ID: CVE-2007-2139 |
Title: SANS07S4: Multiple unspecified vulnerabilities in mediasvr and caloggerd in CA BrightStor ARCServe Backup |
Type: Services |
Bulletins:
CVE-2007-2139 SFBID23635 |
Severity: Low |
Description: Multiple stack-based buffer overflows in the SUN RPC service in CA (formerly Computer Associates) BrightStor ARCserve Media Server, as used in BrightStor ARCserve Backup 9.01 through 11.5 SP2, BrightStor Enterprise Backup 10.5, Server Protection Suite 2, and Business Protection Suite 2, allow remote attackers to execute arbitrary code via malformed RPC strings. | ||||
Applies to: CA BrightStor ARCServe Backup |
Created: 2007-12-21 |
Updated: 2010-08-21 |
ID: REF000650 |
Title: MP installed: Flash browser plug-in is installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Flash Media Plugin for internet browsers is installed. | ||||
Applies to: |
Created: 2007-12-20 |
Updated: 2010-08-21 |
ID: REF000651 |
Title: MP installed: MPlayer browser plug-in is installed |
Type: Software |
Bulletins: | Severity: Low |
Description: MPlayer Media Plugin for internet browsers is installed. | ||||
Applies to: |
Created: 2007-12-20 |
Updated: 2010-08-21 |
ID: REF000652 |
Title: MP installed: HelixPlayer browser plug-in is installed |
Type: Software |
Bulletins: | Severity: Low |
Description: HelixPlayer Media Plugin for internet browsers is installed. | ||||
Applies to: |
Created: 2007-12-20 |
Updated: 2010-08-21 |
ID: REF000653 |
Title: MP installed: VLC browser plug-in is installed |
Type: Software |
Bulletins: | Severity: Low |
Description: VLC Media Plugin for internet browsers is installed. | ||||
Applies to: |
Created: 2007-12-20 |
Updated: 2010-08-21 |
ID: REF000654 |
Title: MP installed: GCJ java browser plug-in is installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Java Media Plugin for internet browsers is installed. | ||||
Applies to: |
Created: 2007-12-20 |
Updated: 2010-08-21 |
ID: CVE-2007-1086 |
Title: SANS07S7: Multiple vulnerabilities in IBM DB2 |
Type: Services |
Bulletins:
CVE-2007-1086 CVE-2007-1087 CVE-2007-1088 CVE-2007-1089 CVE-2007-2582 CVE-2007-5652 SFBID22677 SFBID26010 SFBID23890 SFBID26450 |
Severity: High |
Description: Multiple vulnerabilities exist in IBM DB2 before version 9.1 FixPack4. These include execution of arbitrary code, creation and modification of arbitrary files, and execution of unauthorized SQL commands. | ||||
Applies to: IBM DB2 |
Created: 2007-12-17 |
Updated: 2010-08-21 |
ID: CVE-2006-5339 |
Title: SANS07S7: Multiple vulnerabilities in Oracle 8.1.7.4 |
Type: Services |
Bulletins:
CVE-2006-5339 CVE-2006-5340 CVE-2006-5344 CVE-2007-0272 SFBID20588 SFBID22083 |
Severity: High |
Description: Multiple vulnerabilities exist in Oracle 8.1.7.4, including buffer overflows, and multiple unspecified vulnerabilities. | ||||
Applies to: Oracle Database 8i |
Created: 2007-12-17 |
Updated: 2010-08-21 |
ID: CVE-2006-5332 |
Title: SANS07S7: Multiple vulnerabilities in Oracle Database 10g |
Type: Services |
Bulletins:
CVE-2006-5332 CVE-2006-5333 CVE-2006-5334 CVE-2006-5335 CVE-2006-5336 CVE-2006-5339 CVE-2006-5340 CVE-2006-5341 CVE-2006-5342 CVE-2006-5343 CVE-2006-5344 CVE-2006-5345 CVE-2007-0272 CVE-2007-1442 CVE-2007-2113 CVE-2007-5506 SFBID20588 SFBID22083 SFBID23532 SFBID22905 |
Severity: High |
Description: Multiple vulnerabilities exist in some versions of Oracle Database Server 10g. It is recommended to update to the latest versions or apply the latest patches. | ||||
Applies to: Oracle Database 10g |
Created: 2007-12-14 |
Updated: 2010-08-21 |
ID: CVE-2006-5332 |
Title: SANS07S7: Multiple vulnerabilities in Oracle Database 9i |
Type: Services |
Bulletins:
CVE-2006-5332 CVE-2006-5334 CVE-2006-5336 CVE-2006-5339 CVE-2006-5340 CVE-2006-5341 CVE-2006-5342 CVE-2006-5344 CVE-2006-5345 CVE-2007-0272 CVE-2007-2118 CVE-2007-5506 SFBID20588 SFBID22083 SFBID23532 |
Severity: High |
Description: Multiple vulnerabilities exist in some versions of Oracle Database Server 9i. It is recommended to update to the latest versions or apply the latest patches. | ||||
Applies to: Oracle Database 9i |
Created: 2007-12-14 |
Updated: 2010-08-21 |
ID: CVE-2007-2418 |
Title: SANS07A1: Multiple buffer overflow vulnerabilities in Trillian earlier than 3.1.7.0 |
Type: Software |
Bulletins:
CVE-2007-2418 CVE-2007-2478 CVE-2007-3832 CVE-2007-3305 SFBID23781 SFBID23730 SFBID24927 SFBID24523 |
Severity: Low |
Description: Multiple buffer overflow vulnerabilities exist in Cerulean Studios Trillian 3.x before 3.1.7.0, allowing remote attackers to execute arbitrary code. | ||||
Applies to: Cerulean Studios Trillian |
Created: 2007-12-14 |
Updated: 2010-08-21 |
ID: CVE-2007-1680 |
Title: SANS07A1: Stack-based buffer overflow in Yahoo! Messenger before 20070313 |
Type: Software |
Bulletins:
CVE-2007-1680 SFBID23291 |
Severity: High |
Description: Stack-based buffer overflow in the createAndJoinConference function in the AudioConf ActiveX control (yacscom.dll) in Yahoo! Messenger before March 13, 2007, allows remote attackers to execute arbitrary code via long socksHostname and hostname properties. | ||||
Applies to: |
Created: 2007-12-14 |
Updated: 2010-08-21 |
ID: CVE-2007-6372 |
Title: Unspecified vulnerability in Juniper JUNOS 7.3 through 8.4 allows remote attackers to cause a denial of service (crash) via malformed BGP packets, possibly BGP UPDATE packets that trigger session flapping. |
Type: Hardware |
Bulletins:
CVE-2007-6372 SFBID26869 |
Severity: High |
Description: Unspecified vulnerability in Juniper JUNOS 7.3 through 8.4 allows remote attackers to cause a denial of service (crash) via malformed BGP packets, possibly BGP UPDATE packets that trigger session flapping. | ||||
Applies to: |
Created: 2007-12-14 |
Updated: 2020-08-14 |
ID: CVE-2007-3457 |
Title: SANS07C4: Adobe Flash Player 8.0.34.0 and earlier vulnerable to CSRF attack |
Type: Software |
Bulletins:
CVE-2007-3457 |
Severity: Medium |
Description: Adobe Flash Player 8.0.34.0 and earlier insufficiently validates HTTP Referer headers, which potentially allows remote attackers to conduct a CSRF attack via a crafted SWF file. | ||||
Applies to: Adobe Flash Player |
Created: 2007-12-11 |
Updated: 2010-08-21 |
ID: CVE-2007-0711 |
Title: SANS07C4: Multiple vulnerabilities in Apple Quicktime 7.2 and earlier |
Type: Software |
Bulletins:
CVE-2007-0711 CVE-2007-0712 CVE-2007-0714 CVE-2007-2295 CVE-2007-2296 CVE-2007-0754 CVE-2007-2389 CVE-2007-2393 CVE-2007-2394 CVE-2007-5045 CVE-2007-4673 SFBID24873 SFBID22827 SFBID22844 SFBID25913 SFBID23652 SFBID23923 SFBID23650 SFBID24222 |
Severity: High |
Description: Multiple vulnerabilities exist in Apple Quicktime version 7.2 and earlier. These include possibility of information disclosure and code execution. | ||||
Applies to: Apple QuickTime |
Created: 2007-12-11 |
Updated: 2010-08-21 |
ID: CVE-2007-3752 |
Title: SANS07C4: Buffer overflow in Apple iTunes before 7.4 |
Type: Software |
Bulletins:
CVE-2007-3752 |
Severity: High |
Description: Buffer overflow in Apple iTunes before 7.4 allows remote attackers to cause a denial of service (application termination) or execute arbitrary code via a music file with crafted album cover art. | ||||
Applies to: Apple iTunes |
Created: 2007-12-10 |
Updated: 2010-08-21 |
ID: CVE-2007-2497 |
Title: SANS07C4: Multiple Vulnerabilities in RealPlayer 10, 10.5 and 11 Beta |
Type: Software |
Bulletins:
CVE-2007-2497 CVE-2007-3410 CVE-2007-5601 SFBID23712 SFBID26130 |
Severity: High |
Description: Multiple vulnerabilities exist in RealPlayer versions 10.0, 10.5 and 11 Beta. These include remote execution of arbitrary code, and denial of service. | ||||
Applies to: RealPlayer |
Created: 2007-12-10 |
Updated: 2010-08-21 |
ID: REF000642 |
Title: P2P installed: mldonkey installed |
Type: Software |
Bulletins: | Severity: Low |
Description: mlDonkey P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-10 |
Updated: 2010-08-21 |
ID: CVE-2007-0044 |
Title: SANS07C1: Multiple vulnerabilities in Adobe Reader earlier than 8.0.0 |
Type: Software |
Bulletins:
CVE-2007-0044 CVE-2007-0046 CVE-2007-0103 CVE-2007-0045 SFBID21858 SFBID21910 |
Severity: Medium |
Description: Multiple vulnerabilities exist in Adobe Reader earlier than 8.0.0, some of which have unknown impact. Known vulnerabilities include denial of service and remote execution of arbitrary code. | ||||
Applies to: Adobe Reader |
Created: 2007-12-07 |
Updated: 2010-08-21 |
ID: REF000601 |
Title: IM installed: skype installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Skype instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000602 |
Title: IM installed: epic installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Epic instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000603 |
Title: IM installed: gnu gadu installed |
Type: Software |
Bulletins: | Severity: Low |
Description: GNU Gadu instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000604 |
Title: IM installed: gossip installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Gossip instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000605 |
Title: IM installed: jabber installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Jabber instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000606 |
Title: IM installed: jabbin installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Jabin instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000607 |
Title: IM installed: kadu installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Kadu instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000608 |
Title: IM installed: kxicq installed |
Type: Software |
Bulletins: | Severity: Low |
Description: KxICQ instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000609 |
Title: IM installed: licq installed |
Type: Software |
Bulletins: | Severity: Low |
Description: LICQ instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000610 |
Title: IM installed: lostirc installed |
Type: Software |
Bulletins: | Severity: Low |
Description: LostIRC instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000611 |
Title: IM installed: micq installed |
Type: Software |
Bulletins: | Severity: Low |
Description: mICQ instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000612 |
Title: IM installed: pidgin installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Pidgin instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000613 |
Title: IM installed: psi installed |
Type: Software |
Bulletins: | Severity: Low |
Description: PSI instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000614 |
Title: IM installed: sim installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Sim instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000615 |
Title: IM installed: sircd installed |
Type: Software |
Bulletins: | Severity: Low |
Description: sIRCd instant messaging server installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000616 |
Title: IM installed: kicq installed |
Type: Software |
Bulletins: | Severity: Low |
Description: KICQ instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000619 |
Title: IM installed: gaim installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Gaim instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000620 |
Title: IM installed: kopete installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Kopete instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000621 |
Title: IM installed: yahoo messenger installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Yahoo Messenger instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000622 |
Title: IM installed: trebuchet installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Trebuchet instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000623 |
Title: IM installed: talk installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Talk instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000624 |
Title: IM installed: ytalk installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Ytalk instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000625 |
Title: IM installed: gabber installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Gabber instant messaging client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000626 |
Title: P2P installed: azureus installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Azureus P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000627 |
Title: P2P installed: bittornado installed |
Type: Software |
Bulletins: | Severity: Low |
Description: BitTornado P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000628 |
Title: P2P installed: bittorrent installed |
Type: Software |
Bulletins: | Severity: Low |
Description: BitTorrent P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000629 |
Title: P2P installed: ctorrent installed |
Type: Software |
Bulletins: | Severity: Low |
