International Domain Name (IDN) support in Omniweb 5 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
|
['spoof domain names using punycode encoded domain names', 'phishing', 'spoofing']
|
CVE-2005-0237
|
The International Domain Name (IDN) support in Konqueror 3.2.1 on KDE 3.2.1 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
|
['spoof domain names using punycode encoded domain names', 'phishing', 'spoofing']
|
CVE-2005-0238
|
The International Domain Name (IDN) support in Epiphany allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
|
['spoof domain names using punycode encoded domain names', 'phishing', 'spoofing']
|
CVE-2005-0239
|
viewcert.php in the S/MIME plugin 0.4 and 0.5 for Squirrelmail allows remote attackers to execute arbitrary commands via shell metacharacters in the cert parameter.
|
['execute arbitrary commands', 'execute arbitrary commands via shell metacharacters in the']
|
CVE-2005-0240
|
Format string vulnerability in chdev on IBM AIX 5.2 allows local users to execute arbitrary code via format string specifiers in a command line argument, which is not properly handled when printing an error message.
|
['execute arbitrary code', 'execute arbitrary code via format string specifiers in']
|
CVE-2005-0241
|
The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size.
|
['bypass access controls', 'poison the cache or bypass access controls based']
|
CVE-2005-0242
|
The Audio Setup Wizard (asw.dll) in Yahoo! Messenger 6.0.0.1750, and possibly other versions, allows attackers to arbitrary code by placing a malicious ping.exe program into the Messenger program directory, which is installed with weak default permissions.
|
['arbitrary code by placing a malicious ping.exe program', 'weak default permissions']
|
CVE-2005-0243
|
Yahoo! Messenger 6.0.0.1750, and possibly other versions before 6.0.0.1921, does not properly display long filenames in file dialog boxes, which could allow remote attackers to trick users into downloading and executing programs via file names containing a large number of spaces and multiple file extensions.
|
['trick users into downloading and executing programs via', 'long filenames']
|
CVE-2005-0244
|
PostgreSQL 8.0.0 and earlier allows local users to bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command.
|
['bypass the EXECUTE permission', 'bypass the EXECUTE permission check for functions by']
|
CVE-2005-0245
|
Buffer overflow in gram.y for PostgreSQL 8.0.0 and earlier may allow attackers to execute arbitrary code via a large number of arguments to a refcursor function (gram.y), which leads to a heap-based buffer overflow, a different vulnerability than CVE-2005-0247.
|
['execute arbitrary code', 'execute arbitrary code via a large number of', 'buffer overflow', 'heap based buffer overflow']
|
CVE-2005-0246
|
The intagg contrib module for PostgreSQL 8.0.0 and earlier allows attackers to cause a denial of service (crash) via crafted arrays.
|
['denial of service (crash)', 'cause a denial of service (crash)']
|
CVE-2005-0247
|
Multiple buffer overflows in gram.y for PostgreSQL 8.0.1 and earlier may allow attackers to execute arbitrary code via (1) a large number of variables in a SQL statement being handled by the read_sql_construct function, (2) a large number of INTO variables in a SELECT statement being handled by the make_select_stmt function, (3) a large number of arbitrary variables in a SELECT statement being handled by the make_select_stmt function, and (4) a large number of INTO variables in a FETCH statement being handled by the make_fetch_stmt function, a different set of vulnerabilities than CVE-2005-0245.
|
['execute arbitrary code', 'execute arbitrary code via (1) a', 'buffer overflows']
|
CVE-2005-0248
|
The Solaris Management Console (SMC) GUI for Solaris 8 and 9, when creating user accounts that are configured for password aging, creates the accounts with a blank password, which allows remote or local attackers to break into those accounts.
|
['break into those accounts', 'blank password']
|
CVE-2005-0249
|
Heap-based buffer overflow in the DEC2EXE module for Symantec AntiVirus Library allows remote attackers to execute arbitrary code via a UPX compressed file containing a negative virtual offset to a crafted PE header.
|
['execute arbitrary code', 'execute arbitrary code via a UPX compressed file', 'heap-based buffer overflow', 'heap based buffer overflow']
|
CVE-2005-0250
|
Format string vulnerability in auditselect on IBM AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via format string specifiers in a command line argument.
