LanGuard reports



Supported OVAL Bulletins


More information on 2010 updates



ID:
CVE-2007-2139
Title:
SANS07S4: Multiple unspecified vulnerabilities in mediasvr and caloggerd in CA BrightStor ARCServe Backup
Type:
Services
Bulletins:
CVE-2007-2139
SFBID23635
Severity:
High
Description:
Multiple stack-based buffer overflows in the SUN RPC service in CA (formerly Computer Associates) BrightStor ARCserve Media Server, as used in BrightStor ARCserve Backup 9.01 through 11.5 SP2, BrightStor Enterprise Backup 10.5, Server Protection Suite 2, and Business Protection Suite 2, allow remote attackers to execute arbitrary code via malformed RPC strings.
Applies to:
CA BrightStor ARCServe Backup
Created:
2007-12-21
Updated:
2010-08-21

ID:
REF000650
Title:
MP installed: Flash browser plug-in is installed
Type:
Software
Bulletins: Severity:
Low
Description:
Flash Media Plugin for internet browsers is installed.
Applies to:
Created:
2007-12-20
Updated:
2010-08-21

ID:
REF000651
Title:
MP installed: MPlayer browser plug-in is installed
Type:
Software
Bulletins: Severity:
Low
Description:
MPlayer Media Plugin for internet browsers is installed.
Applies to:
Created:
2007-12-20
Updated:
2010-08-21

ID:
REF000652
Title:
MP installed: HelixPlayer browser plug-in is installed
Type:
Software
Bulletins: Severity:
Low
Description:
HelixPlayer Media Plugin for internet browsers is installed.
Applies to:
Created:
2007-12-20
Updated:
2010-08-21

ID:
REF000653
Title:
MP installed: VLC browser plug-in is installed
Type:
Software
Bulletins: Severity:
Low
Description:
VLC Media Plugin for internet browsers is installed.
Applies to:
Created:
2007-12-20
Updated:
2010-08-21

ID:
REF000654
Title:
MP installed: GCJ java browser plug-in is installed
Type:
Software
Bulletins: Severity:
Low
Description:
Java Media Plugin for internet browsers is installed.
Applies to:
Created:
2007-12-20
Updated:
2010-08-21

ID:
CVE-2007-1086
Title:
SANS07S7: Multiple vulnerabilities in IBM DB2
Type:
Services
Bulletins:
CVE-2007-1086
CVE-2007-1087
CVE-2007-1088
CVE-2007-1089
CVE-2007-2582
CVE-2007-5652
SFBID22677
SFBID26010
SFBID23890
SFBID26450
Severity:
High
Description:
Multiple vulnerabilities exist in IBM DB2 before version 9.1 FixPack4. These include execution of arbitrary code, creation and modification of arbitrary files, and execution of unauthorized SQL commands.
Applies to:
IBM DB2
Created:
2007-12-17
Updated:
2010-08-21

ID:
CVE-2006-5339
Title:
SANS07S7: Multiple vulnerabilities in Oracle 8.1.7.4
Type:
Services
Bulletins:
CVE-2006-5339
CVE-2006-5340
CVE-2006-5344
CVE-2007-0272
SFBID20588
SFBID22083
Severity:
High
Description:
Multiple vulnerabilities exist in Oracle 8.1.7.4, including buffer overflows, and multiple unspecified vulnerabilities.
Applies to:
Oracle Database 8i
Created:
2007-12-17
Updated:
2010-08-21

ID:
CVE-2006-5332
Title:
SANS07S7: Multiple vulnerabilities in Oracle Database 10g
Type:
Services
Bulletins:
CVE-2006-5332
CVE-2006-5333
CVE-2006-5334
CVE-2006-5335
CVE-2006-5336
CVE-2006-5339
CVE-2006-5340
CVE-2006-5341
CVE-2006-5342
CVE-2006-5343
CVE-2006-5344
CVE-2006-5345
CVE-2007-0272
CVE-2007-1442
CVE-2007-2113
CVE-2007-5506
SFBID20588
SFBID22083
SFBID23532
SFBID22905
Severity:
High
Description:
Multiple vulnerabilities exist in some versions of Oracle Database Server 10g. It is recommended to update to the latest versions or apply the latest patches.
Applies to:
Oracle Database 10g
Created:
2007-12-14
Updated:
2010-08-21