Description: cTorrent P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000630 |
Title: P2P installed: deluge installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Deluge P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000631 |
Title: P2P installed: gnunet installed |
Type: Software |
Bulletins: | Severity: Low |
Description: GnuNet P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000632 |
Title: P2P installed: ktorrent installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Ktorrent P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000633 |
Title: P2P installed: kommute installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Komute P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000634 |
Title: P2P installed: qtella installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Qtella P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000635 |
Title: P2P installed: rtorrent installed |
Type: Software |
Bulletins: | Severity: Low |
Description: rTorrent P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000636 |
Title: P2P installed: transmission installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Transmission P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000637 |
Title: P2P installed: dctc installed |
Type: Software |
Bulletins: | Severity: Low |
Description: DCtc P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000638 |
Title: P2P installed: xmule installed |
Type: Software |
Bulletins: | Severity: Low |
Description: xMule P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000639 |
Title: P2P installed: apollon installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Apollon P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000640 |
Title: P2P installed: mutella installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Mutella P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000641 |
Title: P2P installed: knapster installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Knapster P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000643 |
Title: P2P installed: napster installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Napster P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000644 |
Title: P2P installed: gnut installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Gnut P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000645 |
Title: P2P installed: lopster instaled |
Type: Software |
Bulletins: | Severity: Low |
Description: Lopster P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000646 |
Title: P2P installed: nap installed |
Type: Software |
Bulletins: | Severity: Low |
Description: Nap P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000647 |
Title: P2P installed: gtk-gnutella installed |
Type: Software |
Bulletins: | Severity: Low |
Description: GTK-Gnutella P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000648 |
Title: P2P installed: amule installed |
Type: Software |
Bulletins: | Severity: Low |
Description: aMule P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000649 |
Title: P2P installed: bitstormlite installed |
Type: Software |
Bulletins: | Severity: Low |
Description: BitStormLite P2P file sharing client installed. | ||||
Applies to: |
Created: 2007-12-06 |
Updated: 2010-08-21 |
ID: REF000663 |
Title: Config laptop: swap partition not encrypted |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: Computer was identified as a laptop. No encryption was detected on the swap partition. | ||||
Applies to: |
Created: 2007-12-05 |
Updated: 2010-08-21 |
ID: REF000664 |
Title: Config laptop: home partition not encrypted |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: Computer was identified as a laptop. No encryption was detected on the home partition. | ||||
Applies to: |
Created: 2007-12-05 |
Updated: 2010-08-21 |
ID: REF000665 |
Title: Config laptop: root partition not encypted |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: Computer was identified as a laptop. No encryption was detected on the root partition. | ||||
Applies to: |
Created: 2007-12-05 |
Updated: 2010-08-21 |
ID: CVE-2007-0777 |
Title: SANS07C3: Multiple Vulnerabilities in Mozilla Thunderbird 1.5.x earlier than 1.5.0.13 |
Type: |
Bulletins:
CVE-2007-0777 CVE-2007-2867 CVE-2007-3845 CVE-2006-4565 CVE-2006-4571 CVE-2006-5463 CVE-2006-5747 CVE-2006-6502 CVE-2007-1282 SFBID22694 SFBID24242 SFBID21668 SFBID20042 SFBID20957 SFBID22845 |
Severity: High |
Description: Mozilla Thunderbird 1.5.x versions earlier than 1.5.0.13 are vulnerable to remote denial of service attacks and remote execution of arbitrary commands. | ||||
Applies to: Mozilla Thunderbird |
Created: 2007-12-04 |
Updated: 2010-08-21 |
ID: CVE-2007-2867 |
Title: SANS07C3: Multiple Vulnerabilities in Mozilla Thunderbird 2.x earlier than 2.0.0.6 |
Type: |
Bulletins:
CVE-2007-2867 CVE-2007-3734 CVE-2007-3735 CVE-2007-3845 SFBID24242 SFBID24946 |
Severity: High |
Description: Mozilla Thunderbird 2.x versions earlier than 2.0.0.6 are vulnerable to remote denial of service attacks and remote execution of arbitrary commands. | ||||
Applies to: Mozilla Thunderbird |
Created: 2007-12-04 |
Updated: 2010-08-21 |
ID: CVE-2007-0776 |
Title: SANS07C1: Multiple Vulnerabilities in Mozilla Firefox earlier than 2.0.0.8 |
Type: Web |
Bulletins:
CVE-2007-0776 CVE-2007-0777 CVE-2007-0779 CVE-2007-0981 CVE-2007-1092 CVE-2007-2292 CVE-2007-2867 CVE-2007-3734 CVE-2007-3735 CVE-2007-3737 CVE-2007-3738 CVE-2007-3845 CVE-2007-4841 CVE-2007-5338 CVE-2006-4565 CVE-2006-4571 CVE-2006-5463 CVE-2006-5747 SFBID26132 SFBID20957 SFBID20042 SFBID25543 SFBID22679 SFBID24946 SFBID24242 SFBID22694 SFBID23668 SFBID22566 SFBID21668 |
Severity: High |
Description: Multiple vulnerabilities exist in Mozilla Firefox versions earlier than 2.0.0.8. These include remote execution of arbitrary code, denial of service, and spoofing of GUI elements. | ||||
Applies to: Mozilla Firefox |
Created: 2007-12-04 |
Updated: 2010-08-21 |
ID: CVE-2007-0981 |
Title: SANS07C1: Multiple Vulnerabilities in SeaMonkey earlier than 1.1.5 |
Type: Web |
Bulletins:
CVE-2007-0981 CVE-2007-1092 CVE-2007-5338 CVE-2006-4565 CVE-2006-4571 CVE-2006-5463 CVE-2006-5747 CVE-2006-6502 CVE-2006-6504 CVE-2007-0777 CVE-2007-0779 CVE-2007-1282 CVE-2007-2867 CVE-2007-3845 SFBID22694 SFBID22566 SFBID22679 SFBID24242 SFBID26132 SFBID24242 SFBID21668 SFBID22845 SFBID20957 SFBID20042 |
Severity: High |
Description: Multiple vulnerabilities exist in SeaMonkey versions earlier than 1.1.5. These include remote execution of arbitrary code, denial of service, and spoofing of GUI elements. | ||||
Applies to: SeaMonkey |
Created: 2007-12-04 |
Updated: 2010-08-21 |
ID: REF000578 |
Title: Config yum-updatesd: auto-updating disabled |
Type: Services |
Bulletins: | Severity: Low |
Description: yum-updatesd auto-update is disabled. See /etc/yum/yum-updatesd.conf for details. | ||||
Applies to: |
Created: 2007-12-04 |
Updated: 2010-08-21 |
ID: REF000579 |
Title: Config yum-updatesd: auto-downloading disabled |
Type: Services |
Bulletins: | Severity: Low |
Description: yum-updatesd update auto-downloading is disabled. See /etc/yum/yum-updatesd.conf for details. | ||||
Applies to: |
Created: 2007-12-04 |
Updated: 2010-08-21 |
ID: REF000580 |
Title: Config yum-updatesd: auto-resolving dependencies disabled |
Type: Services |
Bulletins: | Severity: Low |
Description: yum-updatesd auto-resolving of update dependencies is disabled. See /etc/yum/yum-updatesd.conf for details. | ||||
Applies to: |
Created: 2007-12-04 |
Updated: 2010-08-21 |
ID: REF000581 |
Title: Config apt: auto-updating package lists disabled |
Type: Services |
Bulletins: | Severity: Low |
Description: apt auto-updating package lists is disabled. See /etc/apt/apt.conf.d/10periodic and /etc/apt/apt.conf.d/15adept-periodic-update for details. | ||||
Applies to: |
Created: 2007-12-04 |
Updated: 2010-08-21 |
ID: REF000582 |
Title: Config apt: daily job disabled |
Type: Services |
Bulletins: | Severity: Low |
Description: apt daily update job is disabled, /etc/cron.daily/apt is missing. | ||||
Applies to: |
Created: 2007-12-04 |
Updated: 2010-08-21 |
ID: REF000583 |
Title: Config apt: update notification disabled |
Type: Services |
Bulletins: | Severity: Low |
Description: apt-update notification is disabled. | ||||
Applies to: |
Created: 2007-12-04 |
Updated: 2010-08-21 |
ID: REF000577 |
Title: Config yum-updatesd: start on boot disabled |
Type: Services |
Bulletins: | Severity: Low |
Description: yum-updatesd is installed but not activated during init3 or init5 startup. See 'chkconfig --list' output for details. | ||||
Applies to: |
Created: 2007-12-03 |
Updated: 2010-08-21 |
ID: CVE-2007-5020 |
Title: APSB07-18: Adobe Acrobat mailto: vulnerability |
Type: Software |
Bulletins:
CVE-2007-5020 SFBID25748 |
Severity: High |
Description: Critical vulnerabilities have been identified in Adobe Reader and Acrobat that could allow an attacker who successfully exploits these vulnerabilities to take control of the affected system. This issue only affects customers on Windows XP or Windows 2003 with Internet Explorer 7 installed. A malicious file must be loaded in Adobe Reader or Acrobat by the end user for an attacker to exploit these vulnerabilities. It is recommended that affected users update to Adobe Reader 8.1.1 or Acrobat 8.1.1. | ||||
Applies to: |
Created: 2007-10-30 |
Updated: 2010-08-21 |
ID: CVE-2007-5651 |
Title: Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and... |
Type: Hardware |
Bulletins:
CVE-2007-5651 SFBID26139 |
Severity: High |
Description: Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet. | ||||
Applies to: |
Created: 2007-10-23 |
Updated: 2020-08-14 |
ID: CVE-2007-5547 |
Title: Cross-site scripting (XSS) vulnerability in Cisco IOS allows remote attackers to inject arbitrary web script or HTML, and execute IOS commands, via unspecified vectors, aka PSIRT-2022590358. NOTE: as of 20071016, the only disclosure is a vague... |
Type: Hardware |
Bulletins:
CVE-2007-5547 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in Cisco IOS allows remote attackers to inject arbitrary web script or HTML, and execute IOS commands, via unspecified vectors, aka PSIRT-2022590358. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. | ||||
Applies to: |
Created: 2007-10-18 |
Updated: 2020-08-14 |
ID: CVE-2007-5548 |
Title: Multiple stack-based buffer overflows in Command EXEC in Cisco IOS allow local users to gain privileges via unspecified vectors, aka (1) PSIRT-0474975756 and (2) PSIRT-0388256465. NOTE: as of 20071016, the only disclosure is a vague pre-advisory... |
Type: Hardware |
Bulletins:
CVE-2007-5548 |
Severity: Medium |
Description: Multiple stack-based buffer overflows in Command EXEC in Cisco IOS allow local users to gain privileges via unspecified vectors, aka (1) PSIRT-0474975756 and (2) PSIRT-0388256465. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. | ||||
Applies to: |
Created: 2007-10-18 |
Updated: 2020-08-14 |
ID: CVE-2007-5549 |
Title: Unspecified vulnerability in Command EXEC in Cisco IOS allows local users to bypass command restrictions and obtain sensitive information via an unspecified "variation of an IOS command" involving "two different methods", aka CSCsk16129. NOTE: as... |
Type: Hardware |
Bulletins:
CVE-2007-5549 |
Severity: Low |
Description: Unspecified vulnerability in Command EXEC in Cisco IOS allows local users to bypass command restrictions and obtain sensitive information via an unspecified "variation of an IOS command" involving "two different methods", aka CSCsk16129. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. | ||||
Applies to: |
Created: 2007-10-18 |
Updated: 2020-08-14 |
ID: CVE-2007-5550 |
Title: Unspecified vulnerability in Cisco IOS allows remote attackers to obtain the IOS version via unspecified vectors involving a "common network service", aka PSIRT-1255024833. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no... |
Type: Hardware |
Bulletins:
CVE-2007-5550 |
Severity: Medium |
Description: Unspecified vulnerability in Cisco IOS allows remote attackers to obtain the IOS version via unspecified vectors involving a "common network service", aka PSIRT-1255024833. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. | ||||
Applies to: |
Created: 2007-10-18 |
Updated: 2020-08-14 |
ID: CVE-2007-5551 |
Title: Off-by-one error in Cisco IOS allows remote attackers to execute arbitrary code via unspecified vectors that trigger a heap-based buffer overflow. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information.... |
Type: Hardware |
Bulletins:
CVE-2007-5551 |
Severity: High |
Description: Off-by-one error in Cisco IOS allows remote attackers to execute arbitrary code via unspecified vectors that trigger a heap-based buffer overflow. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. | ||||
Applies to: |
Created: 2007-10-18 |
Updated: 2020-08-14 |
ID: CVE-2007-5552 |