|
['execute arbitrary code', 'execute arbitrary code via format string specifiers in']
|
CVE-2005-0251
|
Cross-site scripting (XSS) vulnerability in bibindex.php for BibORB 1.3.2, and possibly earlier versions, allows remote attackers to inject arbitrary HTML and web script via the search parameter.
|
['inject arbitrary HTML', 'inject arbitrary HTML and web script via the', 'cross-site scripting (xss)']
|
CVE-2005-0252
|
SQL injection vulnerability in BibORB 1.3.2, and possibly earlier versions, allows remote attackers to execute arbitrary SQL commands via the (1) Username or (2) Password.
|
['execute arbitrary SQL commands', 'execute arbitrary SQL commands via the (1', 'sql injection']
|
CVE-2005-0253
|
Directory traversal vulnerability in index.php for BibORB 1.3.2, and possibly earlier versions, allows remote attackers to delete arbitrary files via a Delete action and .. (dot dot) sequences in the database_name parameter.
|
['delete arbitrary files', 'delete arbitrary files via a Delete action and', 'directory traversal']
|
CVE-2005-0254
|
BibORB 1.3.2, and possibly earlier versions, does not properly enforce a restriction for uploading only PDF and PS files, which allows remote attackers to upload arbitrary files that are presented to other users with PDF or PS icons, which may trick some users into downloading and executing those files.
|
['upload arbitrary files', 'upload arbitrary files that are presented to other']
|
CVE-2005-0255
|
String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execute arbitrary code by forcing an out-of-memory state that causes a reallocation to fail and return a pointer to a fixed address, which leads to heap corruption.
|
['execute arbitrary code', 'cause a denial of service and possibly execute', 'heap corruption']
|
CVE-2005-0256
|
The wu_fnmatch function in wu_fnmatch.c in wu-ftpd 2.6.1 and 2.6.2 allows remote attackers to cause a denial of service (CPU exhaustion by recursion) via a glob pattern with a large number of * (wildcard) characters, as demonstrated using the dir command.
|
['denial of service (CPU exhaustion by recursion)', 'cause a denial of service (CPU exhaustion', 'glob pattern']
|
CVE-2005-0258
|
Directory traversal vulnerability in (1) usercp_register.php and (2) usercp_avatar.php for phpBB 2.0.11, and possibly other versions, with gallery avatars enabled, allows remote attackers to delete (unlink) arbitrary files via "/../" sequences in the avatarselect parameter.
|
['delete (unlink) arbitrary files via "', 'directory traversal']
|
CVE-2005-0259
|
phpBB 2.0.11, and possibly other versions, with remote avatars and avatar uploading enabled, allows local users to read arbitrary files by providing both a local and remote location for an avatar, then modifying the "Upload Avatar from a URL:" field to reference the target file.
|
['read arbitrary files', 'read arbitrary files by providing both a local']
|
CVE-2005-0260
|
Stack-based buffer overflow in the Discovery Service for BrightStor ARCserve Backup 11.1 and earlier allows remote attackers to execute arbitrary code via a long packet to UDP port 41524, which is not properly handled in a recvfrom call.
|
['execute arbitrary code', 'execute arbitrary code via a long packet to', 'stack-based buffer overflow', 'stack based buffer overflow']
|
CVE-2005-0261
|
lspath in AIX 5.2, 5.3, and possibly earlier versions, does not drop privileges before processing the -f option, which allows local users to read one line of arbitrary files.
|
['read one line of arbitrary files']
|
CVE-2005-0262
|
Buffer overflow in ipl_varyon on AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via a long -d argument.
|
['execute arbitrary code', 'execute arbitrary code via a long -d argument', 'buffer overflow']
|
CVE-2005-0263
|
Buffer overflow in netpmon on AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via a long -O argument.
|
['execute arbitrary code', 'execute arbitrary code via a long -O argument', 'buffer overflow']
|
CVE-2005-0264
|
Multiple cross-site scripting (XSS) vulnerabilities in browse.php in OWL 0.7 and 0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) expand or (2) order parameter.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via the', 'cross-site scripting (xss)']
|
CVE-2005-0265
|
Multiple SQL injection vulnerabilities in browse.php in OWL 0.7 and 0.8 allow remote attackers to execute arbitrary SQL commands via the (1) parent or (2) sortposted parameter.
