Vulnerabilities > Critical

DATE CVE VULNERABILITY TITLE RISK
2010-02-02 CVE-2009-4013 Path Traversal vulnerability in multiple products
Multiple directory traversal vulnerabilities in Lintian 1.23.x through 1.23.28, 1.24.x through 1.24.2.1, and 2.x before 2.3.2 allow remote attackers to overwrite arbitrary files or obtain sensitive information via vectors involving (1) control field names, (2) control field values, and (3) control files of patch systems.
network
low complexity
debian canonical CWE-22
critical
9.8
2010-01-06 CVE-2009-4581 Path Traversal vulnerability in Roseonlinecms
Directory traversal vulnerability in modules/admincp.php in RoseOnlineCMS 3 B1 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the admin parameter.
network
low complexity
roseonlinecms CWE-22
critical
9.8
2009-10-23 CVE-2009-3616 Use After Free vulnerability in multiple products
Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (3) using the Fuzzy Screen Mode protocol, related to double free vulnerabilities.
network
low complexity
qemu redhat CWE-416
critical
9.9
2009-09-25 CVE-2009-3421 Improper Authentication vulnerability in Zenas Pao-Bacheca Guestbook 2.1
login.php in Zenas PaoBacheca Guestbook 2.1, when register_globals is enabled, allows remote attackers to bypass authentication and gain administrative access by setting the login_ok parameter to 1.
network
low complexity
zenas CWE-287
critical
9.8
2009-08-28 CVE-2008-7109 Incorrect Authorization vulnerability in Kyoceramita Scanner File Utility 3.3.0.1
The Scanner File Utility (aka listener) in Kyocera Mita (KM) 3.3.0.1 allows remote attackers to bypass authorization and upload arbitrary files to the client system via a modified program that does not prompt the user for a password.
network
low complexity
kyoceramita CWE-863
critical
9.8
2009-08-14 CVE-2009-1048 Authentication Bypass by Spoofing vulnerability in Snom products
The web interface on the snom VoIP phones snom 300, snom 320, snom 360, snom 370, and snom 820 with firmware 6.5 before 6.5.20, 7.1 before 7.1.39, and 7.3 before 7.3.14 allows remote attackers to bypass authentication, and reconfigure the phone or make arbitrary use of the phone, via a (1) http or (2) https request with 127.0.0.1 in the Host header.
network
low complexity
snom CWE-290
critical
9.8
2009-07-10 CVE-2009-2422 Improper Authentication vulnerability in multiple products
The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password.
network
low complexity
rubyonrails apple CWE-287
critical
9.8
2009-07-08 CVE-2009-2382 Improper Authentication vulnerability in Jay-Jayx0R PHPmyblockchecker 1.0.0055
admin.php in phpMyBlockchecker 1.0.0055 allows remote attackers to bypass authentication and gain administrative access by setting the PHPMYBCAdmin cookie to LOGGEDIN.
network
low complexity
jay-jayx0r CWE-287
critical
9.8
2009-07-08 CVE-2009-2367 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Iomega Storcenter PRO Firmware
cgi-bin/makecgi-pro in Iomega StorCenter Pro generates predictable session IDs, which allows remote attackers to hijack active sessions and gain privileges via brute force guessing attacks on the session_id parameter.
network
low complexity
iomega CWE-338
critical
9.8
2009-06-22 CVE-2009-2168 Improper Authentication vulnerability in Egyplus 7Ammel 1.0.1
cpanel/login.php in EgyPlus 7ammel (aka 7ml) 1.0.1 and earlier sends a redirect to the web browser but does not exit when the supplied credentials are incorrect, which allows remote attackers to bypass authentication by providing arbitrary username and password parameters.
network
low complexity
egyplus CWE-287
critical
9.8