Title: Integer overflow in Cisco IOS allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known... |
Type: Hardware |
Bulletins:
CVE-2007-5552 |
Severity: High |
Description: Integer overflow in Cisco IOS allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. | ||||
Applies to: |
Created: 2007-10-18 |
Updated: 2020-08-14 |
ID: CVE-2007-5569 |
Title: Cisco PIX and ASA appliances with 7.1 and 7.2 software, when configured for TLS sessions to the device, allow remote attackers to cause a denial of service (device reload) via a crafted TLS packet, aka CSCsg43276 and CSCsh97120. |
Type: Hardware |
Bulletins:
CVE-2007-5569 SFBID26104 |
Severity: High |
Description: Cisco PIX and ASA appliances with 7.1 and 7.2 software, when configured for TLS sessions to the device, allow remote attackers to cause a denial of service (device reload) via a crafted TLS packet, aka CSCsg43276 and CSCsh97120. | ||||
Applies to: |
Created: 2007-10-18 |
Updated: 2020-08-14 |
ID: CVE-2007-5537 |
Title: Cisco Unified Communications Manager (CUCM, formerly CallManager) 5.1 before 5.1(2), and Unified CallManager 5.0, allow remote attackers to cause a denial of service (kernel panic) via a flood of SIP INVITE messages to UDP port 5060, which triggers... |
Type: Hardware |
Bulletins:
CVE-2007-5537 SFBID26105 |
Severity: High |
Description: Cisco Unified Communications Manager (CUCM, formerly CallManager) 5.1 before 5.1(2), and Unified CallManager 5.0, allow remote attackers to cause a denial of service (kernel panic) via a flood of SIP INVITE messages to UDP port 5060, which triggers resource exhaustion, aka CSCsi75822. | ||||
Applies to: Unified Callmanager Unified Communications Manager |
Created: 2007-10-17 |
Updated: 2020-08-14 |
ID: CVE-2007-5538 |
Title: Buffer overflow in the Centralized TFTP File Locator Service in Cisco Unified Communications Manager (CUCM, formerly CallManager) 5.1 before 5.1(3), and Unified CallManager 5.0, allows remote attackers to execute arbitrary code or cause a denial of... |
Type: Hardware |
Bulletins:
CVE-2007-5538 SFBID26105 |
Severity: High |
Description: Buffer overflow in the Centralized TFTP File Locator Service in Cisco Unified Communications Manager (CUCM, formerly CallManager) 5.1 before 5.1(3), and Unified CallManager 5.0, allows remote attackers to execute arbitrary code or cause a denial of service via unspecified vectors involving the processing of filenames, aka CSCsh47712. | ||||
Applies to: Unified Callmanager Unified Communications Manager |
Created: 2007-10-17 |
Updated: 2020-08-14 |
ID: CVE-2007-5468 |
Title: Cisco CallManager 5.1.1.3000-5 does not verify the Digest authentication header URI against the Request URI in SIP messages, which allows remote attackers to use sniffed Digest authentication credentials to call arbitrary telephone numbers or spoof... |
Type: Hardware |
Bulletins:
CVE-2007-5468 SFBID26057 |
Severity: Medium |
Description: Cisco CallManager 5.1.1.3000-5 does not verify the Digest authentication header URI against the Request URI in SIP messages, which allows remote attackers to use sniffed Digest authentication credentials to call arbitrary telephone numbers or spoof caller ID (aka "toll fraud and authentication forward attack"). | ||||
Applies to: Cisco Call Manager |
Created: 2007-10-15 |
Updated: 2020-08-14 |
ID: CVE-2007-5381 |
Title: Stack-based buffer overflow in the Line Printer Daemon (LPD) in Cisco IOS before 12.2(18)SXF11, 12.4(16a), and 12.4(2)T6 allow remote attackers to execute arbitrary code by setting a long hostname on the target system, then causing an error message... |
Type: Hardware |
Bulletins:
CVE-2007-5381 SFBID26001 |
Severity: High |
Description: Stack-based buffer overflow in the Line Printer Daemon (LPD) in Cisco IOS before 12.2(18)SXF11, 12.4(16a), and 12.4(2)T6 allow remote attackers to execute arbitrary code by setting a long hostname on the target system, then causing an error message to be printed, as demonstrated by a telnet session to the LPD from a source port other than 515. | ||||
Applies to: |
Created: 2007-10-11 |
Updated: 2020-08-14 |
ID: CVE-2007-4632 |
Title: Cisco IOS 12.2E, 12.2F, and 12.2S places a "no login" line into the VTY configuration when an administrator makes certain changes to a (1) VTY/AUX or (2) CONSOLE setting on a device without AAA enabled, which allows remote attackers to bypass... |
Type: Hardware |
Bulletins:
CVE-2007-4632 SFBID25482 |
Severity: Medium |
Description: Cisco IOS 12.2E, 12.2F, and 12.2S places a "no login" line into the VTY configuration when an administrator makes certain changes to a (1) VTY/AUX or (2) CONSOLE setting on a device without AAA enabled, which allows remote attackers to bypass authentication and obtain a terminal session, a different vulnerability than CVE-1999-0293 and CVE-2005-2105. | ||||
Applies to: |
Created: 2007-08-31 |
Updated: 2020-08-14 |
ID: CVE-2007-4633 |
Title: Multiple cross-site scripting (XSS) vulnerabilities in Cisco CallManager and Unified Communications Manager (CUCM) before 3.3(5)sr2b, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allow remote attackers to inject arbitrary web... |
Type: Hardware |
Bulletins:
CVE-2007-4633 SFBID25480 |
Severity: Medium |
Description: Multiple cross-site scripting (XSS) vulnerabilities in Cisco CallManager and Unified Communications Manager (CUCM) before 3.3(5)sr2b, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allow remote attackers to inject arbitrary web script or HTML via the lang variable to the (1) user or (2) admin logon page, aka CSCsi10728. | ||||
Applies to: Cisco Call Manager Unified Communications Manager |
Created: 2007-08-31 |
Updated: 2020-08-14 |
ID: CVE-2007-4634 |
Title: Multiple SQL injection vulnerabilities in Cisco CallManager and Unified Communications Manager (CUCM) before 3.3(5)sr2b, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allow remote attackers to execute arbitrary SQL commands... |
Type: Hardware |
Bulletins:
CVE-2007-4634 SFBID25480 |
Severity: High |
Description: Multiple SQL injection vulnerabilities in Cisco CallManager and Unified Communications Manager (CUCM) before 3.3(5)sr2b, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allow remote attackers to execute arbitrary SQL commands via the lang variable to the (1) user or (2) admin logon page, aka CSCsi64265. | ||||
Applies to: Cisco Call Manager Unified Communications Manager |
Created: 2007-08-31 |
Updated: 2020-08-14 |
ID: CVE-2007-4430 |
Title: Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows context-dependent attackers to cause a denial of service (device restart and BGP routing table rebuild) via certain regular expressions in a "show ip bgp regexp" command. NOTE:... |
Type: Hardware |
Bulletins:
CVE-2007-4430 SFBID25352 |
Severity: Medium |
Description: Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows context-dependent attackers to cause a denial of service (device restart and BGP routing table rebuild) via certain regular expressions in a "show ip bgp regexp" command. NOTE: unauthenticated remote attacks are possible in environments with anonymous telnet and Looking Glass access. | ||||
Applies to: |
Created: 2007-08-20 |
Updated: 2020-08-14 |
ID: CVE-2007-4285 |
Title: Unspecified vulnerability in Cisco IOS and Cisco IOS XR 12.x up to 12.3, including some versions before 12.3(15) and 12.3(14)T, allows remote attackers to obtain sensitive information (partial packet contents) or cause a denial of service (router or... |
Type: Hardware |
Bulletins:
CVE-2007-4285 |
Severity: High |
Description: Unspecified vulnerability in Cisco IOS and Cisco IOS XR 12.x up to 12.3, including some versions before 12.3(15) and 12.3(14)T, allows remote attackers to obtain sensitive information (partial packet contents) or cause a denial of service (router or component crash) via crafted IPv6 packets with a Type 0 routing header. | ||||
Applies to: |
Created: 2007-08-09 |
Updated: 2020-08-14 |
ID: CVE-2007-4286 |
Title: Buffer overflow in the Next Hop Resolution Protocol (NHRP) functionality in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (restart) and execute arbitrary code via a crafted NHRP packet. |
Type: Hardware |
Bulletins:
CVE-2007-4286 SFBID25238 |
Severity: High |
Description: Buffer overflow in the Next Hop Resolution Protocol (NHRP) functionality in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (restart) and execute arbitrary code via a crafted NHRP packet. | ||||
Applies to: |
Created: 2007-08-09 |
Updated: 2020-08-14 |
ID: CVE-2007-4291 |
Title: Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service via (1) a malformed MGCP packet, which causes a device hang, aka CSCsf08998; a malformed H.323 packet, which causes a device crash, as identified by (2) CSCsi60004 with... |
Type: Hardware |
Bulletins:
CVE-2007-4291 SFBID25239 |
Severity: High |
Description: Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service via (1) a malformed MGCP packet, which causes a device hang, aka CSCsf08998; a malformed H.323 packet, which causes a device crash, as identified by (2) CSCsi60004 with Proxy Unregistration and (3) CSCsg70474; and a malformed Real-time Transport Protocol (RTP) packet, which causes a device crash, as identified by (4) CSCse68138, related to VOIP RTP Lib, and (5) CSCse05642, related to I/O memory corruption. | ||||
Applies to: |
Created: 2007-08-09 |
Updated: 2020-08-14 |
ID: CVE-2007-4292 |
Title: Multiple memory leaks in Cisco IOS 12.0 through 12.4 allow remote attackers to cause a denial of service (device crash) via a malformed SIP packet, aka (1) CSCsf11855, (2) CSCeb21064, (3) CSCse40276, (4) CSCse68355, (5) CSCsf30058, (6) CSCsb24007,... |
Type: Hardware |
Bulletins:
CVE-2007-4292 SFBID25239 |
Severity: High |
Description: Multiple memory leaks in Cisco IOS 12.0 through 12.4 allow remote attackers to cause a denial of service (device crash) via a malformed SIP packet, aka (1) CSCsf11855, (2) CSCeb21064, (3) CSCse40276, (4) CSCse68355, (5) CSCsf30058, (6) CSCsb24007, and (7) CSCsc60249. | ||||
Applies to: |
Created: 2007-08-09 |
Updated: 2020-08-14 |
ID: CVE-2007-4293 |
Title: Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device crash) via (1) "abnormal" MGCP messages, aka CSCsd81407; and (2) a large facsimile packet, aka CSCej20505. |
Type: Hardware |
Bulletins:
CVE-2007-4293 SFBID25239 |
Severity: High |
Description: Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device crash) via (1) "abnormal" MGCP messages, aka CSCsd81407; and (2) a large facsimile packet, aka CSCej20505. | ||||
Applies to: |
Created: 2007-08-09 |
Updated: 2020-08-14 |
ID: CVE-2007-4294 |
Title: Unspecified vulnerability in Cisco Unified Communications Manager (CUCM) 5.0, 5.1, and 6.0, and IOS 12.0 through 12.4, allows remote attackers to execute arbitrary code via a malformed SIP packet, aka CSCsi80102. |
Type: Hardware |
Bulletins:
CVE-2007-4294 SFBID25239 |
Severity: Medium |
Description: Unspecified vulnerability in Cisco Unified Communications Manager (CUCM) 5.0, 5.1, and 6.0, and IOS 12.0 through 12.4, allows remote attackers to execute arbitrary code via a malformed SIP packet, aka CSCsi80102. | ||||
Applies to: Unified Communications Manager |
Created: 2007-08-09 |
Updated: 2020-08-14 |
ID: CVE-2007-4295 |
Title: Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows remote attackers to execute arbitrary code via a malformed SIP packet, aka CSCsi80749. |
Type: Hardware |
Bulletins:
CVE-2007-4295 SFBID25239 |
Severity: Medium |
Description: Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows remote attackers to execute arbitrary code via a malformed SIP packet, aka CSCsi80749. | ||||
Applies to: |
Created: 2007-08-09 |
Updated: 2020-08-14 |
ID: CVE-2007-4263 |
Title: Unspecified vulnerability in the server side of the Secure Copy (SCP) implementation in Cisco 12.2-based IOS allows remote authenticated users to read, write or overwrite any file on the device's filesystem via unknown vectors. |
Type: Hardware |
Bulletins:
CVE-2007-4263 SFBID25240 |
Severity: High |
Description: Unspecified vulnerability in the server side of the Secure Copy (SCP) implementation in Cisco 12.2-based IOS allows remote authenticated users to read, write or overwrite any file on the device's filesystem via unknown vectors. | ||||
Applies to: |
Created: 2007-08-08 |
Updated: 2020-08-14 |
ID: CVE-2007-4011 |
Title: Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software before 3.2 20070727, 4.0 before 20070727, and 4.1 before 4.1.180.0 allows remote attackers to cause a denial of service (traffic amplification or... |
Type: Hardware |
Bulletins:
CVE-2007-4011 SFBID25043 |
Severity: High |
Description: Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software before 3.2 20070727, 4.0 before 20070727, and 4.1 before 4.1.180.0 allows remote attackers to cause a denial of service (traffic amplification or ARP storm) via a crafted unicast ARP request that (1) has a destination MAC address unknown to the Layer-2 infrastructure, aka CSCsj69233; or (2) occurs during Layer-3 roaming across IP subnets, aka CSCsj70841. | ||||
