Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2005-02-21 CVE-2005-0496 Use of Hard-coded Credentials vulnerability in Arkeia Network Backup 5.0
Arkeia Network Backup Client 5.x contains hard-coded credentials that effectively serve as a back door, which allows remote attackers to access the file system and possibly execute arbitrary commands.
network
low complexity
arkeia CWE-798
critical
9.8
2005-02-14 CVE-2005-0408 Use of Password Hash With Insufficient Computational Effort vulnerability in Citrusdb 0.3.6
CitrusDB 0.3.6 and earlier generates easily predictable MD5 hashes of the user name for the id_hash cookie, which allows remote attackers to bypass authentication and gain privileges by calculating the MD5 checksum of the user name combined with the "boogaadeeboo" string, which is hard-coded in the $hidden_hash variable.
network
low complexity
citrusdb CWE-916
critical
9.8
2005-02-14 CVE-2005-0406 Improper Cross-boundary Removal of Sensitive Data vulnerability in Image Processing Project Image Processing
A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.
local
low complexity
image-processing-project CWE-212
5.5
2005-02-09 CVE-2004-0940 Incorrect Calculation of Buffer Size vulnerability in multiple products
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
local
low complexity
openpkg apache slackware hp suse trustix CWE-131
7.8
2005-01-24 CVE-2005-0102 Integer Overflow or Wraparound vulnerability in multiple products
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
network
low complexity
gnome debian CWE-190
critical
9.8
2004-12-31 CVE-2004-2397 Cleartext Storage of Sensitive Information vulnerability in Broadcom Bluecoat Security Gateway
The web-based Management Console in Blue Coat Security Gateway OS 3.0 through 3.1.3.13 and 3.2.1, when importing a private key, stores the key and its passphrase in plaintext in a log file, which allows attackers to steal digital certificates.
network
low complexity
broadcom CWE-312
7.5
2004-12-31 CVE-2004-2331 Unsafe Reflection vulnerability in Macromedia Coldfusion 6.1
ColdFusion MX 6.1 and 6.1 J2EE allows local users to bypass sandbox security restrictions and obtain sensitive information by using Java reflection methods to access trusted Java objects without using the CreateObject function or cfobject tag.
local
low complexity
macromedia CWE-470
5.5
2004-12-31 CVE-2004-2214 Improper Handling of Case Sensitivity vulnerability in Mbedthis Appweb Http Server 1.0.4
Mbedthis AppWeb HTTP server before 1.1.3 allows remote attackers to bypass access restrictions via a URI with mixed case characters.
network
low complexity
mbedthis CWE-178
critical
9.8
2004-12-31 CVE-2004-2172 Inadequate Encryption Strength vulnerability in Netsourcecommerce Productcart
EarlyImpact ProductCart uses a weak encryption scheme to encrypt passwords, which allows remote attackers to obtain the password via a chosen plaintext attack.
network
low complexity
netsourcecommerce CWE-326
7.5
2004-12-31 CVE-2004-2154 Improper Handling of Case Sensitivity vulnerability in multiple products
CUPS before 1.1.21rc1 treats a Location directive in cupsd.conf as case sensitive, which allows attackers to bypass intended ACLs via a printer name containing uppercase or lowercase letters that are different from what is specified in the directive.
network
low complexity
apple canonical CWE-178
critical
9.8