Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2008-04-08 CVE-2008-0087 Use of Insufficiently Random Values vulnerability in Microsoft products
The DNS client in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, and Vista uses predictable DNS transaction IDs, which allows remote attackers to spoof DNS responses.
network
low complexity
microsoft CWE-330
7.5
2008-03-26 CVE-2008-1526 Use of Password Hash With Insufficient Computational Effort vulnerability in Zyxel products
ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), do not use a salt when calculating an MD5 password hash, which makes it easier for attackers to crack passwords.
network
low complexity
zyxel CWE-916
7.5
2008-03-19 CVE-2008-0063 Use of Uninitialized Resource vulnerability in multiple products
The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
7.5
2008-02-12 CVE-2008-0077 Use After Free vulnerability in Microsoft Internet Explorer 6/7
Use-after-free vulnerability in Microsoft Internet Explorer 6 SP1, 6 SP2, and and 7 allows remote attackers to execute arbitrary code by assigning malformed values to certain properties, as demonstrated using the by property of an animateMotion SVG element, aka "Property Memory Corruption Vulnerability."
network
low complexity
microsoft CWE-416
8.8
2008-02-12 CVE-2007-5659 Classic Buffer Overflow vulnerability in Adobe Acrobat
Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods.
local
low complexity
adobe CWE-120
7.8
2008-02-08 CVE-2008-0662 Incorrect Permission Assignment for Critical Resource vulnerability in Checkpoint Vpn-1 Secureclient Ngair56/Ngxr60
The Auto Local Logon feature in Check Point VPN-1 SecuRemote/SecureClient NGX R60 and R56 for Windows caches credentials under the Checkpoint\SecuRemote registry key, which has Everyone/Full Control permissions, which allows local users to gain privileges by reading and reusing the credentials.
local
low complexity
checkpoint CWE-732
7.8
2008-01-22 CVE-2008-0374 Cleartext Transmission of Sensitive Information vulnerability in OKI C5510Mfp Firmware 1.01
OKI C5510MFP Printer CU H2.15, PU 01.03.01, System F/W 1.01, and Web Page 1.00 sends the configuration of the printer in cleartext, which allows remote attackers to obtain the administrative password by connecting to TCP port 5548 or 7777.
network
low complexity
oki CWE-319
7.5
2008-01-08 CVE-2008-0141 Use of Insufficiently Random Values vulnerability in Webportal CMS Project Webportal CMS 0.6.0
actions.php in WebPortal CMS 0.6-beta generates predictable passwords containing only the time of day, which makes it easier for remote attackers to obtain access to any account via a lostpass action.
network
low complexity
webportal-cms-project CWE-330
7.5
2007-11-20 CVE-2007-6033 Incorrect Permission Assignment for Critical Resource vulnerability in Wonderware Intouch 8.0
Invensys Wonderware InTouch 8.0 creates a NetDDE share with insecure permissions (Everyone/Full Control), which allows remote authenticated attackers, and possibly anonymous users, to execute arbitrary programs.
network
low complexity
wonderware CWE-732
8.8
2007-11-15 CVE-2007-4268 Incorrect Conversion between Numeric Types vulnerability in Apple mac OS X
Integer signedness error in the Networking component in Apple Mac OS X 10.4 through 10.4.10 allows local users to execute arbitrary code via a crafted AppleTalk message with a negative value, which satisfies a signed comparison during mbuf allocation but is later interpreted as an unsigned value, which triggers a heap-based buffer overflow.
local
low complexity
apple CWE-681
7.8