Applies to: |
Created: 2007-07-25 |
Updated: 2020-08-14 |
ID: CVE-2007-4012 |
Title: Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software 4.1 before 4.1.180.0 allows remote attackers to cause a denial of service (ARP storm) via a broadcast ARP packet that "targets the IP address of a... |
Type: Hardware |
Bulletins:
CVE-2007-4012 SFBID25043 |
Severity: High |
Description: Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software 4.1 before 4.1.180.0 allows remote attackers to cause a denial of service (ARP storm) via a broadcast ARP packet that "targets the IP address of a known client context", aka CSCsj50374. | ||||
Applies to: |
Created: 2007-07-25 |
Updated: 2020-08-14 |
ID: CVE-2007-3944 |
Title: Multiple heap-based buffer overflows in the Perl Compatible Regular Expressions (PCRE) library in the JavaScript engine in WebKit in Apple Safari 3 Beta before Update 3.0.3, and iPhone before 1.0.1, allow remote attackers to execute... |
Type: Mobile Devices |
Bulletins:
CVE-2007-3944 SFBID25002 |
Severity: High |
Description: Multiple heap-based buffer overflows in the Perl Compatible Regular Expressions (PCRE) library in the JavaScript engine in WebKit in Apple Safari 3 Beta before Update 3.0.3, and iPhone before 1.0.1, allow remote attackers to execute arbitrary code via certain JavaScript regular expressions. NOTE: this issue was originally reported only for MobileSafari on the iPhone. NOTE: it is not clear whether this stems from an issue in the original distribution of PCRE, which might already have a separate CVE identifier. | ||||
Applies to: |
Created: 2007-07-23 |
Updated: 2020-08-14 |
ID: CVE-2006-5277 |
Title: Off-by-one error in the Certificate Trust List (CTL) Provider service (CTLProvider.exe) in Cisco Unified Communications Manager (CUCM, formerly CallManager) before 20070711 allow remote attackers to execute arbitrary code via a crafted packet that... |
Type: Hardware |
Bulletins:
CVE-2006-5277 SFBID24868 |
Severity: High |
Description: Off-by-one error in the Certificate Trust List (CTL) Provider service (CTLProvider.exe) in Cisco Unified Communications Manager (CUCM, formerly CallManager) before 20070711 allow remote attackers to execute arbitrary code via a crafted packet that triggers a heap-based buffer overflow. | ||||
Applies to: Unified Callmanager Unified Communications Manager |
Created: 2007-07-15 |
Updated: 2020-08-14 |
ID: CVE-2006-5278 |
Title: Integer overflow in the Real-Time Information Server (RIS) Data Collector service (RisDC.exe) in Cisco Unified Communications Manager (CUCM, formerly CallManager) before 20070711 allow remote attackers to execute arbitrary code via crafted packets,... |
Type: Hardware |
Bulletins:
CVE-2006-5278 SFBID24868 |
Severity: High |
Description: Integer overflow in the Real-Time Information Server (RIS) Data Collector service (RisDC.exe) in Cisco Unified Communications Manager (CUCM, formerly CallManager) before 20070711 allow remote attackers to execute arbitrary code via crafted packets, resulting in a heap-based buffer overflow. | ||||
Applies to: Unified Callmanager Unified Communications Manager |
Created: 2007-07-15 |
Updated: 2020-08-14 |
ID: CVE-2007-3775 |
Title: Unspecified vulnerability in Cisco Unified Communications Manager (CUCM, formerly CallManager) and Unified Presence Server (CUPS) allows remote attackers to cause a denial of service (loss of cluster services) via unspecified vectors, aka (1)... |
Type: Hardware |
Bulletins:
CVE-2007-3775 SFBID24867 |
Severity: High |
Description: Unspecified vulnerability in Cisco Unified Communications Manager (CUCM, formerly CallManager) and Unified Presence Server (CUPS) allows remote attackers to cause a denial of service (loss of cluster services) via unspecified vectors, aka (1) CSCsj09859 and (2) CSCsj19985. | ||||
Applies to: Unified Communications Manager |
Created: 2007-07-15 |
Updated: 2020-08-14 |
ID: CVE-2007-3776 |
Title: Cisco Unified Communications Manager (CUCM, formerly CallManager) and Unified Presence Server (CUPS) allow remote attackers to obtain sensitive information via unspecified vectors that reveal the SNMP community strings and configuration settings,... |
Type: Hardware |
Bulletins:
CVE-2007-3776 SFBID24867 |
Severity: Medium |
Description: Cisco Unified Communications Manager (CUCM, formerly CallManager) and Unified Presence Server (CUPS) allow remote attackers to obtain sensitive information via unspecified vectors that reveal the SNMP community strings and configuration settings, aka (1) CSCsj20668 and (2) CSCsj25962. | ||||
Applies to: Unified Communications Manager |
Created: 2007-07-15 |
Updated: 2020-08-14 |
ID: MITRE:1670 |
Title: oval:org.mitre.oval:def:1670: CAPICOM.Certificates Vulnerability |
Type: Software |
Bulletins:
MITRE:1670 CVE-2007-0940 |
Severity: High |
Description: Unspecified vulnerability in the Cryptographic API Component Object Model Certificates ActiveX control (CAPICOM.dll) in Microsoft CAPICOM and BizTalk Server 2004 SP1 and SP2 allows remote attackers to execute arbitrary code via unspecified vectors, aka the "CAPICOM.Certificates Vulnerability." | ||||
Applies to: Microsoft Capicom |
Created: 2007-07-10 |
Updated: 2020-08-13 |
ID: CVE-2007-3574 |
Title: Multiple cross-site scripting (XSS) vulnerabilities in setup.cgi on the Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.00.06 firmware allow remote attackers to inject arbitrary web script or HTML via the (1) c4_trap_ip_, (2) devname, (3)... |
Type: Hardware |
Bulletins:
CVE-2007-3574 SFBID24682 |
Severity: Medium |
Description: Multiple cross-site scripting (XSS) vulnerabilities in setup.cgi on the Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.00.06 firmware allow remote attackers to inject arbitrary web script or HTML via the (1) c4_trap_ip_, (2) devname, (3) snmp_getcomm, or (4) snmp_setcomm parameter. | ||||
Applies to: wag54gs |
Created: 2007-07-05 |
Updated: 2020-08-14 |
ID: CVE-2007-3347 |
Title: The D-Link DPH-540/DPH-541 phone accepts SIP INVITE messages that are not from the Call Server's IP address, which allows remote attackers to engage in arbitrary SIP communication with the phone, as demonstrated by communication with forged caller ID. |
Type: Hardware |
Bulletins:
CVE-2007-3347 SFBID24560 |
Severity: High |
Description: The D-Link DPH-540/DPH-541 phone accepts SIP INVITE messages that are not from the Call Server's IP address, which allows remote attackers to engage in arbitrary SIP communication with the phone, as demonstrated by communication with forged caller ID. | ||||
Applies to: DPH-540 DPH-541 |
Created: 2007-06-22 |
Updated: 2020-08-14 |
ID: CVE-2007-3348 |
Title: The D-Link DPH-540/DPH-541 phone allows remote attackers to cause a denial of service (device outage) via a malformed SDP header in a SIP INVITE message. |
Type: Hardware |
Bulletins:
CVE-2007-3348 SFBID24538 |
Severity: High |
Description: The D-Link DPH-540/DPH-541 phone allows remote attackers to cause a denial of service (device outage) via a malformed SDP header in a SIP INVITE message. | ||||
Applies to: DPH-540 DPH-541 |
Created: 2007-06-22 |
Updated: 2020-08-14 |
ID: MITRE:1575 |
Title: oval:org.mitre.oval:def:1575: CMS Cross-Site Scripting and Spoofing Vulnerability |
Type: Software |
Bulletins:
MITRE:1575 CVE-2007-0939 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in Microsoft Content Management Server (MCMS) 2001 SP1 and 2002 SP2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving HTML redirection queries, aka "Cross-site Scripting and Spoofing Vulnerability." | ||||
Applies to: Microsoft Content Management Server 2001 Microsoft Content Management Server 2002 |
Created: 2007-05-23 |
Updated: 2018-09-11 |
ID: MITRE:2001 |
Title: oval:org.mitre.oval:def:2001: CMS Memory Corruption Vulnerability |
Type: Software |
Bulletins:
MITRE:2001 CVE-2007-0938 |
Severity: Low |
Description: Microsoft Content Management Server (MCMS) 2001 SP1 and 2002 SP2 does not properly handle certain characters in a crafted HTTP GET request, which allows remote attackers to execute arbitrary code, aka the "CMS Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Content Management Server 2001 Microsoft Content Management Server 2002 |
Created: 2007-05-23 |
Updated: 2018-09-11 |
ID: CVE-2007-2832 |
Title: Cross-site scripting (XSS) vulnerability in the web application firewall in Cisco CallManager before 3.3(5)sr3, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allows remote attackers to inject arbitrary web script or HTML via... |
Type: Hardware |
Bulletins:
CVE-2007-2832 SFBID24119 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in the web application firewall in Cisco CallManager before 3.3(5)sr3, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allows remote attackers to inject arbitrary web script or HTML via the pattern parameter to CCMAdmin/serverlist.asp (aka the search-form) and possibly other unspecified vectors. | ||||
Applies to: Cisco Call Manager |
Created: 2007-05-23 |
Updated: 2020-08-14 |
ID: CVE-2007-2813 |
Title: Cisco IOS 12.4 and earlier, when using the crypto packages and SSL support is enabled, allows remote attackers to cause a denial of service via a malformed (1) ClientHello, (2) ChangeCipherSpec, or (3) Finished message during an SSL session. |
Type: Hardware |
Bulletins:
CVE-2007-2813 SFBID24097 |
Severity: High |
Description: Cisco IOS 12.4 and earlier, when using the crypto packages and SSL support is enabled, allows remote attackers to cause a denial of service via a malformed (1) ClientHello, (2) ChangeCipherSpec, or (3) Finished message during an SSL session. | ||||
Applies to: |
Created: 2007-05-22 |
Updated: 2020-08-14 |
ID: CVE-2007-2734 |
Title: The 3Com TippingPoint IPS do not properly handle certain full-width and half-width Unicode character encodings in an HTTP POST request, which might allow remote attackers to evade detection of HTTP traffic. |
Type: Hardware |
Bulletins:
CVE-2007-2734 |
Severity: High |
Description: The 3Com TippingPoint IPS do not properly handle certain full-width and half-width Unicode character encodings in an HTTP POST request, which might allow remote attackers to evade detection of HTTP traffic. | ||||
Applies to: TippingPoint 200 TippingPoint 2000E TippingPoint 2400E TippingPoint 50 TippingPoint 5000E TippingPoint 600E |
Created: 2007-05-16 |
Updated: 2020-08-14 |
ID: CVE-2007-2688 |
Title: The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic. |
Type: Hardware |
Bulletins:
CVE-2007-2688 SFBID23980 |
Severity: High |
Description: The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic. | ||||
Applies to: |
Created: 2007-05-15 |
Updated: 2020-08-14 |
ID: REF000467 |
Title: AutoRun is enabled |
Type: Miscellaneous |
Bulletins: | Severity: High |
Description: Microsoft Windows supports automatic execution in CD/DVD drives and other removable media. This poses a security risk in the case where a CD or removable disk containing malware that automatically installs itself once the disc is inserted. It is recommended to disable AutoRun both for CD/DVD drives and also for other removable drives. | ||||
Applies to: |
Created: 2007-05-10 |
Updated: 2010-09-20 |
ID: CVE-2007-2586 |
Title: The FTP Server in Cisco IOS 11.3 through 12.4 does not properly check user authorization, which allows remote attackers to execute arbitrary code, and have other impact including reading startup-config, as demonstrated by a crafted MKD command that... |
Type: Hardware |
Bulletins:
CVE-2007-2586 SFBID23885 |
Severity: High |
Description: The FTP Server in Cisco IOS 11.3 through 12.4 does not properly check user authorization, which allows remote attackers to execute arbitrary code, and have other impact including reading startup-config, as demonstrated by a crafted MKD command that involves access to a VTY device and overflows a buffer, aka bug ID CSCek55259. | ||||
Applies to: |
Created: 2007-05-09 |
Updated: 2020-08-14 |
ID: CVE-2007-2587 |
Title: The IOS FTP Server in Cisco IOS 11.3 through 12.4 allows remote authenticated users to cause a denial of service (IOS reload) via unspecified vectors involving transferring files (aka bug ID CSCse29244). |
Type: Hardware |
Bulletins:
CVE-2007-2587 SFBID23885 |
Severity: Medium |
Description: The IOS FTP Server in Cisco IOS 11.3 through 12.4 allows remote authenticated users to cause a denial of service (IOS reload) via unspecified vectors involving transferring files (aka bug ID CSCse29244). | ||||
Applies to: |
Created: 2007-05-09 |
Updated: 2020-08-14 |
ID: CVE-2007-2502 |
Title: Unspecified vulnerability in HP ProCurve 9300m Series switches with software 08.0.01c through 08.0.01j allows remote attackers to cause a denial of service via unknown vectors, a different switch series than CVE-2006-4015. |
