Vulnerabilities > Medium

DATE CVE VULNERABILITY TITLE RISK
2005-11-01 CVE-2005-3406 Input Validation vulnerability in PHPESP
Cross-site scripting (XSS) vulnerability in phpESP 1.7.5 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
network
butterfat
4.3
2005-11-01 CVE-2005-3403 Input Validation vulnerability in ATutor
Multiple cross-site scripting (XSS) vulnerabilities in ATutor 1.4.1 through 1.5.1-pl1 allow remote attackers to inject arbitrary web script or HTML via (1) the _base_href parameter in translate.php, (2) the _base_path parameter in news.inc.php, and (3) the p parameter in add_note.php.
4.3
2005-11-01 CVE-2005-3401 Security Bypass vulnerability in Thehacker 5.8.4.128
Multiple interpretation error in TheHacker 5.8.4.128 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
network
low complexity
thehacker
5.0
2005-11-01 CVE-2005-3400 Security Bypass vulnerability in Fortinet 2.48.0.0
Multiple interpretation error in Fortinet 2.48.0.0 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
network
low complexity
fortinet
5.0
2005-11-01 CVE-2005-3399 Security Bypass vulnerability in CAT Quick Heal 8.0
Multiple interpretation error in CAT-QuickHeal 8.0 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
network
low complexity
cat
5.0
2005-11-01 CVE-2005-3398 Information Exposure vulnerability in SUN Solaris and Sunos
The default configuration of the web server for the Solaris Management Console (SMC) in Solaris 8, 9, and 10 enables the HTTP TRACE method, which could allow remote attackers to obtain sensitive information such as cookies and authentication data from HTTP headers.
network
sun CWE-200
4.3
2005-11-01 CVE-2005-3397 Input Validation And Information Disclosure vulnerability in Comersus BackOffice
Cross-site scripting (XSS) vulnerability in Comersus BackOffice allows remote attackers to inject arbitrary web script or HTML via the error parameter to comersus_backoffice_supportError.asp.
4.3
2005-11-01 CVE-2005-3389 Unspecified vulnerability in PHP
The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.
network
low complexity
php
5.0
2005-11-01 CVE-2005-3387 Unspecified vulnerability in Luca Deri Ntop
The startup script in packages/RedHat/ntop.init in ntop before 3.2, when ntop.conf is writable by users besides root, creates temporary files insecurely, which allows remote attackers to execute arbitrary code.
local
low complexity
luca-deri
4.6
2005-10-30 CVE-2005-3123 Directory Traversal vulnerability in GNU gnump3d
Directory traversal vulnerability in GNUMP3D before 2.9.6 allows remote attackers to read arbitrary files via crafted sequences such as "/.//..//////././", which is collapsed into "/.././" after ".." and "//" sequences are removed.
network
low complexity
gnu
5.0