Total
258583 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2010-2368 | 1 Lhaplus | 1 Lhaplus | 2010-10-21 | 6.9 MEDIUM | N/A |
| Untrusted search path vulnerability in Lhaplus before 1.58 allows local users to gain privileges via a Trojan horse DLL in the current working directory. | |||||
| CVE-2010-3353 | 1 More-cowbell | 1 Cowbell | 2010-10-21 | 6.9 MEDIUM | N/A |
| Cowbell 0.2.7.1 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3382 | 1 Uoregon | 1 Tau | 2010-10-21 | 6.9 MEDIUM | N/A |
| tauex in Tuning and Analysis Utilities (TAU) 2.16.4 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3376 | 1 Root | 1 Root | 2010-10-21 | 6.9 MEDIUM | N/A |
| The (1) proofserv, (2) xrdcp, (3) xrdpwdadmin, and (4) xrd scripts in ROOT 5.18/00 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3377 | 1 Salome-platform | 1 Salome | 2010-10-21 | 6.9 MEDIUM | N/A |
| The (1) runSalome, (2) runTestMedCorba, (3) runLightSalome, and (4) hxx2salome scripts in SALOME 5.1.3 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3360 | 1 Pedro Villavicencio Garrido | 1 Hipo | 2010-10-21 | 6.9 MEDIUM | N/A |
| Hipo 0.6.1 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3362 | 1 Last | 1 Last.fm | 2010-10-21 | 6.9 MEDIUM | N/A |
| lastfm 1.5.4 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3385 | 1 Herac | 1 Tuxguitar | 2010-10-21 | 6.9 MEDIUM | N/A |
| TuxGuitar 1.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3393 | 1 Ecmwf | 1 Magics\+\+ | 2010-10-21 | 6.9 MEDIUM | N/A |
| magics-config in Magics++ 2.10.0 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3381 | 1 Alex Launi | 1 Tangerine | 2010-10-21 | 6.9 MEDIUM | N/A |
| The (1) tangerine and (2) tangerine-properties scripts in Tangerine 0.3.2.2 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3363 | 1 Roaraudio | 1 Roaraudio | 2010-10-21 | 6.9 MEDIUM | N/A |
| roarify in roaraudio 0.3 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-3386 | 1 Lttng | 1 Ust | 2010-10-21 | 6.9 MEDIUM | N/A |
| usttrace in LTTng Userspace Tracer (aka UST) 0.7 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2010-4007 | 1 Oracle | 1 Mojarra | 2010-10-21 | 5.0 MEDIUM | N/A |
| Oracle Mojarra uses an encrypted View State without a Message Authentication Code (MAC), which makes it easier for remote attackers to perform successful modifications of the View State via a padding oracle attack, a related issue to CVE-2010-2057. | |||||
| CVE-2010-3384 | 1 Bernhard Wymann | 1 Torcs | 2010-10-21 | 6.9 MEDIUM | N/A |
| The (1) torcs, (2) nfsperf, (3) accc, (4) texmapper, (5) trackgen, and (6) nfs2ac scripts in TORCS 1.3.1 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
| CVE-2008-7262 | 1 G.rodola | 1 Pyftpdlib | 2010-10-20 | 6.5 MEDIUM | N/A |
| Multiple directory traversal vulnerabilities in FTPServer.py in pyftpdlib before 0.3.0 allow remote authenticated users to access arbitrary files and directories via vectors involving a symlink in a pathname to a (1) CWD, (2) DELE, (3) STOR, or (4) RETR command. | |||||
| CVE-2010-3494 | 1 G.rodola | 1 Pyftpdlib | 2010-10-20 | 4.3 MEDIUM | N/A |
| Race condition in the FTPHandler class in ftpserver.py in pyftpdlib before 0.5.2 allows remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, a related issue to CVE-2010-3492. | |||||
| CVE-2008-7263 | 1 G.rodola | 1 Pyftpdlib | 2010-10-20 | 7.5 HIGH | N/A |
| ftpserver.py in pyftpdlib before 0.5.0 does not delay its response after receiving an invalid login attempt, which makes it easier for remote attackers to obtain access via a brute-force attack. | |||||
| CVE-2008-7264 | 1 G.rodola | 1 Pyftpdlib | 2010-10-20 | 4.0 MEDIUM | N/A |
| The ftp_QUIT function in ftpserver.py in pyftpdlib before 0.5.0 allows remote authenticated users to cause a denial of service (file descriptor exhaustion and daemon outage) by sending a QUIT command during a disallowed data-transfer attempt. | |||||
| CVE-2007-6736 | 1 G.rodola | 1 Pyftpdlib | 2010-10-20 | 6.5 MEDIUM | N/A |
| Multiple directory traversal vulnerabilities in FTPServer.py in pyftpdlib before 0.2.0 allow remote authenticated users to access arbitrary files and directories via a .. (dot dot) in a (1) LIST, (2) STOR, or (3) RETR command. | |||||
| CVE-2007-6738 | 1 G.rodola | 1 Pyftpdlib | 2010-10-20 | 5.0 MEDIUM | N/A |
| pyftpdlib before 0.1.1 does not choose a random value for the port associated with the PASV command, which makes it easier for remote attackers to obtain potentially sensitive information about the number of in-progress data connections by reading the response to this command. | |||||