Type: Hardware |
Bulletins:
CVE-2007-2502 SFBID23791 |
Severity: High |
Description: Unspecified vulnerability in HP ProCurve 9300m Series switches with software 08.0.01c through 08.0.01j allows remote attackers to cause a denial of service via unknown vectors, a different switch series than CVE-2006-4015. | ||||
Applies to: Procurve Switch 9300m |
Created: 2007-05-03 |
Updated: 2020-08-14 |
ID: CVE-2007-2461 |
Title: The DHCP relay agent in Cisco Adaptive Security Appliance (ASA) and PIX 7.2 allows remote attackers to cause a denial of service (dropped packets) via a DHCPREQUEST or DHCPINFORM message that causes multiple DHCPACK messages to be sent from DHCP... |
Type: Hardware |
Bulletins:
CVE-2007-2461 SFBID23763 |
Severity: High |
Description: The DHCP relay agent in Cisco Adaptive Security Appliance (ASA) and PIX 7.2 allows remote attackers to cause a denial of service (dropped packets) via a DHCPREQUEST or DHCPINFORM message that causes multiple DHCPACK messages to be sent from DHCP servers to the agent, which consumes the memory allocated for a local buffer. NOTE: this issue only occurs when multiple DHCP servers are used. | ||||
Applies to: |
Created: 2007-05-02 |
Updated: 2020-08-14 |
ID: CVE-2007-2462 |
Title: Unspecified vulnerability in Cisco Adaptive Security Appliance (ASA) and PIX 7.2 before 7.2(2)8, when using Layer 2 Tunneling Protocol (L2TP) or Remote Management Access, allows remote attackers to bypass LDAP authentication and gain privileges via... |
Type: Hardware |
Bulletins:
CVE-2007-2462 SFBID23768 |
Severity: High |
Description: Unspecified vulnerability in Cisco Adaptive Security Appliance (ASA) and PIX 7.2 before 7.2(2)8, when using Layer 2 Tunneling Protocol (L2TP) or Remote Management Access, allows remote attackers to bypass LDAP authentication and gain privileges via unknown vectors. | ||||
Applies to: |
Created: 2007-05-02 |
Updated: 2020-08-14 |
ID: CVE-2007-2463 |
Title: Unspecified vulnerability in Cisco Adaptive Security Appliance (ASA) and PIX 7.1 before 7.1(2)49 and 7.2 before 7.2(2)17 allows remote attackers to cause a denial of service (device reload) via unknown vectors related to VPN connection termination... |
Type: Hardware |
Bulletins:
CVE-2007-2463 SFBID23768 |
Severity: High |
Description: Unspecified vulnerability in Cisco Adaptive Security Appliance (ASA) and PIX 7.1 before 7.1(2)49 and 7.2 before 7.2(2)17 allows remote attackers to cause a denial of service (device reload) via unknown vectors related to VPN connection termination and password expiry. | ||||
Applies to: |
Created: 2007-05-02 |
Updated: 2020-08-14 |
ID: CVE-2007-2464 |
Title: Race condition in Cisco Adaptive Security Appliance (ASA) and PIX 7.1 before 7.1(2)49 and 7.2 before 7.2(2)19, when using "clientless SSL VPNs," allows remote attackers to cause a denial of service (device reload) via "non-standard SSL sessions." |
Type: Hardware |
Bulletins:
CVE-2007-2464 SFBID23768 |
Severity: High |
Description: Race condition in Cisco Adaptive Security Appliance (ASA) and PIX 7.1 before 7.1(2)49 and 7.2 before 7.2(2)19, when using "clientless SSL VPNs," allows remote attackers to cause a denial of service (device reload) via "non-standard SSL sessions." | ||||
Applies to: |
Created: 2007-05-02 |
Updated: 2020-08-14 |
ID: CVE-2007-2332 |
Title: Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 6_05.140 uses a fixed DES key to encrypt passwords, which allows remote authenticated users to obtain a password via a brute force attack on a hash from the LDAP store. |
Type: Hardware |
Bulletins:
CVE-2007-2332 SFBID23562 |
Severity: High |
Description: Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 6_05.140 uses a fixed DES key to encrypt passwords, which allows remote authenticated users to obtain a password via a brute force attack on a hash from the LDAP store. | ||||
Applies to: Contivity 1740 VPN Router Contivity1010 Contivity1050 Contivity1100 Contivity1700 Contivity1750 Contivity2700 Contivity5000 |
Created: 2007-04-27 |
Updated: 2020-08-14 |
ID: CVE-2007-2333 |
Title: Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 5_05.149, 5_05.3xx before 5_05.304, and 6.x before 6_05.140 includes the FIPSecryptedtest1219 and FIPSunecryptedtest1219 default accounts in the LDAP template, which might allow... |
Type: Hardware |
Bulletins:
CVE-2007-2333 SFBID23562 |
Severity: High |
Description: Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 5_05.149, 5_05.3xx before 5_05.304, and 6.x before 6_05.140 includes the FIPSecryptedtest1219 and FIPSunecryptedtest1219 default accounts in the LDAP template, which might allow remote attackers to access the private network. | ||||
Applies to: Contivity1000 Contivity2000 Contivity4000 Contivity5000 |
Created: 2007-04-27 |
Updated: 2020-08-14 |
ID: CVE-2007-2334 |
Title: Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 5_05.149, 5_05.3xx before 5_05.304, and 6.x before 6_05.140 has two template HTML files lacking certain verification tags, which allows remote attackers to access the administration... |
Type: Hardware |
Bulletins:
CVE-2007-2334 SFBID23562 |
Severity: High |
Description: Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 5_05.149, 5_05.3xx before 5_05.304, and 6.x before 6_05.140 has two template HTML files lacking certain verification tags, which allows remote attackers to access the administration interface and change the device configuration via certain requests. | ||||
Applies to: Contivity1000 Contivity2000 Contivity4000 Contivity5000 |
Created: 2007-04-27 |
Updated: 2020-08-14 |
ID: CVE-2007-2036 |
Title: The SNMP implementation in the Cisco Wireless LAN Controller (WLC) before 20070419 uses the default read-only community public, and the default read-write community private, which allows remote attackers to read and modify SNMP variables, aka Bug ID... |
Type: Hardware |
Bulletins:
CVE-2007-2036 SFBID23461 |
Severity: High |
Description: The SNMP implementation in the Cisco Wireless LAN Controller (WLC) before 20070419 uses the default read-only community public, and the default read-write community private, which allows remote attackers to read and modify SNMP variables, aka Bug ID CSCse02384. | ||||
Applies to: |
Created: 2007-04-16 |
Updated: 2020-08-14 |
ID: CVE-2007-2037 |
Title: Cisco Wireless LAN Controller (WLC) before 3.2.116.21, and 4.0.x before 4.0.155.0, allows remote attackers on a local network to cause a denial of service (device crash) via malformed Ethernet traffic. |
Type: Hardware |
Bulletins:
CVE-2007-2037 SFBID23461 |
Severity: Low |
Description: Cisco Wireless LAN Controller (WLC) before 3.2.116.21, and 4.0.x before 4.0.155.0, allows remote attackers on a local network to cause a denial of service (device crash) via malformed Ethernet traffic. | ||||
Applies to: |
Created: 2007-04-16 |
Updated: 2020-08-14 |
ID: CVE-2007-2038 |
Title: The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.193.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1)... |
Type: Hardware |
Bulletins:
CVE-2007-2038 SFBID23461 |
Severity: Medium |
Description: The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.193.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1) crafted SNAP packets, (2) malformed 802.11 traffic, or (3) packets with certain header length values, aka Bug ID CSCsg36361. | ||||
Applies to: Cisco WLC 2000 Cisco WLC 2100 Cisco WLC 4100 Cisco WLC 4400 |
Created: 2007-04-16 |
Updated: 2020-08-14 |
ID: CVE-2007-2039 |
Title: The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.171.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1)... |
Type: Hardware |
Bulletins:
CVE-2007-2039 SFBID23461 |
Severity: Medium |
Description: The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.171.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1) crafted SNAP packets, (2) malformed 802.11 traffic, or (3) packets with certain header length values, aka Bug IDs CSCsg15901 and CSCsh10841. | ||||
Applies to: |
Created: 2007-04-16 |
Updated: 2020-08-14 |
ID: CVE-2007-2040 |
Title: Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points before 3.2.185.0, and 4.0.x before 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192. |
Type: Hardware |
Bulletins:
CVE-2007-2040 SFBID23461 |
Severity: Medium |
Description: Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points before 3.2.185.0, and 4.0.x before 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192. | ||||
Applies to: |
Created: 2007-04-16 |
Updated: 2020-08-14 |
ID: CVE-2007-2041 |
Title: Cisco Wireless LAN Controller (WLC) before 4.0.206.0 saves the WLAN ACL configuration with an invalid checksum, which prevents WLAN ACLs from being loaded at boot time, and might allow remote attackers to bypass intended access restrictions, aka Bug... |
Type: Hardware |
Bulletins:
CVE-2007-2041 SFBID23461 |
Severity: Medium |
Description: Cisco Wireless LAN Controller (WLC) before 4.0.206.0 saves the WLAN ACL configuration with an invalid checksum, which prevents WLAN ACLs from being loaded at boot time, and might allow remote attackers to bypass intended access restrictions, aka Bug ID CSCse58195. | ||||
Applies to: Cisco WLC 2100 Cisco WLC 4400 |
Created: 2007-04-16 |
Updated: 2020-08-14 |
ID: MITRE:1141 |
Title: oval:org.mitre.oval:def:1141: FTP Server Response Parsing Memory Corruption Vulnerability |
Type: Web |
Bulletins:
MITRE:1141 CVE-2007-0217 |
Severity: Low |
Description: The wininet.dll FTP client code in Microsoft Internet Explorer 5.01 and 6 might allow remote attackers to execute arbitrary code via an FTP server response of a specific length that causes a terminating null byte to be written outside of a buffer, which causes heap corruption. | ||||
Applies to: Microsoft Internet Explorer |
Created: 2007-04-10 |
Updated: 2020-08-13 |
ID: MITRE:746 |
Title: oval:org.mitre.oval:def:746: Word Malformed Data Structures Vulnerability |
Type: Software |
Bulletins:
MITRE:746 CVE-2006-6456 |
Severity: High |
Description: Unspecified vulnerability in Microsoft Word 2000, 2002, and 2003 and Word Viewer 2003 allows remote attackers to execute code via unspecified vectors related to malformed data structures that trigger memory corruption, a different vulnerability than CVE-2006-5994. | ||||
Applies to: Microsoft Word |
Created: 2007-04-10 |
Updated: 2018-09-11 |
ID: MITRE:257 |
Title: oval:org.mitre.oval:def:257: COM Object Instantiation Memory Corruption Vulnerability |
Type: Web |
Bulletins:
MITRE:257 CVE-2007-0219 |
Severity: Low |
Description: Microsoft Internet Explorer 5.01, 6, and 7 uses certain COM objects from (1) Msb1fren.dll, (2) Htmlmm.ocx, and (3) Blnmgrps.dll as ActiveX controls, which allows remote attackers to execute arbitrary code via unspecified vectors, a different issue than CVE-2006-4697. | ||||
Applies to: Microsoft Internet Explorer 5 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 |
Created: 2007-04-10 |
Updated: 2020-08-13 |
ID: MITRE:1120 |
Title: oval:org.mitre.oval:def:1120: COM Object Instantiation Memory Corruption Vulnerability |
Type: Web |
Bulletins:
MITRE:1120 CVE-2006-4697 |
Severity: High |
Description: Microsoft Internet Explorer 5.01, 6, and 7 uses certain COM objects from Imjpcksid.dll as ActiveX controls, which allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: this issue might be related to CVE-2006-4193. | ||||
Applies to: Microsoft Internet Explorer |
Created: 2007-04-10 |
Updated: 2020-08-13 |
ID: CVE-2007-1826 |
Title: Unspecified vulnerability in the IPSec Manager Service for Cisco Unified CallManager (CUCM) 5.0 before 5.0(4a)SU1 and Cisco Unified Presence Server (CUPS) 1.0 before 1.0(3) allows remote attackers to cause a denial of service (loss of cluster... |
Type: Hardware |
Bulletins:
CVE-2007-1826 SFBID23181 |
Severity: High |
Description: Unspecified vulnerability in the IPSec Manager Service for Cisco Unified CallManager (CUCM) 5.0 before 5.0(4a)SU1 and Cisco Unified Presence Server (CUPS) 1.0 before 1.0(3) allows remote attackers to cause a denial of service (loss of cluster services) via a "specific UDP packet" to UDP port 8500, aka bug ID CSCsg60949. | ||||
Applies to: Unified Callmanager |
Created: 2007-04-02 |
Updated: 2020-08-14 |
ID: CVE-2007-1833 |
Title: The Skinny Call Control Protocol (SCCP) implementation in Cisco Unified CallManager (CUCM) 3.3 before 3.3(5)SR2a, 4.1 before 4.1(3)SR4, 4.2 before 4.2(3)SR1, and 5.0 before 5.0(4a)SU1 allows remote attackers to cause a denial of service (loss of... |
Type: Hardware |
Bulletins:
CVE-2007-1833 SFBID23181 |
Severity: Medium |
Description: The Skinny Call Control Protocol (SCCP) implementation in Cisco Unified CallManager (CUCM) 3.3 before 3.3(5)SR2a, 4.1 before 4.1(3)SR4, 4.2 before 4.2(3)SR1, and 5.0 before 5.0(4a)SU1 allows remote attackers to cause a denial of service (loss of voice services) by sending crafted packets to the (1) SCCP (2000/tcp) or (2) SCCPS (2443/tcp) port. | ||||