ID:
CVE-2006-5332
Title:
SANS07S7: Multiple vulnerabilities in Oracle Database 9i
Type:
Services
Bulletins:
CVE-2006-5332
CVE-2006-5334
CVE-2006-5336
CVE-2006-5339
CVE-2006-5340
CVE-2006-5341
CVE-2006-5342
CVE-2006-5344
CVE-2006-5345
CVE-2007-0272
CVE-2007-2118
CVE-2007-5506
SFBID20588
SFBID22083
SFBID23532
Severity:
High
Description:
Multiple vulnerabilities exist in some versions of Oracle Database Server 9i. It is recommended to update to the latest versions or apply the latest patches.
Applies to:
Oracle Database 9i
Created:
2007-12-14
Updated:
2010-08-21

ID:
CVE-2007-2418
Title:
SANS07A1: Multiple buffer overflow vulnerabilities in Trillian earlier than 3.1.7.0
Type:
Software
Bulletins:
CVE-2007-2418
CVE-2007-2478
CVE-2007-3832
CVE-2007-3305
SFBID23781
SFBID23730
SFBID24927
SFBID24523
Severity:
High
Description:
Multiple buffer overflow vulnerabilities exist in Cerulean Studios Trillian 3.x before 3.1.7.0, allowing remote attackers to execute arbitrary code.
Applies to:
Cerulean Studios Trillian
Created:
2007-12-14
Updated:
2010-08-21

ID:
CVE-2007-1680
Title:
SANS07A1: Stack-based buffer overflow in Yahoo! Messenger before 20070313
Type:
Software
Bulletins:
CVE-2007-1680
SFBID23291
Severity:
High
Description:
Stack-based buffer overflow in the createAndJoinConference function in the AudioConf ActiveX control (yacscom.dll) in Yahoo! Messenger before March 13, 2007, allows remote attackers to execute arbitrary code via long socksHostname and hostname properties.
Applies to:
Created:
2007-12-14
Updated:
2010-08-21

ID:
CVE-2007-6372
Title:
Unspecified vulnerability in Juniper JUNOS 7.3 through 8.4 allows remote attackers to cause a denial of service (crash) via malformed BGP packets, possibly BGP UPDATE packets that trigger session flapping.
Type:
Hardware
Bulletins:
CVE-2007-6372
SFBID26869
Severity:
High
Description:
Unspecified vulnerability in Juniper JUNOS 7.3 through 8.4 allows remote attackers to cause a denial of service (crash) via malformed BGP packets, possibly BGP UPDATE packets that trigger session flapping.
Applies to:
Created:
2007-12-14
Updated:
2017-07-05

ID:
MITRE:3622
Title:
oval:org.mitre.oval:def:3622: Windows Media Format Remote Code Execution Vulnerability
Type:
Miscellaneous
Bulletins:
MITRE:3622
CVE-2007-0064
Severity:
Low
Description:
Heap-based buffer overflow in Windows Media Format Runtime 7.1, 9, 9.5, 9.5 x64 Edition, 11, and Windows Media Services 9.1 for Microsoft Windows 2000, XP, Server 2003, and Vista allows user-assisted remote attackers to execute arbitrary code via a crafted Advanced Systems Format (ASF) file.
Applies to:
Windows Media Format Runtime 11
Windows Media Format Runtime 7.1
Windows Media Format Runtime 9.0
Windows Media Format Runtime 9.5
Created:
2007-12-13
Updated:
2015-08-10

