Vulnerabilities > Medium

DATE CVE VULNERABILITY TITLE RISK
2005-05-02 CVE-2005-0275 Denial-Of-Service vulnerability in 3Com 3Cdaemon 2.0
TFTP in 3Com 3CDaemon 2.0 revision 10 allows remote attackers to cause a denial of service (application crash) via a GET request containing an MS-DOS device name.
network
low complexity
3com
5.0
2005-05-02 CVE-2005-0270 Cross-Site Scripting vulnerability in Photopost Reviewpost PHP PRO 1.0.2/2.5/2.5.1
Multiple cross-site scripting (XSS) vulnerabilities in ReviewPost PHP Pro before 2.84 allow remote attackers to inject arbitrary web script or HTML via the (1) si parameter to showcat.php, (2) cat or (3) page parameter to showproduct.php, or (4) report parameter to reportproduct.php.
network
photopost
4.3
2005-05-02 CVE-2005-0264 Cross-Site Scripting and SQL Injection vulnerability in Owl Intranet Engine
Multiple cross-site scripting (XSS) vulnerabilities in browse.php in OWL 0.7 and 0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) expand or (2) order parameter.
network
owl
4.3
2005-05-02 CVE-2005-0256 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Washington University Wu-Ftpd 2.6.1/2.6.2
The wu_fnmatch function in wu_fnmatch.c in wu-ftpd 2.6.1 and 2.6.2 allows remote attackers to cause a denial of service (CPU exhaustion by recursion) via a glob pattern with a large number of * (wildcard) characters, as demonstrated using the dir command.
network
low complexity
washington-university CWE-119
5.0
2005-05-02 CVE-2005-0255 Remote vulnerability in Mozilla Firefox, Mozilla and Thunderbird
String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execute arbitrary code by forcing an out-of-memory state that causes a reallocation to fail and return a pointer to a fixed address, which leads to heap corruption.
network
low complexity
mozilla
5.0
2005-05-02 CVE-2005-0247 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Postgresql
Multiple buffer overflows in gram.y for PostgreSQL 8.0.1 and earlier may allow attackers to execute arbitrary code via (1) a large number of variables in a SQL statement being handled by the read_sql_construct function, (2) a large number of INTO variables in a SELECT statement being handled by the make_select_stmt function, (3) a large number of arbitrary variables in a SELECT statement being handled by the make_select_stmt function, and (4) a large number of INTO variables in a FETCH statement being handled by the make_fetch_stmt function, a different set of vulnerabilities than CVE-2005-0245.
network
low complexity
postgresql CWE-119
6.5
2005-05-02 CVE-2005-0244 Permissions, Privileges, and Access Controls vulnerability in Postgresql
PostgreSQL 8.0.0 and earlier allows local users to bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command.
network
low complexity
postgresql CWE-264
6.5
2005-05-02 CVE-2005-0241 Remote vulnerability in Squid Proxy Oversize HTTP Headers
The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size.
network
low complexity
squid
5.0
2005-05-02 CVE-2005-0238 The International Domain Name (IDN) support in Epiphany allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
network
low complexity
gnome mozilla omnigroup opera
5.0
2005-05-02 CVE-2005-0237 Unspecified vulnerability in KDE and Konqueror
The International Domain Name (IDN) support in Konqueror 3.2.1 on KDE 3.2.1 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
network
low complexity
kde
5.0