Applies to: Unified Callmanager |
Created: 2007-04-02 |
Updated: 2020-08-14 |
ID: CVE-2007-1834 |
Title: Cisco Unified CallManager (CUCM) 5.0 before 5.0(4a)SU1 and Cisco Unified Presence Server (CUPS) 1.0 before 1.0(3) allow remote attackers to cause a denial of service (loss of voice services) via a flood of ICMP echo requests, aka bug ID CSCsf12698. |
Type: Hardware |
Bulletins:
CVE-2007-1834 SFBID23181 |
Severity: High |
Description: Cisco Unified CallManager (CUCM) 5.0 before 5.0(4a)SU1 and Cisco Unified Presence Server (CUPS) 1.0 before 1.0(3) allow remote attackers to cause a denial of service (loss of voice services) via a flood of ICMP echo requests, aka bug ID CSCsf12698. | ||||
Applies to: Unified Callmanager |
Created: 2007-04-02 |
Updated: 2020-08-14 |
ID: CVE-2007-1585 |
Title: The Linksys WAG200G with firmware 1.01.01, WRT54GC 2 with firmware 1.00.7, and WRT54GC 1 with firmware 1.03.0 and earlier allow remote attackers to obtain sensitive information (passwords and configuration data) via a packet to UDP port 916. NOTE:... |
Type: Hardware |
Bulletins:
CVE-2007-1585 SFBID23063 |
Severity: Medium |
Description: The Linksys WAG200G with firmware 1.01.01, WRT54GC 2 with firmware 1.00.7, and WRT54GC 1 with firmware 1.03.0 and earlier allow remote attackers to obtain sensitive information (passwords and configuration data) via a packet to UDP port 916. NOTE: some of these details are obtained from third party information. | ||||
Applies to: wag200g wrt54gc |
Created: 2007-03-21 |
Updated: 2020-08-14 |
ID: CVE-2007-1467 |
Title: Multiple cross-site scripting (XSS) vulnerabilities in (1) PreSearch.html and (2) PreSearch.class in Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace... |
Type: Hardware |
Bulletins:
CVE-2007-1467 SFBID22982 |
Severity: Low |
Description: Multiple cross-site scripting (XSS) vulnerabilities in (1) PreSearch.html and (2) PreSearch.class in Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace Express, CallManager, IP Communicator, Unified Video Advantage, Unified Videoconferencing 35xx products, Unified Videoconferencing Manager, WAN Manager, Security Device Manager, Network Analysis Module (NAM), CiscoWorks and related products, Wireless LAN Solution Engine (WLSE), 2006 Wireless LAN Controllers (WLC), and Wireless Control System (WCS) allow remote attackers to inject arbitrary web script or HTML via the text field of the search form. | ||||
Applies to: Cisco Call Manager |
Created: 2007-03-16 |
Updated: 2020-08-14 |
ID: CVE-2007-1258 |
Title: Unspecified vulnerability in Cisco IOS 12.2SXA, SXB, SXD, and SXF; and the MSFC2, MSFC2a and MSFC3 running in Hybrid Mode on Cisco Catalyst 6000, 6500 and Cisco 7600 series systems; allows remote attackers on a local network segment to cause a... |
Type: Hardware |
Bulletins:
CVE-2007-1258 |
Severity: Medium |
Description: Unspecified vulnerability in Cisco IOS 12.2SXA, SXB, SXD, and SXF; and the MSFC2, MSFC2a and MSFC3 running in Hybrid Mode on Cisco Catalyst 6000, 6500 and Cisco 7600 series systems; allows remote attackers on a local network segment to cause a denial of service (software reload) via a certain MPLS packet. | ||||
Applies to: Cisco Catalyst 6000 Cisco Catalyst 6500 Series Switches Cisco Catalyst 7600 |
Created: 2007-03-03 |
Updated: 2020-08-14 |
ID: REF000459 |
Title: P2P Software: BitTorrent Installed |
Type: Software |
Bulletins: | Severity: Low |
Description: P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution. | ||||
Applies to: BitTorrent |
Created: 2007-03-02 |
Updated: 2010-08-21 |
ID: REF000460 |
Title: P2P Software: DC++ Installed |
Type: Software |
Bulletins: | Severity: Low |
Description: P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution. | ||||
Applies to: DC++ |
Created: 2007-03-02 |
Updated: 2010-08-21 |
ID: REF000461 |
Title: P2P Software: eDonkey 2000 Installed |
Type: Software |
Bulletins: | Severity: Low |
Description: P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution. | ||||
Applies to: eDonkey 2000 |
Created: 2007-03-02 |
Updated: 2010-08-21 |
ID: REF000462 |
Title: P2P Software: eMule Installed |
Type: Software |
Bulletins: | Severity: Low |
Description: P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution. | ||||
Applies to: |
Created: 2007-03-02 |
Updated: 2010-08-21 |
ID: REF000463 |
Title: P2P Software: IMESH Installed |
Type: Software |
Bulletins: | Severity: Low |
Description: P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution. | ||||
Applies to: IMesh |
Created: 2007-03-02 |
Updated: 2010-08-21 |
ID: REF000464 |
Title: P2P Software: Kazaa Installed |
Type: Software |
Bulletins: | Severity: Low |
Description: P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution. | ||||
Applies to: Kazaa |
Created: 2007-03-02 |
Updated: 2010-08-21 |
ID: REF000465 |
Title: P2P Software: Shareaza Installed |
Type: Software |
Bulletins: | Severity: Low |
Description: P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution. | ||||
Applies to: Shareaza |
Created: 2007-03-02 |
Updated: 2010-08-21 |
ID: REF000466 |
Title: P2P Software: SoulSeek Installed |
Type: Software |
Bulletins: | Severity: Low |
Description: P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution. | ||||
Applies to: SoulSeek |
Created: 2007-03-02 |
Updated: 2010-08-21 |
ID: MITRE:536 |
Title: oval:org.mitre.oval:def:536: Windows Media Format ASF Parsing Vulnerability |
Type: Miscellaneous |
Bulletins:
MITRE:536 CVE-2006-4702 |
Severity: Medium |
Description: Buffer overflow in the Windows Media Format Runtime in Microsoft Windows Media Player (WMP) 6.4 and Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a crafted Advanced Systems Format (ASF) file. | ||||
Applies to: Windows Media Format Runtime 7.1 Windows Media Format Runtime 9.0 Windows Media Format Runtime 9.5 Windows Media Player 6.4 |
Created: 2007-02-20 |
Updated: 2020-08-13 |
ID: MITRE:313 |
Title: oval:org.mitre.oval:def:313: TIF Folder Information Disclosure Vulnerability |
Type: Web |
Bulletins:
MITRE:313 CVE-2006-5577 |
Severity: Medium |
Description: Microsoft Internet Explorer 6 and earlier allows remote attackers to obtain sensitive information via unspecified uses of the OBJECT HTML tag, which discloses the absolute path of the corresponding TIF folder, aka "TIF Folder Information Disclosure Vulnerability," and a different issue than CVE-2006-5578. | ||||
Applies to: Microsoft Internet Explorer |
Created: 2007-02-20 |
Updated: 2020-08-13 |
ID: MITRE:337 |
Title: oval:org.mitre.oval:def:337: TIF Folder Information Disclosure Vulnerability |
Type: Web |
Bulletins:
MITRE:337 CVE-2006-5578 |
Severity: Low |
Description: Microsoft Internet Explorer 6 and earlier allows remote attackers to read Temporary Internet Files (TIF) and obtain sensitive information via unspecified vectors involving certain drag and drop operations, aka "TIF Folder Information Disclosure Vulnerability," and a different issue than CVE-2006-5577. | ||||
Applies to: Microsoft Internet Explorer |
Created: 2007-02-20 |
Updated: 2020-08-13 |
ID: MITRE:669 |
Title: oval:org.mitre.oval:def:669: Windows Media Format ASX Parsing Vulnerability |
Type: Miscellaneous |
Bulletins:
MITRE:669 CVE-2006-6134 |
Severity: High |
Description: Heap-based buffer overflow in the WMCheckURLScheme function in WMVCORE.DLL in Microsoft Windows Media Player (WMP) 10.00.00.4036 on Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a long HREF attribute, using an unrecognized protocol, in a REF element in an ASX PlayList file. | ||||
Applies to: Windows Media Format Runtime 7.1 Windows Media Format Runtime 9.0 Windows Media Format Runtime 9.5 |
Created: 2007-02-20 |
Updated: 2020-08-13 |
ID: MITRE:761 |
Title: oval:org.mitre.oval:def:761: Script Error Handling Memory Corruption Vulnerability |
Type: Web |
Bulletins:
MITRE:761 CVE-2006-5579 |
Severity: High |
Description: Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using JavaScript to cause certain errors simultaneously, which results in the access of previously freed memory, aka "Script Error Handling Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer |
Created: 2007-02-20 |
Updated: 2020-08-13 |
ID: MITRE:116 |
Title: oval:org.mitre.oval:def:116: DHTML Script Function Memory Corruption Vulnerability |
Type: Web |
Bulletins:
MITRE:116 CVE-2006-5581 |
Severity: High |
Description: Unspecified vulnerability in Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code via certain DHTML script functions, such as normalize, and "incorrectly created elements" that trigger memory corruption, aka "DHTML Script Function Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer |
Created: 2007-02-20 |
Updated: 2020-08-13 |
ID: REF000454 |
Title: Config shadow: incorrect file premissions |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: the shadow file has incorrect permissions. Consider setting the permissions to '400' or '-r--------' and owner/group to '0:0'. | ||||
Applies to: |
Created: 2007-02-16 |
Updated: 2010-08-21 |
ID: REF000455 |
Title: Config GRUB: no password configured |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: grub boot manager has no password set. Consider configuring a password to avoid overriding the boot settings. | ||||
Applies to: |
Created: 2007-02-16 |
Updated: 2010-08-21 |
ID: REF000456 |
Title: Config LILO: no password configured |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: lilo boot manager has no password set. Consider configuring a password to avoid overriding the boot settings. | ||||
Applies to: |
Created: 2007-02-16 |
Updated: 2010-08-21 |
ID: REF000457 |
Title: Config INIT: pasword-less single user mode |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: | ||||
Applies to: |
Created: 2007-02-16 |
Updated: 2010-08-21 |
ID: REF000458 |
Title: Config passwd: incorrect file permissions |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: the passwd file has incorrect permissions. Consider setting the permissions to '644' or '-rw-r--r--' and owner/group to '0:0'. | ||||
Applies to: |
Created: 2007-02-16 |
Updated: 2010-08-21 |
ID: REF000431 |
Title: Config GDM: remote root login enabled |
Type: Services |
Bulletins: | Severity: Low |
Description: GDM login manager remote root login enabled. If you don't need this feature, set 'AllowRemoteRoot=false'. | ||||
Applies to: |
Created: 2007-02-15 |
Updated: 2010-08-21 |
ID: REF000448 |
Title: Config GDM: remote autologin enabled |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: GDM login manager remote autologin enabled. If you don't need this feature, set 'AllowRemoteAutoLogin=false'. | ||||
Applies to: |
Created: 2007-02-15 |
Updated: 2010-08-21 |
ID: REF000449 |
Title: Config GDM: remote logins enabled |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: GDM login manager remote logins enabled. If you don't need this feature, set 'Enable=false' in /etc/X11/gdm/gfm.conf. | ||||
Applies to: |
Created: 2007-02-15 |
Updated: 2010-08-21 |
ID: REF000450 |
Title: Config PAM: minimum password lenght less than 6 |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: pluggable authentication modules pam_unix.so or pam_cracklib.so minimum password lenght is less than 6. Consider increasing the minimum password lenght. | ||||
Applies to: |
Created: 2007-02-15 |
Updated: 2010-08-21 |
ID: REF000451 |
Title: Config PAM: password strenght checking not configured |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: pluggable authentication modules pam_cracklib.so password strenght checking not configured. | ||||
Applies to: |
Created: 2007-02-15 |
Updated: 2010-08-21 |
ID: REF000452 |
Title: Config PAM: empty passwords enabled |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: pluggable authentication modules pam_unix.so empty passwords enabled. Consider removing 'nullok' form the pam_unix.so config line in /etc/pam.d/common-password. | ||||
Applies to: |
Created: 2007-02-15 |
Updated: 2010-08-21 |
ID: REF000453 |
Title: Config PAM: difference between paswords less than 6 |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: pluggable authentication modules pam_cracklib.so minimum required difference between passwords is less than 6 characters. Consider increasing this value. | ||||
Applies to: |
Created: 2007-02-15 |
Updated: 2010-08-21 |
ID: REF000402 |
Title: Config VSFTPd: anonymous login enabled |
Type: FTP |
Bulletins: | Severity: Low |
Description: VSFTPd anonymous login enabled. If you don't need this feature, set 'anonymous_enable=NO'. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000403 |
Title: Config VSFTPd: upload enabled |
Type: FTP |
Bulletins: | Severity: Low |
Description: VSFTPd upload enabled. If you don't need this feature, set 'write_enable=NO'. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000404 |
Title: Config VSFTPd: anonymous upload enabled |
Type: FTP |
Bulletins: | Severity: Low |