ID:
CVE-2007-3457
Title:
SANS07C4: Adobe Flash Player 8.0.34.0 and earlier vulnerable to CSRF attack
Type:
Software
Bulletins:
CVE-2007-3457
Severity:
High
Description:
Adobe Flash Player 8.0.34.0 and earlier insufficiently validates HTTP Referer headers, which potentially allows remote attackers to conduct a CSRF attack via a crafted SWF file.
Applies to:
Adobe Flash Player
Created:
2007-12-11
Updated:
2010-08-21

ID:
CVE-2007-0711
Title:
SANS07C4: Multiple vulnerabilities in Apple Quicktime 7.2 and earlier
Type:
Software
Bulletins:
CVE-2007-0711
CVE-2007-0712
CVE-2007-0714
CVE-2007-2295
CVE-2007-2296
CVE-2007-0754
CVE-2007-2389
CVE-2007-2393
CVE-2007-2394
CVE-2007-5045
CVE-2007-4673
SFBID24873
SFBID22827
SFBID22844
SFBID25913
SFBID23652
SFBID23923
SFBID23650
SFBID24222
Severity:
High
Description:
Multiple vulnerabilities exist in Apple Quicktime version 7.2 and earlier. These include possibility of information disclosure and code execution.
Applies to:
Apple QuickTime
Created:
2007-12-11
Updated:
2010-08-21

ID:
CVE-2007-3752
Title:
SANS07C4: Buffer overflow in Apple iTunes before 7.4
Type:
Software
Bulletins:
CVE-2007-3752
Severity:
High
Description:
Buffer overflow in Apple iTunes before 7.4 allows remote attackers to cause a denial of service (application termination) or execute arbitrary code via a music file with crafted album cover art.
Applies to:
Apple iTunes
Created:
2007-12-10
Updated:
2010-08-21

ID:
CVE-2007-2497
Title:
SANS07C4: Multiple Vulnerabilities in RealPlayer 10, 10.5 and 11 Beta
Type:
Software
Bulletins:
CVE-2007-2497
CVE-2007-3410
CVE-2007-5601
SFBID23712
SFBID26130
Severity:
High
Description:
Multiple vulnerabilities exist in RealPlayer versions 10.0, 10.5 and 11 Beta. These include remote execution of arbitrary code, and denial of service.
Applies to:
RealPlayer
Created:
2007-12-10
Updated:
2010-08-21

ID:
REF000642
Title:
P2P installed: mldonkey installed
Type:
Software
Bulletins: Severity:
Low
Description:
mlDonkey P2P file sharing client installed.
Applies to:
Created:
2007-12-10
Updated:
2010-08-21

ID:
CVE-2007-0044
Title:
SANS07C1: Multiple vulnerabilities in Adobe Reader earlier than 8.0.0
Type:
Software
Bulletins:
CVE-2007-0044
CVE-2007-0046
CVE-2007-0103
CVE-2007-0045
SFBID21858
SFBID21910
Severity:
High
Description:
Multiple vulnerabilities exist in Adobe Reader earlier than 8.0.0, some of which have unknown impact. Known vulnerabilities include denial of service and remote execution of arbitrary code.
Applies to:
Adobe Reader
Created:
2007-12-07
Updated:
2010-08-21