|
['execute arbitrary SQL commands', 'execute arbitrary SQL commands via the (1', 'sql injection', 'arbitrary sql commands']
|
CVE-2005-0266
|
Cross-site scripting (XSS) vulnerability in index.php in SugarCRM 1.X allows remote attackers to inject arbitrary web script or HTML via the (1) return_module, (2) return_action, (3) name, (4) module, or (5) record parameter.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via the', 'cross-site scripting (xss)']
|
CVE-2005-0267
|
index.php in FlatNuke 2.5.1 allows remote attackers to create an administrator account via carriage returns and #10 in the url_avatar field, which is interpreted as a sensitive directive.
|
['create an administrator account via carriage returns and', 'sensitive directive']
|
CVE-2005-0268
|
Direct code injection vulnerability in FlatNuke 2.5.1 allows remote attackers to execute arbitrary PHP code by placing the code into the url_avatar field.
|
['execute arbitrary PHP code', 'execute arbitrary PHP code by placing the code', 'direct code injection']
|
CVE-2005-0269
|
The file extension check in GNUBoard 3.40 and earlier only verifies extensions that contain all lowercase letters, which allows remote attackers to upload arbitrary files via file extensions that include uppercase letters.
|
['upload arbitrary files', 'upload arbitrary files via file extensions that include']
|
CVE-2005-0270
|
Multiple cross-site scripting (XSS) vulnerabilities in ReviewPost PHP Pro before 2.84 allow remote attackers to inject arbitrary web script or HTML via the (1) si parameter to showcat.php, (2) cat or (3) page parameter to showproduct.php, or (4) report parameter to reportproduct.php.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via the', 'cross-site scripting (xss)']
|
CVE-2005-0271
|
Multiple SQL injection vulnerabilities in ReviewPost PHP Pro before 2.84 allow remote attackers to execute arbitrary SQL commands via the (1) cat parameter to showcat.php or (2) product parameter to addfav.php.
|
['execute arbitrary SQL commands', 'execute arbitrary SQL commands via the (1', 'sql injection', 'arbitrary sql commands']
|
CVE-2005-0272
|
ReviewPost PHP Pro before 2.84 allows remote attackers to upload and execute arbitrary PHP files by posting a review file with multiple extensions, which bypasses the intended restrictions.
|
['execute arbitrary PHP files', 'upload and execute arbitrary PHP files by posting']
|
CVE-2005-0273
|
Multiple SQL injection vulnerabilities in showgallery.php in PhotoPost before 4.86 allow remote attackers to execute arbitrary SQL commands via the (1) cat or (2) ppuser parameter.
|
['execute arbitrary SQL commands', 'execute arbitrary SQL commands via the (1', 'sql injection', 'arbitrary sql commands']
|
CVE-2005-0274
|
Multiple cross-site scripting (XSS) vulnerabilities in showgallery.php in PhotoPost before 4.86 allow remote attackers to inject arbitrary web script or HTML via the (1) cat, (2) si, (3) page, or (4) ppuser parameters.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via the', 'cross-site scripting (xss)']
|
CVE-2005-0275
|
TFTP in 3Com 3CDaemon 2.0 revision 10 allows remote attackers to cause a denial of service (application crash) via a GET request containing an MS-DOS device name.
|
['denial of service (application crash)', 'cause a denial of service (application crash']
|
CVE-2005-0276
|
Multiple format string vulnerabilities in the FTP service in 3Com 3CDaemon 2.0 revision 10 allow remote attackers to cause a denial of service (application crash) via format string specifiers in (1) the username, (2) cd, (3) delete, (4) rename, (5) rmdir, (6) literal, (7) stat, or (8) CWD commands.
|
['denial of service (application crash)', 'cause a denial of service (application crash', 'format string']
|
CVE-2005-0277
|
Buffer overflow in the FTP service in 3Com 3CDaemon 2.0 revision 10 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via (1) a long username in the USER command or (2) an FTP command that contains a long argument, such as cd, send, or ls.
|
['execute arbitrary code', 'denial of service (application crash)', 'cause a denial of service (application crash', 'buffer overflow']
|
CVE-2005-0278
|
The FTP service in 3Com 3CDaemon 2.0 revision 10 allows remote attackers to gain sensitive information via a cd command that contains an MS-DOS device name, which reveals the installation path in an error message.
