Max CVSS | 9.3 | Min CVSS | 3.5 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2009-0325 | 4.3 |
Directory traversal vulnerability in entries/index.php in Ninja Blog 4.8, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the cat parameter.
|
14-02-2024 - 01:17 | 29-01-2009 - 18:30 | |
CVE-2009-0034 | 6.9 |
parse.c in sudo 1.6.9p17 through 1.6.9p19 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file
|
12-01-2024 - 20:40 | 30-01-2009 - 19:30 | |
CVE-2018-7183 | 7.5 |
Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.
|
20-07-2021 - 23:15 | 08-03-2018 - 20:29 | |
CVE-2007-1921 | 9.3 |
LIBSNDFILE.DLL, as used by AOL Nullsoft Winamp 5.33 and possibly other products, allows remote attackers to execute arbitrary code via a crafted .MAT file that contains a value that is used as an offset, which triggers memory corruption. To exploit t
|
16-10-2018 - 16:41 | 10-04-2007 - 23:19 | |
CVE-2012-0167 | 9.3 |
Heap-based buffer overflow in the Office GDI+ library in Microsoft Office 2003 SP3 and 2007 SP2 and SP3 allows remote attackers to execute arbitrary code via a crafted EMF image in an Office document, aka "GDI+ Heap Overflow Vulnerability."
|
12-10-2018 - 22:02 | 09-05-2012 - 00:55 | |
CVE-2009-0392 | 6.8 |
Directory traversal vulnerability in sysconf.cgi in Motorola Wimax modem CPEi300 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the page parameter.
|
11-10-2018 - 21:01 | 03-02-2009 - 01:30 | |
CVE-2009-0393 | 3.5 |
Cross-site scripting (XSS) vulnerability in sysconf.cgi in Motorola Wimax modem CPEi300 allows remote authenticated users to inject arbitrary web script or HTML via the page parameter.
|
11-10-2018 - 21:01 | 03-02-2009 - 01:30 | |
CVE-2005-1275 | 5.0 |
Heap-based buffer overflow in the ReadPNMImage function in pnm.c for ImageMagick 6.2.1 and earlier allows remote attackers to cause a denial of service (application crash) via a PNM file with a small colors value.
|
11-10-2017 - 01:30 | 25-04-2005 - 04:00 | |
CVE-2001-0963 | 7.5 |
Directory traversal vulnerability in SpoonFTP 1.1 allows local and sometimes remote attackers to access files outside of the FTP root via a ... (modified dot dot) in the CD (CWD) command.
|
10-10-2017 - 01:29 | 20-09-2001 - 04:00 | |
CVE-2009-0389 | 9.3 |
Multiple insecure method vulnerabilities in the Web On Windows (WOW) ActiveX control in WOW ActiveX 2 allow remote attackers to (1) create and overwrite arbitrary files via the WriteIniFileString method, (2) execute arbitrary programs via the ShellEx
|
29-09-2017 - 01:33 | 02-02-2009 - 22:00 | |
CVE-2008-5953 | 7.5 |
Directory traversal vulnerability in KTP Computer Customer Database (KTPCCD) CMS, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the p parameter to the default URI.
|
29-09-2017 - 01:32 | 23-01-2009 - 19:00 | |
CVE-2016-5085 | 7.8 |
Johnson & Johnson Animas OneTouch Ping devices do not properly generate random numbers, which makes it easier for remote attackers to spoof meters by sniffing the network and then engaging in an authentication handshake.
|
24-12-2016 - 02:59 | 05-10-2016 - 10:59 | |
CVE-2016-5084 | 5.0 |
Johnson & Johnson Animas OneTouch Ping devices do not use encryption for certain data, which might allow remote attackers to obtain sensitive information by sniffing the network.
|
24-12-2016 - 02:59 | 05-10-2016 - 10:59 | |
CVE-2016-5086 | 9.3 |
Johnson & Johnson Animas OneTouch Ping devices allow remote attackers to bypass authentication via replay attacks.
|
24-12-2016 - 02:59 | 05-10-2016 - 10:59 | |
CVE-2016-5686 | 9.3 |
Johnson & Johnson Animas OneTouch Ping devices mishandle acknowledgements, which makes it easier for remote attackers to bypass authentication via a custom communication protocol.
|
28-11-2016 - 20:28 | 05-10-2016 - 10:59 | |
CVE-2009-0415 | 3.7 |
Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path.
|
04-02-2009 - 05:00 | 03-02-2009 - 23:30 |