Vulnerabilities > Use of Externally-Controlled Format String
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2006-02-15 | CVE-2006-0705 | USE of Externally-Controlled Format String vulnerability in multiple products Format string vulnerability in a logging function as used by various SFTP servers, including (1) AttachmateWRQ Reflection for Secure IT UNIX Server before 6.0.0.9, (2) Reflection for Secure IT Windows Server before 6.0 build 38, (3) F-Secure SSH Server for Windows before 5.3 build 35, (4) F-Secure SSH Server for UNIX 3.0 through 5.0.8, (5) SSH Tectia Server 4.3.6 and earlier and 4.4.0, and (6) SSH Shell Server 3.2.9 and earlier, allows remote authenticated users to execute arbitrary commands via unspecified vectors, involving crafted filenames and the stat command. | 6.5 |
2006-01-13 | CVE-2006-0200 | USE of Externally-Controlled Format String vulnerability in PHP 5.1.0/5.1.1 Format string vulnerability in the error-reporting feature in the mysqli extension in PHP 5.1.0 and 5.1.1 might allow remote attackers to execute arbitrary code via format string specifiers in MySQL error messages. | 9.3 |
2006-01-04 | CVE-2006-0082 | USE of Externally-Controlled Format String vulnerability in Imagemagick 6.2.3 Format string vulnerability in the SetImageInfo function in image.c for ImageMagick 6.2.3 and other versions, and GraphicsMagick, allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a numeric format string specifier such as %d in the file name, a variant of CVE-2005-0397, and as demonstrated using the convert program. | 5.1 |
2005-10-05 | CVE-2005-3154 | USE of Externally-Controlled Format String vulnerability in Softwin Bitdefender 7.2/8.0/9.0 Format string vulnerability in the logging functionality in BitDefender AntiVirus 7.2 through 9 allows remote attackers to cause a denial of service and possibly execute arbitrary code via format string specifiers in file or directory name. | 7.5 |
2005-04-14 | CVE-2005-1122 | USE of Externally-Controlled Format String vulnerability in Monkey-Project Monkey Format string vulnerability in cgi.c for Monkey daemon (monkeyd) before 0.9.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP GET request containing double-encoded format string specifiers (aka "double expansion error"). | 7.5 |
2004-12-31 | CVE-2004-2714 | USE of Externally-Controlled Format String vulnerability in Windowmaker Unspecified vulnerability in Window Maker 0.80.2 and earlier allows attackers to perform unknown actions via format string specifiers in a font specification in WMGLOBAL, probably a format string vulnerability. | 6.0 |
2004-12-31 | CVE-2004-2386 | USE of Externally-Controlled Format String vulnerability in multiple products Format string vulnerability in the LogMsg function in sercd before 2.3.1 and sredird 2.2.1 and earlier allows remote attackers to execute arbitrary code via format string specifiers passed from the HandleCPCCommand function. | 7.5 |
2004-10-23 | CVE-2004-1628 | USE of Externally-Controlled Format String vulnerability in Pizzashack Rssh Format string vulnerability in log.c in rssh before 2.2.2 allows remote authenticated users to execute arbitrary code. | 9.0 |
2004-10-20 | CVE-2004-0777 | USE of Externally-Controlled Format String vulnerability in Inter7 Courier-Imap Format string vulnerability in the auth_debug function in Courier-IMAP 1.6.0 through 2.2.1 and 3.x through 3.0.3, when login debugging (DEBUG_LOGIN) is enabled, allows remote attackers to execute arbitrary code. | 7.5 |
2003-12-31 | CVE-2003-1381 | USE of Externally-Controlled Format String vulnerability in Amxmod.Net AMX MOD 0.9.2 Format string vulnerability in AMX 0.9.2 and earlier, a plugin for Valve Software's Half-Life Server, allows remote attackers to execute arbitrary commands via format string specifiers in the amx_say command. | 6.8 |