ID:
REF000601
Title:
IM installed: skype installed
Type:
Software
Bulletins: Severity:
Low
Description:
Skype instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000602
Title:
IM installed: epic installed
Type:
Software
Bulletins: Severity:
Low
Description:
Epic instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000603
Title:
IM installed: gnu gadu installed
Type:
Software
Bulletins: Severity:
Low
Description:
GNU Gadu instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000604
Title:
IM installed: gossip installed
Type:
Software
Bulletins: Severity:
Low
Description:
Gossip instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000605
Title:
IM installed: jabber installed
Type:
Software
Bulletins: Severity:
Low
Description:
Jabber instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000606
Title:
IM installed: jabbin installed
Type:
Software
Bulletins: Severity:
Low
Description:
Jabin instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000607
Title:
IM installed: kadu installed
Type:
Software
Bulletins: Severity:
Low
Description:
Kadu instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000608
Title:
IM installed: kxicq installed
Type:
Software
Bulletins: Severity:
Low
Description:
KxICQ instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000609
Title:
IM installed: licq installed
Type:
Software
Bulletins: Severity:
Low
Description:
LICQ instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000610
Title:
IM installed: lostirc installed
Type:
Software
Bulletins: Severity:
Low
Description:
LostIRC instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000611
Title:
IM installed: micq installed
Type:
Software
Bulletins: Severity:
Low
Description:
mICQ instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000612
Title:
IM installed: pidgin installed
Type:
Software
Bulletins: Severity:
Low
Description:
Pidgin instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000613
Title:
IM installed: psi installed
Type:
Software
Bulletins: Severity:
Low
Description:
PSI instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000614
Title:
IM installed: sim installed
Type:
Software
Bulletins: Severity:
Low
Description:
Sim instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000615
Title:
IM installed: sircd installed
Type:
Software
Bulletins: Severity:
Low
Description:
sIRCd instant messaging server installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000616
Title:
IM installed: kicq installed
Type:
Software
Bulletins: Severity:
Low
Description:
KICQ instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000619
Title:
IM installed: gaim installed
Type:
Software
Bulletins: Severity:
Low
Description:
Gaim instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000620
Title:
IM installed: kopete installed
Type:
Software
Bulletins: Severity:
Low
Description:
Kopete instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000621
Title:
IM installed: yahoo messenger installed
Type:
Software
Bulletins: Severity:
Low
Description:
Yahoo Messenger instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000622
Title:
IM installed: trebuchet installed
Type:
Software
Bulletins: Severity:
Low
Description:
Trebuchet instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000623
Title:
IM installed: talk installed
Type:
Software
Bulletins: Severity:
Low
Description:
Talk instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000624
Title:
IM installed: ytalk installed
Type:
Software
Bulletins: Severity:
Low
Description:
Ytalk instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000625
Title:
IM installed: gabber installed
Type:
Software
Bulletins: Severity:
Low
Description:
Gabber instant messaging client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000626
Title:
P2P installed: azureus installed
Type:
Software
Bulletins: Severity:
Low
Description:
Azureus P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000627
Title:
P2P installed: bittornado installed
Type:
Software
Bulletins: Severity:
Low
Description:
BitTornado P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000628
Title:
P2P installed: bittorrent installed
Type:
Software
Bulletins: Severity:
Low
Description:
BitTorrent P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000629
Title:
P2P installed: ctorrent installed
Type:
Software
Bulletins: Severity:
Low
Description:
cTorrent P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000630
Title:
P2P installed: deluge installed
Type:
Software
Bulletins: Severity:
Low
Description:
Deluge P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000631
Title:
P2P installed: gnunet installed
Type:
Software
Bulletins: Severity:
Low
Description:
GnuNet P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000632
Title:
P2P installed: ktorrent installed
Type:
Software
Bulletins: Severity:
Low
Description:
Ktorrent P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000633
Title:
P2P installed: kommute installed
Type:
Software
Bulletins: Severity:
Low
Description:
Komute P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000634
Title:
P2P installed: qtella installed
Type:
Software
Bulletins: Severity:
Low
Description:
Qtella P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000635
Title:
P2P installed: rtorrent installed
Type:
Software
Bulletins: Severity:
Low
Description:
rTorrent P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000636
Title:
P2P installed: transmission installed
Type:
Software
Bulletins: Severity:
Low
Description:
Transmission P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000637
Title:
P2P installed: dctc installed
Type:
Software
Bulletins: Severity:
Low
Description:
DCtc P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000638
Title:
P2P installed: xmule installed
Type:
Software
Bulletins: Severity:
Low
Description:
xMule P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000639
Title:
P2P installed: apollon installed
Type:
Software
Bulletins: Severity:
Low
Description:
Apollon P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000640
Title:
P2P installed: mutella installed
Type:
Software
Bulletins: Severity:
Low
Description:
Mutella P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000641
Title:
P2P installed: knapster installed
Type:
Software
Bulletins: Severity:
Low
Description:
Knapster P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000643
Title:
P2P installed: napster installed
Type:
Software
Bulletins: Severity:
Low
Description:
Napster P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000644
Title:
P2P installed: gnut installed
Type:
Software
Bulletins: Severity:
Low
Description:
Gnut P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000645
Title:
P2P installed: lopster instaled
Type:
Software
Bulletins: Severity:
Low
Description:
Lopster P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000646
Title:
P2P installed: nap installed
Type:
Software
Bulletins: Severity:
Low
Description:
Nap P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000647
Title:
P2P installed: gtk-gnutella installed
Type:
Software
Bulletins: Severity:
Low
Description:
GTK-Gnutella P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000648
Title:
P2P installed: amule installed
Type:
Software
Bulletins: Severity:
Low
Description:
aMule P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000649
Title:
P2P installed: bitstormlite installed
Type:
Software
Bulletins: Severity:
Low
Description:
BitStormLite P2P file sharing client installed.
Applies to:
Created:
2007-12-06
Updated:
2010-08-21

