Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2008-08-27 CVE-2008-2433 Use of Insufficiently Random Values vulnerability in Trendmicro products
The web management console in Trend Micro OfficeScan 7.0 through 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote attackers to hijack sessions via brute-force attacks.
network
low complexity
trendmicro CWE-330
critical
9.8
2008-08-22 CVE-2008-3775 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Newsoftwares Folder Lock
Folder Lock 5.9.5 and earlier uses weak encryption (ROT-25) for the password, which allows local administrators to obtain sensitive information by reading and decrypting the QualityControl\_pack registry value.
local
low complexity
newsoftwares CWE-327
4.4
2008-08-18 CVE-2008-3324 Download of Code Without Integrity Check vulnerability in Party Gaming Party Poker Client 121120
The PartyGaming PartyPoker client program 121/120 does not properly verify the authenticity of updates, which allows remote man-in-the-middle attackers to execute arbitrary code via a Trojan horse update.
network
high complexity
party-gaming CWE-494
8.1
2008-08-14 CVE-2008-3688 Use of Uninitialized Resource vulnerability in Havp Http Antivirus Proxy 0.88
sockethandler.cpp in HTTP Antivirus Proxy (HAVP) 0.88 allows remote attackers to cause a denial of service (hang) by connecting to a non-responsive server, which triggers an infinite loop due to an uninitialized variable.
network
low complexity
havp CWE-908
7.5
2008-08-14 CVE-2008-2369 Use of Hard-coded Credentials vulnerability in Redhat Satellite
manzier.pxt in Red Hat Network Satellite Server before 5.1.1 has a hard-coded authentication key, which allows remote attackers to connect to the server and obtain sensitive information about user accounts and entitlements.
network
low complexity
redhat CWE-798
critical
9.1
2008-08-12 CVE-2008-3275 Classic Buffer Overflow vulnerability in multiple products
The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel before 2.6.25.15 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service ("overflow" of the UBIFS orphan area) via a series of attempted file creations within deleted directories.
local
low complexity
linux debian canonical suse CWE-120
5.5
2008-08-12 CVE-2008-3604 SQL Injection vulnerability in Zeescripts Zeebuddy 2.1
SQL injection vulnerability in bannerclick.php in ZeeBuddy 2.1 allows remote attackers to execute arbitrary SQL commands via the adid parameter.
network
low complexity
zeescripts CWE-89
critical
9.8
2008-08-12 CVE-2008-3597 NULL Pointer Dereference vulnerability in Skulltag 0.97D2
Skulltag before 0.97d2-RC6 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by sending a "command 29" packet when the player is not in the game.
network
low complexity
skulltag CWE-476
7.5
2008-08-05 CVE-2008-3431 Unspecified vulnerability in Oracle Virtualbox 1.6.0/1.6.2
The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to gain privileges by opening the \\.\VBoxDrv device and calling DeviceIoControl to send a crafted kernel address.
local
low complexity
oracle
8.8
2008-08-01 CVE-2008-3438 Download of Code Without Integrity Check vulnerability in Apple mac OS X
Apple Mac OS X does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.
network
high complexity
apple CWE-494
8.1