Description: VSFTPd anonymous upload enabled. If you don't need this feature, set 'anon_upload_enable=NO'. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000427 |
Title: Config SSHd: .rhosts and .shosts enabled |
Type: Services |
Bulletins: | Severity: Low |
Description: use of .rhost and .shost files is enabled. If you don't need this functionality, set 'IgnoreRhosts yes'. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000428 |
Title: Config SSHd: using default port |
Type: Services |
Bulletins: | Severity: Low |
Description: SSH service is running on the default port 22. Consider changing the port to avoid automated attacks. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000429 |
Title: Config SSHd: protocol 1 enabled |
Type: Services |
Bulletins: | Severity: Low |
Description: SSH protocol 1 enabled. If you don't need this functionality, set 'Protocol 2'. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000430 |
Title: Config SSH: protocol 1 enabled |
Type: Services |
Bulletins: | Severity: Low |
Description: SSH protocol 1 enabled. If you don't need this functionality, set 'Protocol 2'. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000437 |
Title: Config shadow: weak encryption detected |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: Some or all of the passwords in /etc/shadow are not encrypted using SHA-256/512 or stronger encryption Algorithms | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2016-07-21 |
ID: REF000438 |
Title: Config KDM: autologin enabled |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: KDM login manager autologin enabled. If you don't need this functionality, set 'AutoLoginEnabled=false'. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000439 |
Title: Config KDM: password-less login enabled |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: KDM login manager password-less login enabled. If you don't need this functionality, set 'NoPassEnabled=false'. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000440 |
Title: Config KDM: empty password login enabled |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: KDM login manager empty password login enabled. If you don't need this functionality, set 'AllowNullPasswd=false'. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000441 |
Title: Config KDM: root login enabled |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: KDM login manager root login enabled. If you don't need this functionality, set 'AllowRootLogin=false'. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000442 |
Title: Config KDM: shutdown by everybody enabled |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: KDM login manager allows shutdown to everybody. If you don't need this functionality, set 'AllowShutdown=None'. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000443 |
Title: Config GDM: autologin enabled |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: GDM login manager autologin enabled. If you don't need this feature, set 'AutomaticLoginEnable=false'. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000444 |
Title: Config GDM: root login enabled |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: GDM login manager root login enabled. If you don't need this feature, set 'AllowRoot=false'. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000445 |
Title: Config GDM: shutdown by everbody enabled |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: GDM login manager allows shutdown to everybody. If you don't need this feature, set 'SystemMenu=false'. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000446 |
Title: Config passwd: multiple root accounts |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: file /etc/passwd contains user with ID:0 other than root. Make sure this is a legal account. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000447 |
Title: Config passwd: no shadow file detected |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: shadow file not found. Consider configuring a shadow file for password storage. | ||||
Applies to: |
Created: 2007-02-14 |
Updated: 2010-08-21 |
ID: REF000382 |
Title: GFI EndPointSecurity agent missing |
Type: Services |
Bulletins: | Severity: High |
Description: The GFI EndPointSecurity agent is not installed on this machine. EndPointSecurity controls entry and exit of data via USB sticks, iPods, PDAs and other devices. For more information, visit http://www.gfi.com/endpointsecurity | ||||
Applies to: GFI EndPointSecurity |
Created: 2007-02-13 |
Updated: 2010-08-21 |
ID: REF000383 |
Title: GFI EndPointSecurity Report |
Type: Services |
Bulletins: | Severity: High |
Description: This check generates a report regarding the status of GFI EndPointSecurity and EndPointSecurity Agent. This report is created on the GFI LANguard Network Security Scanner directory on Data\Reports\ESEC-Network-Report.csv. EndPointSecurity controls entry and exit of data via USB sticks, iPods, PDAs and other devices. For more information, visit http://www.gfi.com/endpointsecurity | ||||
Applies to: GFI EndPointSecurity |
Created: 2007-02-13 |
Updated: 2010-08-21 |
ID: CVE-2007-0917 |
Title: The Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XE to 12.3T allows remote attackers to bypass IPS signatures that use regular expressions via fragmented packets. |
Type: Hardware |
Bulletins:
CVE-2007-0917 SFBID22549 |
Severity: Medium |
Description: The Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XE to 12.3T allows remote attackers to bypass IPS signatures that use regular expressions via fragmented packets. | ||||
Applies to: |
Created: 2007-02-13 |
Updated: 2020-08-14 |
ID: CVE-2007-0918 |
Title: The ATOMIC.TCP signature engine in the Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XA, 12.3YA, 12.3T, and other trains allows remote attackers to cause a denial of service (IPS crash and traffic loss) via unspecified manipulations... |
Type: Hardware |
Bulletins:
CVE-2007-0918 SFBID22549 |
Severity: High |
Description: The ATOMIC.TCP signature engine in the Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XA, 12.3YA, 12.3T, and other trains allows remote attackers to cause a denial of service (IPS crash and traffic loss) via unspecified manipulations that are not properly handled by the regular expression feature, as demonstrated using the 3123.0 (Netbus Pro Traffic) signature. | ||||
Applies to: |
Created: 2007-02-13 |
Updated: 2020-08-14 |
ID: CVE-2006-5084 |
Title: SANS06C4: Skype for Mac 1.5.*.79 and earlier vulnerable to DoS or remote code execution. |
Type: Software |
Bulletins:
CVE-2006-5084 SFBID20218 |
Severity: High |
Description: In some circumstances, a Skype URL can be crafted that, if followed, could cause the execution of arbitrary code on the platform on which Skype is running. It is recommended to update to Skype version 1.5.*.80 or later. | ||||
Applies to: Skype |
Created: 2007-02-12 |
Updated: 2010-08-21 |
ID: CVE-2006-1249 |
Title: SANS06C5: Multiple iTunes and QuickTime for Mac Vulnerabilities |
Type: Software |
Bulletins:
CVE-2006-1249 CVE-2005-4092 CVE-2005-3713 CVE-2006-2238 CVE-2006-1456 CVE-2005-3711 CVE-2005-3710 CVE-2005-3709 CVE-2005-3708 CVE-2005-3707 CVE-2005-2340 CVE-2005-2743 SFBID17074 SFBID15732 SFBID17953 SFBID16202 |
Severity: Medium |
Description: Multiple vulnerabilities exist in QuickTime Player versions before 7.0.4, and in iTunes 6.0.2 and earlier. These include integer overflow, and heap-based buffer overflows. It is recommended to update to the latest versions of these products. | ||||
Applies to: iTunes and QuickTime |
Created: 2007-02-12 |
Updated: 2010-08-21 |
ID: CVE-2006-1450 |
Title: SANS06M1: Multiple vulnerabilities in Mail in Apple Mac OS X 10.3.9 and 10.4.6 |
Type: |
Bulletins:
CVE-2006-1450 CVE-2006-1449 SFBID17951 |
Severity: High |
Description: Multiple vulnerabilities exist in Mail in Apple Mac OS X 10.3.9 and 10.4.6 which can allow execution of arbitrary code. It is recommended to install Security Update 2006-003 or the latest version of Mac OS X. More information about this update can be obtained from http://docs.info.apple.com/article.html?artnum=303737. | ||||
Applies to: |
Created: 2007-02-09 |
Updated: 2010-08-21 |
ID: CVE-2006-0848 |
Title: SANS06M1: Vulnerability in Safari and LaunchServices can lead to remote code exencution. |
Type: Web |
Bulletins:
CVE-2006-0848 |
Severity: Medium |
Description: It is possible to construct a file which appears to be a safe file type, such as an image or movie, but is actually an application. When the "Open `safe' files after downloading" option is enabled in Safari's General preferences, visiting a malicious web site may result in the automatic download and execution of such a file. A proof-of-concept has been detected on public web sites that demonstrates the automatic execution of shell scripts. It is recommended to install Apple Security Update 2006-001 or update to the latest version of Mac OS X. More information about this update can be obtained from http://docs.info.apple.com/article.html?artnum=303382 | ||||
Applies to: LaunchServices |
Created: 2007-02-09 |
Updated: 2010-08-21 |
ID: CVE-2005-3705 |
Title: SANS06M1: Heap-based buffer overflow in WebKit in Mac OS X and OS X Server 10.3.9 and 10.4.3, allows remote attackers to execute arbitrary code. |
Type: Web |
Bulletins:
CVE-2005-3705 SFBID15647 |
Severity: High |
Description: WebKit contains a heap overflow that may lead to the execution of arbitrary code. This may be triggered by content downloaded from malicious web sites in applications that use WebKit such as Safari. It is recommended to install Apple Security Update 2005-009 or update to the latest Mac OS X version. More information regarding this update can be obtained from http://docs.info.apple.com/article.html?artnum=302847 | ||||
Applies to: Safari |
Created: 2007-02-09 |
Updated: 2010-08-21 |
ID: CVE-2006-3505 |
Title: SANS06M1: WebKit in Apple Mac OS X 10.3.9 and 10.4.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code. |
Type: Web |
Bulletins:
CVE-2006-3505 SFBID19289 |
Severity: High |
Description: A maliciously-crafted HTML document could cause a previously deallocated object to be accessed. This may lead to an application crash or arbitrary code execution. It is recommended to install Apple Security Update 2006-004 or update to the latest Mac OS X version. More information regarding this update may be obtained from http://docs.info.apple.com/article.html?artnum=304063 | ||||
Applies to: WebKit |
Created: 2007-02-09 |
Updated: 2010-08-21 |
ID: CVE-2006-3946 |
Title: SANS06M1: WebCore in Apple Mac OS X 10.3.9 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code. |
Type: Web |
Bulletins:
CVE-2006-3946 SFBID19250 |
Severity: High |
Description: A memory management error in WebKit's handling of certain HTML could allow a malicious web site to cause a crash or potentially execute arbitrary code as the user viewing the site. It is recommended to install Apple Security Update 2006-006. More information regarding this update can be obtained from http://docs.info.apple.com/article.html?artnum=304460 | ||||
Applies to: WebCore |
Created: 2007-02-09 |
Updated: 2010-08-21 |
ID: CVE-2006-3946 |
Title: SANS06M1: WebCore in Apple Mac OS X 10.4 through 10.4.7 allows remote attackers to cause a denial of service |
Type: Web |
Bulletins:
CVE-2006-3946 SFBID19250 |
Severity: High |
Description: A memory management error in WebKit's handling of certain HTML could allow a malicious web site to cause a crash or potentially execute arbitrary code as the user viewing the site. It is recommended to update to Mac OS X version 10.4.8 or later. | ||||
Applies to: WebCore |
Created: 2007-02-09 |
Updated: 2010-08-21 |
ID: CVE-2005-2516 |
Title: SANS06M1: Safari in Mac OS X 10.3.9 and 10.4.2 allows remote attackers to execute arbitrary commands. |
Type: Web |
Bulletins:
CVE-2005-2516 |
Severity: High |
Description: Safari in Mac OS X 10.3.9 and 10.4.2, when rendering Rich Text Format (RTF) files, can directly access URLs without performing the normal security checks, which allows remote attackers to execute arbitrary commands. It is recommended to install Apple Security Update 2005-007 or update to the latest Mac OS X release. More information regarding this update can be obtained from http://docs.info.apple.com/article.html?artnum=302163 | ||||
Applies to: Safari |
Created: 2007-02-09 |
Updated: 2010-08-21 |
ID: CVE-2006-0397 |
Title: SANS06M1: Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 10.4 up to 10.4.5 |
Type: Web |
Bulletins:
CVE-2006-0397 CVE-2006-0398 CVE-2006-0399 |
Severity: High |
Description: Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 10.4 up to 10.4.5 allows attackers to trick a user into opening an application that appears to be a safe file type. It is recommended to install Apple Security Update 2006-002 or update to the latest Mac OS X release. More information regarding this update can be obtained from http://docs.info.apple.com/article.html?artnum=303453 | ||||