ID:
REF000663
Title:
Config laptop: swap partition not encrypted
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
Computer was identified as a laptop. No encryption was detected on the swap partition.
Applies to:
Created:
2007-12-05
Updated:
2010-08-21

ID:
REF000664
Title:
Config laptop: home partition not encrypted
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
Computer was identified as a laptop. No encryption was detected on the home partition.
Applies to:
Created:
2007-12-05
Updated:
2010-08-21

ID:
REF000665
Title:
Config laptop: root partition not encypted
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
Computer was identified as a laptop. No encryption was detected on the root partition.
Applies to:
Created:
2007-12-05
Updated:
2010-08-21

ID:
CVE-2007-0777
Title:
SANS07C3: Multiple Vulnerabilities in Mozilla Thunderbird 1.5.x earlier than 1.5.0.13
Type:
Mail
Bulletins:
CVE-2007-0777
CVE-2007-2867
CVE-2007-3845
CVE-2006-4565
CVE-2006-4571
CVE-2006-5463
CVE-2006-5747
CVE-2006-6502
CVE-2007-1282
SFBID22694
SFBID24242
SFBID21668
SFBID20042
SFBID20957
SFBID22845
Severity:
High
Description:
Mozilla Thunderbird 1.5.x versions earlier than 1.5.0.13 are vulnerable to remote denial of service attacks and remote execution of arbitrary commands.
Applies to:
Mozilla Thunderbird
Created:
2007-12-04
Updated:
2010-08-21

ID:
CVE-2007-2867
Title:
SANS07C3: Multiple Vulnerabilities in Mozilla Thunderbird 2.x earlier than 2.0.0.6
Type:
Mail
Bulletins:
CVE-2007-2867
CVE-2007-3734
CVE-2007-3735
CVE-2007-3845
SFBID24242
SFBID24946
Severity:
High
Description:
Mozilla Thunderbird 2.x versions earlier than 2.0.0.6 are vulnerable to remote denial of service attacks and remote execution of arbitrary commands.
Applies to:
Mozilla Thunderbird
Created:
2007-12-04
Updated:
2010-08-21

ID:
CVE-2007-0776
Title:
SANS07C1: Multiple Vulnerabilities in Mozilla Firefox earlier than 2.0.0.8
Type:
Web
Bulletins:
CVE-2007-0776
CVE-2007-0777
CVE-2007-0779
CVE-2007-0981
CVE-2007-1092
CVE-2007-2292
CVE-2007-2867
CVE-2007-3734
CVE-2007-3735
CVE-2007-3737
CVE-2007-3738
CVE-2007-3845
CVE-2007-4841
CVE-2007-5338
CVE-2006-4565
CVE-2006-4571
CVE-2006-5463
CVE-2006-5747
SFBID26132
SFBID20957
SFBID20042
SFBID25543
SFBID22679
SFBID24946
SFBID24242
SFBID22694
SFBID23668
SFBID22566
SFBID21668
Severity:
High
Description:
Multiple vulnerabilities exist in Mozilla Firefox versions earlier than 2.0.0.8. These include remote execution of arbitrary code, denial of service, and spoofing of GUI elements.
Applies to:
Mozilla Firefox
Created:
2007-12-04
Updated:
2010-08-21