|
['gain sensitive information', 'gain sensitive information via a cd command that']
|
CVE-2005-0279
|
Soldner Secret Wars 30830 and earlier does not properly handle the "message too long" socket error, which allows remote attackers to cause a denial of service (socket termination) via a long UDP packet.
|
['denial of service (socket termination)', 'cause a denial of service (socket termination']
|
CVE-2005-0280
|
Format string vulnerability in Soldner Secret Wars 30830 and earlier allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via format string specifiers in a message.
|
['execute arbitrary code', 'denial of service (server crash)', 'cause a denial of service (server crash', 'format string']
|
CVE-2005-0281
|
Cross-site scripting (XSS) vulnerability in the web interface in Soldner Secret Wars 30830 allows remote attackers to inject arbitrary web script or HTML via a user message, which is not filtered or quoted when the administrator views the server logs.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via a', 'cross-site scripting (xss)']
|
CVE-2005-0282
|
SQL injection vulnerability in member.php in MyBulletinBoard (MyBB) allows remote attackers to execute arbitrary SQL commands via the uid parameter.
|
['execute arbitrary SQL commands', 'execute arbitrary SQL commands via the uid parameter', 'sql injection']
|
CVE-2005-0283
|
Directory traversal vulnerability in index.php in QwikiWiki allows remote attackers to read arbitrary files via a .. (dot dot) and a %00 at the end of the filename in the page parameter.
|
['read arbitrary files', 'read arbitrary files via a .. (dot', 'directory traversal']
|
CVE-2005-0284
|
SQL injection vulnerability in addentry.php in Woltlab Burning Book 1.0 Gold, 1.1.1e, and possibly other versions, allows remote attackers to execute arbitrary SQL commands via the user-agent parameter.
|
['execute arbitrary SQL commands', 'execute arbitrary SQL commands via the user-', 'sql injection', 'arbitrary sql commands']
|
CVE-2005-0285
|
Webseries Payment Application does not properly restrict privileged operations, which allows remote authenticated users to gain privileges by directly accessing certain URLs.
|
['gain privileges', 'gain privileges by directly accessing certain URLs']
|
CVE-2005-0286
|
eMotion MediaPartner Web Server 5.0 and 5.1 allows remote attackers to obtain sensitive information via an HTTP request for a .bhtml file that contains a (1) . (dot) or (2) + (plus sign) at the end, which returns the source code for that file.
|
['obtain sensitive information', 'obtain sensitive information via an HTTP request for']
|
CVE-2005-0287
|
Bottomline Webseries Payment Application allows remote attackers to read arbitrary files on the network via a report template with modified ReportPath or ReportName values.
|
['read arbitrary files', 'read arbitrary files on the network via a']
|
CVE-2005-0288
|
The change password functionality in Bottomline Webseries Payment Application does not require the old password when users enter a new password, which could allow remote authenticated users to change other users' passwords.
|
["change other users' passwords"]
|
CVE-2005-0289
|
Apple AirPort Express prior to 6.1.1 and Extreme prior to 5.5.1, configured as a Wireless Data Service (WDS), allows remote attackers to cause a denial of service (device freeze) by connecting to UDP port 161 and before link-state change occurs.
|
['denial of service (device freeze)', 'cause a denial of service (device freeze', 'udp port', 'link-state change']
|
CVE-2005-0290
|
NETGEAR FVS318 running firmware 2.4, and possibly other versions, allows remote attackers to bypass the filters using hex encoded URLs, as demonstrated using a hex encoded file extension.
|
['bypass the filters', 'bypass the filters using hex encoded URLs', 'hex encoded urls', 'hex encoded file extension']
|
CVE-2005-0291
|
Cross-site scripting (XSS) vulnerability in the log viewer in NETGEAR FVS318 running firmware 2.4, and possibly other versions, allows remote attackers to inject arbitrary web script or HTML via a blocked URL phrase.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via a', 'cross-site scripting (xss)']
|
CVE-2005-0292
|
Multiple SQL injection vulnerabilities in index.php in PHP Gift Registry (phpGiftReg) 1.4.0, and possibly other versions before 1.5.0b1, allow remote attackers to execute arbitrary SQL commands via the (1) messageid, (2) shopper, (3) shopfor, or (4) itemid parameters.