Applies to: Safari |
Created: 2007-02-09 |
Updated: 2010-08-21 |
ID: CVE-2006-1987 |
Title: SANS06M1: Apple Safari 2.0.3 allows remote attackers to cause a denial of service and possibly execute code via an invalid FRAME tag. |
Type: Web |
Bulletins:
CVE-2006-1987 SFBID17634 |
Severity: High |
Description: Apple Safari 2.0.3 allows remote attackers to cause a denial of service and possibly execute code via an invalid FRAME tag, possibly due to (1) multiple SCROLLING attributes with no values, or (2) a SRC attribute with no value. It is recommended to update Safari by installing Apple Security Update 2006-004 or updating to the latest Mac OS X release. More information regarding this update can be obtained from http://docs.info.apple.com/article.html?artnum=304063 | ||||
Applies to: Safari |
Created: 2007-02-09 |
Updated: 2010-08-21 |
ID: CVE-2006-3498 |
Title: SANS06M1: Buffer overflow in the DHCP component for Apple Mac OS X 10.3.9 and 10.4.7 and earlier |
Type: Services |
Bulletins:
CVE-2006-3498 SFBID19289 |
Severity: Low |
Description: Stack-based buffer overflow in bootpd in the DHCP component for Apple Mac OS X 10.3.9 and 10.4.7 and earlier allows remote attackers to execute arbitrary code via a crafted BOOTP request. It is recommended to install Apple Security Update 2006-004 or update to the latest version of Mac OS X. More information about this update can be obtained from http://docs.info.apple.com/article.html?artnum=304063 | ||||
Applies to: Mac OS X |
Created: 2007-02-09 |
Updated: 2010-08-21 |
ID: CVE-2005-2518 |
Title: SANS06M1: Buffer overflow in servermgrd in Mac OS X Server 10.4.2 and earlier |
Type: Software |
Bulletins:
CVE-2005-2518 |
Severity: High |
Description: A buffer overflow in the handling of authentication can lead to arbitrary code execution by a remote attacker. This vulnerability is present in Mac OS X Server 10.4 to 10.4.2. It is recommended to install Apple Security Update 2005-007 or update to the latest version of Mac OS X. More information about this update can be obtained from http://docs.info.apple.com/article.html?artnum=302163 | ||||
Applies to: servermgrd |
Created: 2007-02-09 |
Updated: 2010-08-21 |
ID: CVE-2006-4394 |
Title: SANS06M1: Vulnerability in LoginWindow in Apple Mac OS X 10.4 through 10.4.7, allows network accounts without GUIDs to bypass service access controls. |
Type: Software |
Bulletins:
CVE-2006-4394 SFBID20271 |
Severity: High |
Description: Service access controls can be used to restrict which users are allowed to log in to a system via loginwindow. A logic error in loginwindow allows network accounts without GUIDs to bypass service access controls. This issue only affects systems that have been configured to use service access controls for loginwindow and to allow network accounts to authenticate users without a GUID. It is recommended to update to Mac OS X version 10.4.8 or later. | ||||
Applies to: LoginWindow |
Created: 2007-02-09 |
Updated: 2010-08-21 |
ID: CVE-2006-1469 |
Title: SANS06M1: Multiple Vulnerabilities in ImageIO |
Type: Software |
Bulletins:
CVE-2006-1469 CVE-2006-1982 CVE-2005-2747 SFBID18731 SFBID17634 SFBID17951 SFBID14914 |
Severity: High |
Description: Multiple vulnerabilities exist in ImageIO in Mac OS X versions 10.4 to 10.4.6. It is recommended to update to version 10.4.7 or later immediately. | ||||
Applies to: Mac OS X |
Created: 2007-02-08 |
Updated: 2010-08-21 |
ID: CVE-2006-0384 |
Title: SANS06M1: automount in Mac OS X 10.4.5 and earlier vulnerable to denial of service or execution of arbitrary code. |
Type: Software |
Bulletins:
CVE-2006-0384 SFBID16907 |
Severity: High |
Description: File servers on the local network may be able to cause Mac OS X systems to mount file systems with reserved names. This could cause the systems to become unresponsive, or possibly allow arbitrary code delivered from the file servers to run on the target system. It is recommended to install Security Update 2006-001 or update to the latest Mac OS X version. | ||||
Applies to: automount |
Created: 2007-02-08 |
Updated: 2010-08-21 |
ID: CVE-2006-3507 |
Title: SANS06M1: Multiple vulnerabilities in AirPort wireless driver |
Type: Software |
Bulletins:
CVE-2006-3507 CVE-2006-3508 CVE-2006-3509 SFBID20144 |
Severity: High |
Description: Multiple vulnerabilities exist in AirPort wireless driver on Apple Mac OS X 10.3.9 and 10.4.7 and earlier. It is recommended to install AirPort Update 2006-001 and Security Update 2006-005 on this machine or update to the latest Mac OS X version. More information about these updates can be obtained from http://docs.info.apple.com/article.html?artnum=304420 | ||||
Applies to: Mac OS X |
Created: 2007-02-07 |
Updated: 2010-08-21 |
ID: REF000408 |
Title: Config SSHd: root login permited |
Type: Services |
Bulletins: | Severity: Low |
Description: root SSH logins are permitted. If you don't need this functionality, set 'PermitRootLogin no'. | ||||
Applies to: |
Created: 2007-02-07 |
Updated: 2010-08-21 |
ID: REF000409 |
Title: Config SSHd: X11 forwarding enabled |
Type: Services |
Bulletins: | Severity: Low |
Description: X11 forwarding over ssh is enabled. If you don't need this functionality, set 'X11Forwarding no'. | ||||
Applies to: |
Created: 2007-02-07 |
Updated: 2010-08-21 |
ID: REF000410 |
Title: Config SSHd: empty passwords permited |
Type: Services |
Bulletins: | Severity: Low |
Description: SSH logins with empty passwords are permitted. If you don't need this functionality, set 'PermitEmptyPasswords no'. | ||||
Applies to: |
Created: 2007-02-07 |
Updated: 2010-08-21 |
ID: REF000411 |
Title: Config SElinux: not in enforcing mode |
Type: Services |
Bulletins: | Severity: Low |
Description: SElinux is disabled or in permissive mode. Consider switching to enforcing mode. | ||||
Applies to: |
Created: 2007-02-07 |
Updated: 2010-08-21 |
ID: REF000412 |
Title: Config SElinux: not in strict mode |
Type: Services |
Bulletins: | Severity: Low |
Description: SElinux is in targeted mode. Consider switching to strict mode. | ||||
Applies to: |
Created: 2007-02-07 |
Updated: 2010-08-21 |
ID: REF000436 |
Title: Config shadow: empty password detected |
Type: Miscellaneous |
Bulletins: | Severity: Low |
Description: password file /etc/shadow contains an empty password | ||||
Applies to: |
Created: 2007-02-07 |
Updated: 2010-08-21 |
ID: REF000407 |
Title: Service running: SSH |
Type: Services |
Bulletins: | Severity: Low |
Description: If this computer is not administered via secure shell, the SSH service is most likely unnecessary. | ||||
Applies to: |
Created: 2007-02-06 |
Updated: 2010-08-21 |
ID: REF000432 |
Title: Config BIND: allow-query not specified |
Type: DNS |
Bulletins: | Severity: Low |
Description: allow-recursion keyword specifies who can do queries on this dns server. The dns service is available to everyone by default. It's recomended to restrict access if this is not an authoritative dns server. | ||||
Applies to: |
Created: 2007-02-05 |
Updated: 2010-08-21 |
ID: REF000433 |
Title: Config BIND: allow-update not specified |
Type: DNS |
Bulletins: | Severity: Low |
Description: allow-update keyword specifies who can do zone updates on this dns server. | ||||
Applies to: |
Created: 2007-02-05 |
Updated: 2010-08-21 |
ID: REF000434 |
Title: Config BIND: allow-transfer not specified |
Type: DNS |
Bulletins: | Severity: Low |
Description: allow-transfer keyword specifies who can do zone transfers from this dns server. | ||||
Applies to: |
Created: 2007-02-05 |
Updated: 2010-08-21 |
ID: REF000435 |
Title: Config BIND: allow-recursion not specified |
Type: DNS |
Bulletins: | Severity: Low |
Description: allow-recursion keyword specifies who can do recursive queries on this dns server. The dns recursive queries are available to everyone by default. It's recomended to restrict access if this is not a public dns server. | ||||
Applies to: |
Created: 2007-02-05 |
Updated: 2010-08-21 |
ID: REF000406 |
Title: Service running: HTTP |
Type: Services |
Bulletins: | Severity: Low |
Description: If this is not an web server, the HTTP service is most likely unnecessary. | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2010-08-21 |
ID: REF000413 |
Title: Service running: Finger |
Type: Services |
Bulletins: | Severity: Low |
Description: If this is not an Finger server, this service is most likely unnecessary. Finger is an obsolete and insecure service, use LDAP directory services instead. | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2010-08-21 |
ID: REF000414 |
Title: Service running: FTP |
Type: Services |
Bulletins: | Severity: Low |
Description: If this is not a FTP server, the FTP service is most likely unnecessary. FTP is very problematic and insecure service, use HTTP, HTTPS or SFTP instead. | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2010-08-21 |
ID: REF000415 |
Title: Service running: Telnet |
Type: Services |
Bulletins: | Severity: Low |
Description: If this is not a Telnet server, this service is most likely unnecessary. Telnet is an obsolete and insecure service, use SSH instead. | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2010-08-21 |
ID: REF000416 |
Title: Service running: SMTP |
Type: Services |
Bulletins: | Severity: Low |
Description: If this is not a SMTP mail server, the SMTP service is most likely unnecessary. | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2010-08-21 |
ID: REF000417 |
Title: Service running: DNS |
Type: Services |
Bulletins: | Severity: Low |
Description: If this is not a internet domain name server, the DNS service is most likely unnecessary. | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2010-08-21 |
ID: REF000418 |
Title: Service running: CUPS |
Type: Services |
Bulletins: | Severity: Low |
Description: If this is not a CUPS print server, the CUPS server service is most likely unnecessary. | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2010-08-21 |
ID: REF000419 |
Title: Service running: HTTPS |
Type: Services |
Bulletins: | Severity: Low |
Description: If this is not a secure web server, the HTTPS service is most likely unnecessary. | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2010-08-21 |
ID: REF000420 |
Title: Service running: POP3 |
Type: Services |
Bulletins: | Severity: Low |
Description: If this is not a POP mail server, the POP3 service is most likely unnecessary. | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2010-08-21 |
ID: REF000421 |
Title: Service running: IMAP4 |
Type: Services |
Bulletins: | Severity: Low |
Description: If this is not an IMAP mail server, the IMAP4 service is most likely unnecessary. | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2010-08-21 |
ID: REF000422 |
Title: Service running: SWAT |
Type: Services |
Bulletins: | Severity: Low |
Description: If this is not a SAMBA file server, this service is most likely unnecessary. | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2010-08-21 |
ID: REF000423 |
Title: Service running: MySQL |
Type: Services |
Bulletins: | Severity: Low |
Description: If this is not a database server, the MySQL service is most likely unnecessary. | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2010-08-21 |
ID: REF000424 |
Title: Service running: PostgeSQL |
Type: Services |
Bulletins: | Severity: Low |
Description: If this is not a database server, the PostgreSQL service is most likely unnecessary. | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2010-08-21 |
ID: REF000425 |
Title: Service running: SAMBA SMB |
Type: Services |
Bulletins: | Severity: Low |
Description: If this is not a SAMBA file server, the SMB service is most likely unnecessary. | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2010-08-21 |
ID: REF000426 |
Title: Service running: SAMBA NMB |
Type: Services |
Bulletins: | Severity: Low |
Description: | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2010-08-21 |
ID: CVE-2007-0648 |
Title: Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP. |
Type: Hardware |
Bulletins:
CVE-2007-0648 SFBID22330 |
Severity: High |
Description: Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP. | ||||
Applies to: |
Created: 2007-01-31 |
Updated: 2020-08-14 |
ID: CVE-2007-0199 |
Title: The Data-link Switching (DLSw) feature in Cisco IOS 11.0 through 12.4 allows remote attackers to cause a denial of service (device reload) via "an invalid value in a DLSw message... during the capabilities exchange." |
Type: Hardware |
Bulletins:
CVE-2007-0199 SFBID21990 |
Severity: Medium |
Description: The Data-link Switching (DLSw) feature in Cisco IOS 11.0 through 12.4 allows remote attackers to cause a denial of service (device reload) via "an invalid value in a DLSw message... during the capabilities exchange." | ||||
Applies to: |
Created: 2007-01-11 |
Updated: 2020-08-14 |