Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2005-07-12 | CVE-2005-2246 | File Include vulnerability in iPhotoAlbum Multiple PHP remote file inclusion vulnerabilities in iPhotoAlbum 1.1 allow remote attackers to execute arbitrary code via the (1) doc_path parameter to getpage.php or (2) set_menu parameter to lib/static/header.php. | 7.5 |
2005-07-12 | CVE-2005-2245 | SSL Authentication Bypass vulnerability in F5 BIG-IP Unknown vulnerability in F5 BIG-IP 9.0.2 through 9.1 allows attackers to "subvert the authentication of SSL transactions," via unknown attack vectors, possibly involving NATIVE ciphers. | 7.5 |
2005-07-12 | CVE-2005-2237 | Local Buffer Overflow vulnerability in IBM AIX Swcons Command Line Argument Format string vulnerability in the swcons command in IBM AIX 5.3, and possibly other versions, might allow local users to execute arbitrary code via long command line arguments. | 7.2 |
2005-07-12 | CVE-2005-2236 | Local Format String vulnerability in IBM AIX 5.3 Format string vulnerability in the paginit command in IBM AIX 5.3, and possibly other versions, might allow local users to execute arbitrary code via format strings in command line arguments. | 7.2 |
2005-07-12 | CVE-2005-2235 | Local Buffer Overflow vulnerability in IBM AIX diagTasksWebSM Command Line Argument Buffer overflow in the diagTasksWebSM command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments. | 7.2 |
2005-07-12 | CVE-2005-2234 | Local Buffer Overflow vulnerability in IBM AIX GetLVName Command Line Argument Buffer overflow in the getlvname command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments. | 7.2 |
2005-07-12 | CVE-2005-2233 | Local Buffer Overflow vulnerability in IBM AIX Penable Command Line Argument Buffer overflow in multiple "p" commands in IBM AIX 5.1, 5.2 and 5.3 might allow local users to execute arbitrary code via long command line arguments to (1) penable or other hard-linked files including (2) pdisable, (3) pstart, (4) phold, (5) pdelay, or (6) pshare. | 7.2 |
2005-07-12 | CVE-2005-2229 | Information Disclosure vulnerability in Blog Torrent Blog Torrent 0.92 and earlier stores sensitive files under the web document root in the (1) data or (2) torrents directories with insufficient access control, which allows remote attackers to obtain sensitive information such as account names and password hashes, as demonstrated using data/newusers. | 7.5 |
2005-07-12 | CVE-2005-2227 | Local Information Disclosure vulnerability in Softiacom Wmailserver 1.0 Softiacom wMailserver 1.0 stores passwords in plaintext in the Darsite\MAILSRV\Admin key, which allows local users to gain administrator privileges. | 7.2 |
2005-07-12 | CVE-2005-2216 | Unspecified vulnerability in Photogal Photo Gallery PHP remote file inclusion vulnerability in gals.php in PhotoGal Photo Gallery 1.5 and earlier allows remote attackers to execute arbitrary code via the news_file parameter. | 7.5 |