|
['execute arbitrary SQL commands', 'execute arbitrary SQL commands via the (1', 'sql injection']
|
CVE-2005-0293
|
Directory traversal vulnerability in minis.php in Minis 0.2.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the month parameter.
|
['read arbitrary files', 'read arbitrary files via a .. (dot', 'directory traversal']
|
CVE-2005-0294
|
minis.php in Minis 0.2.1 allows remote attackers to cause a denial of service (infinite loop) via an HTTP request for a file that the web server does not have permission to read, as demonstrated using the month parameter.
|
['denial of service (infinite loop)', 'cause a denial of service (infinite loop']
|
CVE-2005-0295
|
npptnt2.sys in nProtect Gameguard provides unrestricted I/O to any process that calls it, which allows local users to gain privileges.
|
['gain privileges', 'unrestricted i o']
|
CVE-2005-0296
|
NOTE: this issue has been disputed by the vendor. The error module in Novell GroupWise WebAccess allows remote attackers who have not authenticated to read potentially sensitive information, such as the version, via an incorrect login and a modified (1) error or (2) modify parameter that returns template files or the "about" information page. NOTE: the vendor has disputed this issue
|
['read potentially sensitive information', 'incorrect login']
|
CVE-2005-0297
|
SQL injection vulnerability in Oracle Database 9i and 10g allows remote attackers to execute arbitrary SQL commands and gain privileges.
|
['execute arbitrary SQL commands', 'gain privileges', 'execute arbitrary SQL commands and gain privileges', 'sql injection']
|
CVE-2005-0298
|
The DIRECTORY objects in Oracle 8i through Oracle 10g contain the location of a specific operating system directory, which allows users with read privileges to a DIRECTORY object to obtain sensitive information.
|
['obtain sensitive information', 'a DIRECTORY object to obtain sensitive information']
|
CVE-2005-0299
|
Directory traversal vulnerability in GForge 3.3 and earlier allows remote attackers to list arbitrary directories via a .. (dot dot) in the (1) dir parameter to controller.php or (2) dir_name parameter to controlleroo.php.
|
['list arbitrary directories', 'list arbitrary directories via a .. (dot', 'directory traversal']
|
CVE-2005-0300
|
Directory traversal vulnerability in session.php in JSBoard 2.0.9 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the table parameter.
|
['read arbitrary files', 'read arbitrary files via a .. (dot', 'directory traversal']
|
CVE-2005-0301
|
comersus_backoffice_install10.asp in BackOffice Lite 6.0 and 6.01 allows remote attackers to bypass authentication and gain privileges via a direct request to the program.
|
['bypass authentication', 'gain privileges', 'bypass authentication and gain privileges via a direct']
|
CVE-2005-0302
|
SQL injection vulnerability in default.asp in BackOffice Lite 6.0 and 6.01 allows remote attackers to execute arbitrary SQL commands via the referer field in the HTTP header.
|
['execute arbitrary SQL commands', 'execute arbitrary SQL commands via the referer field', 'sql injection', 'arbitrary sql commands']
|
CVE-2005-0303
|
Multiple cross-site scripting (XSS) vulnerabilities in (1) comersus_supportError.asp or (2) comersus_backofficelite_supportError.asp in BackOffice Lite 6.0 and 6.01 allow remote attackers to inject arbitrary web script or HTML via the error parameter.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via the', 'cross-site scripting (xss)']
|
CVE-2005-0304
|
Directory traversal vulnerability in DivX Player 2.6 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a filename in a ZIP file for a skin.
|
['overwrite arbitrary files', 'overwrite arbitrary files via a .. (dot', 'directory traversal']
|
CVE-2005-0305
|
CRLF injection vulnerability in users.php in Siteman 1.1.10 and earlier allows remote attackers to add arbitrary users and gain privileges via the line parameter in a docreate operation.
|
['add arbitrary users', 'gain privileges', 'add arbitrary users and gain privileges via the', 'crlf injection']
|
CVE-2005-0306
|
MercuryBoard 1.1.1 allows remote attackers to gain sensitive information via an HTTP request with the n parameter set to 0, which causes a divide-by-zero error and reveals the path in the resulting error message.
