Max CVSS | 10.0 | Min CVSS | 2.1 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2010-3302 | 6.5 |
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a
|
13-02-2023 - 04:23 | 05-10-2010 - 22:00 | |
CVE-2010-3308 | 6.5 |
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via a long cisco_banner (aka server_banner) field.
|
13-02-2023 - 04:23 | 05-10-2010 - 22:00 | |
CVE-2010-3691 | 3.3 |
PGTStorage/pgt-file.php in phpCAS before 1.1.3, when proxy mode is enabled, allows local users to overwrite arbitrary files via a symlink attack on an unspecified file.
|
30-12-2019 - 12:59 | 07-10-2010 - 21:00 | |
CVE-2010-3692 | 6.4 |
Directory traversal vulnerability in the callback function in client.php in phpCAS before 1.1.3, when proxy mode is enabled, allows remote attackers to create or overwrite arbitrary files via directory traversal sequences in a Proxy Granting Ticket I
|
30-12-2019 - 12:59 | 07-10-2010 - 21:00 | |
CVE-2010-3690 | 4.3 |
Multiple cross-site scripting (XSS) vulnerabilities in phpCAS before 1.1.3, when proxy mode is enabled, allow remote attackers to inject arbitrary web script or HTML via (1) a crafted Proxy Granting Ticket IOU (PGTiou) parameter to the callback funct
|
30-12-2019 - 12:59 | 07-10-2010 - 21:00 | |
CVE-2010-3752 | 6.5 |
programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in (1) cisco_dns_info or (2) cisco_domain_info data in a packet, a different vulnerabil
|
29-07-2019 - 13:26 | 05-10-2010 - 22:00 | |
CVE-2010-3753 | 6.5 |
programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-
|
29-07-2019 - 13:26 | 05-10-2010 - 22:00 | |
CVE-2018-4205 | 4.3 |
An issue was discovered in certain Apple products. Safari before 11.1.1 is affected. The issue involves the "Safari" component. It allows remote attackers to spoof the address bar via a crafted web site.
|
17-07-2018 - 15:23 | 08-06-2018 - 18:29 | |
CVE-2005-2403 | 5.0 |
The login protocol in RealChat 3.5.1b does not use authentication, which allows remote attackers to log on as other users by sniffing the beginning of a chat session and replaying it via a modified username.
|
11-07-2017 - 01:32 | 27-07-2005 - 04:00 | |
CVE-2012-3376 | 7.5 |
DataNodes in Apache Hadoop 2.0.0 alpha does not check the BlockTokens of clients when Kerberos is enabled and the DataNode has checked out the same BlockPool twice from a NodeName, which might allow remote clients to read arbitrary blocks, write to b
|
24-03-2017 - 01:59 | 12-07-2012 - 19:55 | |
CVE-2007-3023 | 10.0 |
unsp.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1 does not properly calculate the end of a certain buffer, with unknown impact and remote attack vectors.
|
31-10-2012 - 02:37 | 07-06-2007 - 21:30 | |
CVE-2005-2418 | 5.0 |
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2403. Reason: This candidate is a duplicate of CVE-2005-2403. Notes: All CVE users should reference CVE-2005-2403 instead of this candidate. All references and descriptions in t
|
10-09-2008 - 19:42 | 03-08-2005 - 04:00 | |
CVE-2007-3024 | 2.1 |
libclamav/others.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1 uses insecure permissions for temporary files that are created by the cli_gentempstream function in clamd/clamdscan, which might allow local users to read sensitive files.
|
05-09-2008 - 21:24 | 07-06-2007 - 22:30 | |
CVE-2002-2103 | 5.0 |
Apache before 1.3.24, when writing to the log file, records a spoofed hostname from the reverse lookup of an IP address, even when a double-reverse lookup fails, which allows remote attackers to hide the original source of activities.
|
05-09-2008 - 20:32 | 31-12-2002 - 05:00 |