Total
5442 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2009-5001 | 1 Ibm | 1 Filenet P8 Application Engine | 2010-09-21 | 4.0 MEDIUM | N/A |
The Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 4.0.2.x before 4.0.2.2-P8AE-FP002 grants a document's Creator-Owner full control over an annotation object, even if the default instance security has changed, which might allow remote authenticated users to bypass intended access restrictions in opportunistic circumstances. | |||||
CVE-2010-2843 | 1 Cisco | 1 Wireless Lan Controller Software | 2010-09-13 | 9.0 HIGH | N/A |
Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2842 and CVE-2010-3033. | |||||
CVE-2010-3033 | 1 Cisco | 1 Wireless Lan Controller Software | 2010-09-13 | 9.0 HIGH | N/A |
Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2842 and CVE-2010-2843. | |||||
CVE-2010-2842 | 1 Cisco | 1 Wireless Lan Controller Software | 2010-09-13 | 9.0 HIGH | N/A |
Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2843 and CVE-2010-3033. | |||||
CVE-2010-0575 | 1 Cisco | 1 Wireless Lan Controller Software | 2010-09-13 | 5.0 MEDIUM | N/A |
Cisco Wireless LAN Controller (WLC) software, possibly 6.0.x or possibly 4.1 through 6.0.x, allows remote attackers to bypass ACLs in the controller CPU, and consequently send network traffic to unintended segments or devices, via unspecified vectors, a different vulnerability than CVE-2010-3034. | |||||
CVE-2010-3034 | 1 Cisco | 1 Wireless Lan Controller Software | 2010-09-13 | 5.0 MEDIUM | N/A |
Cisco Wireless LAN Controller (WLC) software, possibly 6.0.x or possibly 4.1 through 6.0.x, allows remote attackers to bypass ACLs in the controller CPU, and consequently send network traffic to unintended segments or devices, via unspecified vectors, a different vulnerability than CVE-2010-0575. | |||||
CVE-2009-4997 | 1 Gnome | 1 Power Manager | 2010-09-08 | 7.2 HIGH | N/A |
gnome-power-manager 2.27.92 does not properly implement the lock_on_suspend and lock_on_hibernate settings for locking the screen when the suspend or hibernate button is pressed, which might make it easier for physically proximate attackers to access an unattended laptop via a resume action, a related issue to CVE-2010-2532. NOTE: this issue exists because of a regression that followed a gnome-power-manager fix a few years earlier. | |||||
CVE-2006-7240 | 1 Gnome | 1 Power Manager | 2010-09-08 | 7.2 HIGH | N/A |
gnome-power-manager 2.14.0 does not properly implement the lock_on_suspend and lock_on_hibernate settings for locking the screen when the suspend or hibernate button is pressed, which might make it easier for physically proximate attackers to access an unattended laptop via a resume action, a related issue to CVE-2010-2532. | |||||
CVE-2010-2756 | 1 Mozilla | 1 Bugzilla | 2010-09-08 | 5.0 MEDIUM | N/A |
Search.pm in Bugzilla 2.19.1 through 3.2.7, 3.3.1 through 3.4.7, 3.5.1 through 3.6.1, and 3.7 through 3.7.2 allows remote attackers to determine the group memberships of arbitrary users via vectors involving the Search interface, boolean charts, and group-based pronouns. | |||||
CVE-2010-0429 | 1 Redhat | 2 Enterprise Virtualization, Qspice | 2010-08-25 | 6.6 MEDIUM | N/A |
libspice, as used in QEMU-KVM in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and qspice 0.3.0, does not properly restrict the addresses upon which memory-management actions are performed, which allows guest OS users to cause a denial of service (guest OS crash) or possibly gain privileges via unspecified vectors. | |||||
CVE-2010-2784 | 1 Redhat | 2 Enterprise Virtualization, Kvm | 2010-08-25 | 6.6 MEDIUM | N/A |
The subpage MMIO initialization functionality in the subpage_register function in exec.c in QEMU-KVM, as used in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and KVM 83, does not properly select the index for access to the callback array, which allows guest OS users to cause a denial of service (guest OS crash) or possibly gain privileges via unspecified vectors. | |||||
CVE-2010-2968 | 1 Windriver | 1 Vxworks | 2010-08-05 | 7.8 HIGH | N/A |
The FTP daemon in Wind River VxWorks does not close the TCP connection after a number of failed login attempts, which makes it easier for remote attackers to obtain access via a brute-force attack. | |||||
CVE-2010-1671 | 1 Pharscape | 1 Hsolink | 2010-08-03 | 7.2 HIGH | N/A |
hsolinkcontrol in hsolink 1.0.118 allows local users to gain privileges via shell metacharacters in command-line arguments, as demonstrated by the second argument in a down action. | |||||
CVE-2010-2896 | 1 Ibm | 1 Filenet Content Manager | 2010-07-29 | 4.3 MEDIUM | N/A |
IBM FileNet Content Manager (CM) 4.0.0, 4.0.1, 4.5.0, and 4.5.1 before FP4 does not properly manage the InheritParentPermissions setting during an upgrade from 3.x, which might allow attackers to bypass intended folder permissions via unspecified vectors. | |||||
CVE-2010-2656 | 1 Ibm | 2 Advanced Management Module, Bladecenter | 2010-07-20 | 5.0 MEDIUM | N/A |
The IBM BladeCenter with Advanced Management Module (AMM) firmware build ID BPET48L, and possibly other versions before 4.7 and 5.0, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download (1) logs or (2) core files via direct requests, as demonstrated by a request for private/sdc.tgz. | |||||
CVE-2010-2693 | 1 Freebsd | 1 Freebsd | 2010-07-14 | 7.2 HIGH | N/A |
FreeBSD 7.1 through 8.1-PRERELEASE does not copy the read-only flag when creating a duplicate mbuf buffer reference, which allows local users to cause a denial of service (system file corruption) and gain privileges via the sendfile system call. | |||||
CVE-2010-2465 | 3 Linearcorp, S2sys, Sonitrol | 4 Emerge 50, Emerge 5000, Netbox and 1 more | 2010-07-13 | 5.0 MEDIUM | N/A |
The S2 Security NetBox 2.5, 3.3, and 4.0, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download node logs, photographs of persons, and backup files via unspecified HTTP requests. | |||||
CVE-2004-2769 | 1 Cerberusftp | 1 Ftp Server | 2010-07-06 | 4.0 MEDIUM | N/A |
Cerberus FTP Server before 4.0.3.0 allows remote authenticated users to list hidden files, even when the "Display hidden files" option is enabled, via the (1) MLSD or (2) MLST commands. | |||||
CVE-2009-4913 | 1 Cisco | 1 Asa 5580 | 2010-06-30 | 5.0 MEDIUM | N/A |
The IPv6 implementation on Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) exposes IP services on the "far side of the box," which might allow remote attackers to bypass intended access restrictions via IPv6 packets, aka Bug ID CSCso58622. | |||||
CVE-2009-4912 | 1 Cisco | 1 Asa 5580 | 2010-06-30 | 10.0 HIGH | N/A |
Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) complete an SSL handshake with an HTTPS client even if this client is unauthorized, which might allow remote attackers to bypass intended access restrictions via an HTTPS session, aka Bug ID CSCso10876. |