ID:
CVE-2007-0981
Title:
SANS07C1: Multiple Vulnerabilities in SeaMonkey earlier than 1.1.5
Type:
Web
Bulletins:
CVE-2007-0981
CVE-2007-1092
CVE-2007-5338
CVE-2006-4565
CVE-2006-4571
CVE-2006-5463
CVE-2006-5747
CVE-2006-6502
CVE-2006-6504
CVE-2007-0777
CVE-2007-0779
CVE-2007-1282
CVE-2007-2867
CVE-2007-3845
SFBID22694
SFBID22566
SFBID22679
SFBID24242
SFBID26132
SFBID24242
SFBID21668
SFBID22845
SFBID20957
SFBID20042
Severity:
High
Description:
Multiple vulnerabilities exist in SeaMonkey versions earlier than 1.1.5. These include remote execution of arbitrary code, denial of service, and spoofing of GUI elements.
Applies to:
SeaMonkey
Created:
2007-12-04
Updated:
2010-08-21

ID:
REF000578
Title:
Config yum-updatesd: auto-updating disabled
Type:
Services
Bulletins: Severity:
Low
Description:
yum-updatesd auto-update is disabled. See /etc/yum/yum-updatesd.conf for details.
Applies to:
Created:
2007-12-04
Updated:
2010-08-21

ID:
REF000579
Title:
Config yum-updatesd: auto-downloading disabled
Type:
Services
Bulletins: Severity:
Low
Description:
yum-updatesd update auto-downloading is disabled. See /etc/yum/yum-updatesd.conf for details.
Applies to:
Created:
2007-12-04
Updated:
2010-08-21

ID:
REF000580
Title:
Config yum-updatesd: auto-resolving dependencies disabled
Type:
Services
Bulletins: Severity:
Low
Description:
yum-updatesd auto-resolving of update dependencies is disabled. See /etc/yum/yum-updatesd.conf for details.
Applies to:
Created:
2007-12-04
Updated:
2010-08-21

ID:
REF000581
Title:
Config apt: auto-updating package lists disabled
Type:
Services
Bulletins: Severity:
Low
Description:
apt auto-updating package lists is disabled. See /etc/apt/apt.conf.d/10periodic and /etc/apt/apt.conf.d/15adept-periodic-update for details.
Applies to:
Created:
2007-12-04
Updated:
2010-08-21

ID:
REF000582
Title:
Config apt: daily job disabled
Type:
Services
Bulletins: Severity:
Low
Description:
apt daily update job is disabled, /etc/cron.daily/apt is missing.
Applies to:
Created:
2007-12-04
Updated:
2010-08-21

ID:
REF000583
Title:
Config apt: update notification disabled
Type:
Services
Bulletins: Severity:
Low
Description:
apt-update notification is disabled.
Applies to:
Created:
2007-12-04
Updated:
2010-08-21

ID:
REF000577
Title:
Config yum-updatesd: start on boot disabled
Type:
Services
Bulletins: Severity:
Low
Description:
yum-updatesd is installed but not activated during init3 or init5 startup. See 'chkconfig --list' output for details.
Applies to:
Created:
2007-12-03
Updated:
2010-08-21

