Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2005-12-31 CVE-2005-4868 Incorrect Permission Assignment for Critical Resource vulnerability in IBM DB2 Universal Database
Shared memory sections and events in IBM DB2 8.1 have default permissions of read and write for the Everyone group, which allows local users to gain unauthorized access, gain sensitive information, such as cleartext passwords, and cause a denial of service.
local
low complexity
ibm CWE-732
7.1
2005-12-31 CVE-2005-4860 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Spectrumcu Cash Receipting System 6.406.08
Spectrum Cash Receipting System before 6.504 uses weak cryptography (static substitution) in the PASSFILE password file, which makes it easier for local users to gain privileges by decrypting a password.
local
low complexity
spectrumcu CWE-327
7.8
2005-11-24 CVE-2005-3803 Use of Hard-coded Credentials vulnerability in Cisco Unified Wireless IP Phone 7920 Firmware 1.0(8)
Cisco IP Phone (VoIP) 7920 1.0(8) contains certain hard-coded ("fixed") public and private SNMP community strings that cannot be changed, which allows remote attackers to obtain sensitive information.
network
low complexity
cisco CWE-798
7.5
2005-11-21 CVE-2005-3716 Use of Hard-coded Credentials vulnerability in Utstarcom F1000 Wi-Fi Firmware 2.0
The SNMP daemon in UTStarcom F1000 VOIP WIFI Phone s2.0 running VxWorks 5.5.1 with kernel WIND 2.6 has hard-coded public credentials that cannot be changed, which allows attackers to obtain sensitive information.
network
low complexity
utstarcom CWE-798
7.5
2005-10-05 CVE-2005-3140 Cleartext Transmission of Sensitive Information vulnerability in Procom Netforce 800 Firmware 4.02
Procom NetFORCE 800 4.02 M10 Build 20 and possibly other versions sends the NIS password map (passwd.nis) as a file attachment in diagnostic e-mail messages, which allows remote attackers to obtain the cleartext NIS password hashes.
network
low complexity
procom CWE-319
7.5
2005-09-16 CVE-2005-2946 Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products
The default configuration on OpenSSL before 0.9.8 uses MD5 for creating message digests instead of a more cryptographically strong algorithm, which makes it easier for remote attackers to forge certificates with a valid certificate authority signature.
network
low complexity
openssl canonical CWE-327
7.5
2005-09-06 CVE-2005-2801 Incorrect Comparison vulnerability in Linux Kernel 2.6.0
xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.
network
low complexity
linux CWE-697
7.5
2005-07-26 CVE-2005-1920 Improper Preservation of Permissions vulnerability in multiple products
The (1) Kate and (2) Kwrite applications in KDE KDE 3.2.x through 3.4.0 do not properly set the same permissions on the backup file as were set on the original file, which could allow local users and possibly remote attackers to obtain sensitive information.
network
low complexity
kde debian CWE-281
7.5
2005-07-18 CVE-2005-2281 Inadequate Encryption Strength vulnerability in Juvare Webeoc
WebEOC before 6.0.2 uses a weak encryption scheme for passwords, which makes it easier for attackers to crack passwords.
network
low complexity
juvare CWE-326
7.5
2005-07-11 CVE-2005-2182 Improper Verification of Cryptographic Signature vulnerability in Grandstream Bt-100 Firmware
Grandstream BudgeTone (BT) 100 Voice over IP (VoIP) phones do not properly check the Call-ID, branch, and tag values in a NOTIFY message to verify a subscription, which allows remote attackers to spoof messages such as the "Messages waiting" message.
network
low complexity
grandstream CWE-347
7.5