Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2005-05-02 CVE-2005-0539 Local Security vulnerability in IBM Hardware Management Console 4.1/4.2
Unknown vulnerability in IBM Hardware Management Console (HMC) before 4.4 for POWER5 servers allows local users to gain privileges, related to the Guided Setup Wizard.
local
low complexity
ibm
4.6
2005-05-02 CVE-2005-0538 Directory Traversal vulnerability in Ginp 0.20/0.21
Directory traversal vulnerability in (1) GinpPictureServlet.java and (2) PicCollection.java in ginp (Java Photo Gallery Web Application) before 0.22 allows remote attackers to read arbitrary files.
network
low complexity
ginp
5.0
2005-05-02 CVE-2005-0536 Unspecified vulnerability in Mediawiki
Directory traversal vulnerability in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allows remote attackers to delete arbitrary files or determine file existence via a parameter related to image deletion.
network
low complexity
mediawiki
5.0
2005-05-02 CVE-2005-0534 Unspecified vulnerability in Mediawiki
Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allow remote attackers to inject arbitrary web script.
network
mediawiki
4.3
2005-05-02 CVE-2005-0533 Heap Overflow vulnerability in Trend Micro VSAPI ARJ Handling
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
network
low complexity
trend-micro
7.5
2005-05-02 CVE-2005-0527 Unspecified vulnerability in Mozilla Firefox 1.0
Firefox 1.0 allows remote attackers to execute arbitrary code via plugins that load "privileged content" into frames, as demonstrated using certain XUL events when a user drags a scrollbar two times, aka "Firescrolling."
network
high complexity
mozilla
5.1
2005-05-02 CVE-2005-0526 Cross-Site Scripting vulnerability in Pblang 4.65
Multiple cross-site scripting (XSS) vulnerabilities in PBLang 4.65 allow remote attackers to inject arbitrary web script or HTML via (1) the search string to search.php, (2) the subject of a PM, which is processed by pm.php, or (3) the body of a PM, which is processed by pmpshow.php.
network
pblang
4.3
2005-05-02 CVE-2005-0525 Unspecified vulnerability in PHP
The php_next_marker function in image.c for PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function, allows remote attackers to cause a denial of service (infinite loop) via a JPEG image with an invalid marker value, which causes a negative length value to be passed to php_stream_seek.
network
low complexity
php
5.0
2005-05-02 CVE-2005-0524 Unspecified vulnerability in PHP
The php_handle_iff function in image.c for PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function, allows remote attackers to cause a denial of service (infinite loop) via a -8 size value.
network
low complexity
php
5.0
2005-05-02 CVE-2005-0523 Remote Client-Side Format String vulnerability in ProZilla Initial Server Response
Format string vulnerability in ProZilla 1.3.7.3 and earlier allows remote attackers to execute arbitrary code via format string specifiers in the Location header.
network
low complexity
prozilla
7.5