Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2002-10-04 | CVE-2002-0884 | Multiple vulnerability in Multiple Vendor In.Rarpd Multiple format string vulnerabilities in in.rarpd (ARP server) on Solaris, Caldera UnixWare and Open UNIX, and possibly other operating systems, allows remote attackers to execute arbitrary code via format strings that are not properly handled in the functions (1) syserr and (2) error. | 7.5 |
2002-10-04 | CVE-2002-0883 | Unspecified vulnerability in Compaq Proliant BL E-Class Integrated Administrator Firmware 1.0/1.10 Vulnerability in Compaq ProLiant BL e-Class Integrated Administrator 1.0 and 1.10, allows authenticated users with Telnet, SSH, or console access to conduct unauthorized activities. | 7.2 |
2002-10-04 | CVE-2002-0878 | SQL Injection vulnerability in LogiSense Hawk-i Login SQL injection vulnerability in the login form for LogiSense software including (1) Hawk-i Billing, (2) Hawk-i ASP and (3) DNS Manager allows remote attackers to bypass authentication via SQL code in the password field. | 7.5 |
2002-10-04 | CVE-2002-0850 | Buffer Overflow vulnerability in PGP Corporate Desktop 7.1.1 Buffer overflow in PGP Corporate Desktop 7.1.1 allows remote attackers to execute arbitrary code via an encrypted document that has a long filename when it is decrypted. | 7.5 |
2002-10-04 | CVE-2002-0837 | Remote Command Execution vulnerability in Wordtrans-web wordtrans 1.1pre8 and earlier in the wordtrans-web package allows remote attackers to (1) execute arbitrary code or (2) conduct cross-site scripting attacks via certain parameters (possibly "dict") to the wordtrans.php script. | 7.5 |
2002-10-04 | CVE-2002-0696 | Unspecified vulnerability in Microsoft Visual Foxpro 6.0 Microsoft Visual FoxPro 6.0 does not register its associated files with Internet Explorer, which allows remote attackers to execute Visual FoxPro applications without warning via HTML that references specially-crafted filenames. | 7.5 |
2002-10-04 | CVE-2002-0664 | Unspecified vulnerability in Granite Software Zmerge 4.0/5.0 The default Access Control Lists (ACLs) of the administration database for ZMerge 4.x and 5.x provides arbitrary users (including anonymous users) with Manager level access, which allows the users to read or modify import/export scripts. | 7.5 |
2002-10-04 | CVE-2002-0384 | Buffer Overflow vulnerability in Gaim Jabber Plug-In Buffer overflow in Jabber plug-in for Gaim client before 0.58 allows remote attackers to execute arbitrary code. | 7.5 |
2002-10-03 | CVE-2002-1642 | Unspecified vulnerability in Postgresql 7.2/7.2.1/7.2.2 PostgreSQL 7.2.1 and 7.2.2 allows local users to delete transaction log (pg_clog) data and cause a denial of service (data loss) via the VACUUM command. | 7.2 |
2002-09-24 | CVE-2002-1124 | Local Buffer Overflow vulnerability in Purity 1.14/1.15/1.9 Multiple buffer overflows in purity 1-16 allow local users to gain privileges and modify high scores tables. | 7.2 |