|
['gain sensitive information', 'gain sensitive information via an HTTP request with', 'divide-by-zero error']
|
CVE-2005-0307
|
Multiple cross-site scripting (XSS) vulnerabilities in index.php in MercuryBoard 1.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) s, (2) l, (3) a, (4) t, (5) to, or (6) re parameters.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via the', 'cross-site scripting (xss)']
|
CVE-2005-0308
|
Buffer overflow in the wsprintf function in W32Dasm 8.93 and earlier allows remote attackers to execute arbitrary code via a large import or export function name.
|
['execute arbitrary code', 'execute arbitrary code via a large import or', 'buffer overflow']
|
CVE-2005-0309
|
Multiple cross-site scripting (XSS) vulnerabilities in (1) index.php or (2) mod.php in Exponent 0.95 allow remote attackers to inject arbitrary web script or HTML via the module parameter.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via the', 'cross-site scripting (xss)']
|
CVE-2005-0310
|
Exponent 0.95 allows remote attackers to obtain sensitive information via a direct HTTP request to (1) search.info.php, (2) permissions.info.php, (3) security.info.php, (4) formcontrol.php, or (5) file_modules.php, which reveals the path in an error message because the pathos_core_version variable is undefined.
|
['obtain sensitive information', 'obtain sensitive information via a direct HTTP request', 'exponent']
|
CVE-2005-0311
|
Ingate Firewall 4.1.3 and earlier does not terminate the PPTP session for an active user when the administrator disables that user from a resource, which could allow remote authenticated users to retain unauthorized access to resources.
|
['retain unauthorized access to resources']
|
CVE-2005-0312
|
WarFTPD 1.82 RC9, when running as an NT service, allows remote authenticated users to cause a denial of service (access violation) via a CWD command with a crafted pathname, as demonstrated using a large string of "%s" sequences, possibly indicating a format string vulnerability.
|
['denial of service (access violation)', 'cause a denial of service (access violation', 'format string']
|
CVE-2005-0313
|
Multiple directory traversal vulnerabilities in Magic Winmail Server 4.0 Build 1112 allow remote attackers to (1) upload arbitrary files via certain parameters to upload.php or (2) read arbitrary files via certain parameters to download.php, and remote authenticated users to read, create, or delete arbitrary directories and files via the IMAP commands (3) CREATE, (4) EXAMINE, (5) SELECT, or (6) DELETE.
|
['upload arbitrary files', '(1) upload arbitrary files via certain', 'multiple directory traversal']
|
CVE-2005-0314
|
Cross-site scripting (XSS) vulnerability in user.php in Magic Winmail Server 4.0 Build 1112 allows remote attackers to inject arbitrary web script or HTML via the personal information fields.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via the', 'cross-site scripting (xss)']
|
CVE-2005-0315
|
The FTP service in Magic Winmail Server 4.0 Build 1112 does not verify that the IP address in a PORT command is the same as the IP address of the user of the FTP session, which allows remote authenticated users to use the server as an intermediary for port scanning.
|
['use the server as an intermediary for port']
|
CVE-2005-0316
|
WebWasher Classic 2.2.1 and 3.3, when running in server mode, does not properly drop CONNECT requests to the localhost from external systems, which could allow remote attackers to bypass intended access restrictions.
|
['bypass intended access restrictions', 'connect requests']
|
CVE-2005-0317
|
Cross-site scripting (XSS) vulnerability in useredit_account.wdm in Alt-N WebAdmin 3.0.4 allows remote attackers to inject arbitrary web script or HTML via the user parameter.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via the', 'cross-site scripting (xss)']
|
CVE-2005-0318
|
useredit_account.wdm in Alt-N WebAdmin 3.0.4 does not properly validate account edits by the logged in user, which allows remote authenticated users to edit other users' account information via a modified user parameter.
|
["edit other users' account information via a", 'modified user parameter']
|
CVE-2005-0319
|
Direct remote injection vulnerability in modalfram.wdm in Alt-N WebAdmin 3.0.4 allows remote attackers to load external webpages that appear to come from the WebAdmin server, which allows remote attackers to inject arbitrary HTML or web script to facilitate cross-site scripting (XSS) and phishing attacks.
|
['inject arbitrary HTML or web', 'load external webpages that appear to come from', 'inject arbitrary HTML or web script to facilitate', 'direct remote injection', 'cross-site scripting (xss)', 'phishing']
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.