ID:
CVE-2007-5020
Title:
APSB07-18: Adobe Acrobat mailto: vulnerability
Type:
Software
Bulletins:
CVE-2007-5020
SFBID25748
Severity:
High
Description:
Critical vulnerabilities have been identified in Adobe Reader and Acrobat that could allow an attacker who successfully exploits these vulnerabilities to take control of the affected system. This issue only affects customers on Windows XP or Windows 2003 with Internet Explorer 7 installed. A malicious file must be loaded in Adobe Reader or Acrobat by the end user for an attacker to exploit these vulnerabilities. It is recommended that affected users update to Adobe Reader 8.1.1 or Acrobat 8.1.1.
Applies to:
Created:
2007-10-30
Updated:
2010-08-21

ID:
CVE-2007-5651
Title:
Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and...
Type:
Hardware
Bulletins:
CVE-2007-5651
SFBID26139
Severity:
High
Description:
Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet.
Applies to:
Created:
2007-10-23
Updated:
2017-07-05

ID:
CVE-2007-5547
Title:
Cross-site scripting (XSS) vulnerability in Cisco IOS allows remote attackers to inject arbitrary web script or HTML, and execute IOS commands, via unspecified vectors, aka PSIRT-2022590358. NOTE: as of 20071016, the only disclosure is a vague...
Type:
Hardware
Bulletins:
CVE-2007-5547
Severity:
Medium
Description:
Cross-site scripting (XSS) vulnerability in Cisco IOS allows remote attackers to inject arbitrary web script or HTML, and execute IOS commands, via unspecified vectors, aka PSIRT-2022590358. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
Applies to:
Created:
2007-10-18
Updated:
2017-07-05

ID:
CVE-2007-5548
Title:
Multiple stack-based buffer overflows in Command EXEC in Cisco IOS allow local users to gain privileges via unspecified vectors, aka (1) PSIRT-0474975756 and (2) PSIRT-0388256465. NOTE: as of 20071016, the only disclosure is a vague pre-advisory...
Type:
Hardware
Bulletins:
CVE-2007-5548
Severity:
Medium
Description:
Multiple stack-based buffer overflows in Command EXEC in Cisco IOS allow local users to gain privileges via unspecified vectors, aka (1) PSIRT-0474975756 and (2) PSIRT-0388256465. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
Applies to:
Created:
2007-10-18
Updated:
2017-07-05

ID:
CVE-2007-5549
Title:
Unspecified vulnerability in Command EXEC in Cisco IOS allows local users to bypass command restrictions and obtain sensitive information via an unspecified "variation of an IOS command" involving "two different methods", aka CSCsk16129. NOTE: as...
Type:
Hardware
Bulletins:
CVE-2007-5549
Severity:
Low
Description:
Unspecified vulnerability in Command EXEC in Cisco IOS allows local users to bypass command restrictions and obtain sensitive information via an unspecified "variation of an IOS command" involving "two different methods", aka CSCsk16129. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
Applies to:
Created:
2007-10-18
Updated:
2017-07-05

ID:
CVE-2007-5550
Title:
Unspecified vulnerability in Cisco IOS allows remote attackers to obtain the IOS version via unspecified vectors involving a "common network service", aka PSIRT-1255024833. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no...
Type:
Hardware
Bulletins:
CVE-2007-5550
Severity:
Medium
Description:
Unspecified vulnerability in Cisco IOS allows remote attackers to obtain the IOS version via unspecified vectors involving a "common network service", aka PSIRT-1255024833. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
Applies to:
Created:
2007-10-18
Updated:
2017-07-05

ID:
CVE-2007-5551
Title:
Off-by-one error in Cisco IOS allows remote attackers to execute arbitrary code via unspecified vectors that trigger a heap-based buffer overflow. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information....
Type:
Hardware
Bulletins:
CVE-2007-5551
Severity:
High
Description:
Off-by-one error in Cisco IOS allows remote attackers to execute arbitrary code via unspecified vectors that trigger a heap-based buffer overflow. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
Applies to:
Created:
2007-10-18
Updated:
2017-07-05

ID:
CVE-2007-5552
Title:
Integer overflow in Cisco IOS allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known...
Type:
Hardware
Bulletins:
CVE-2007-5552
Severity:
High
Description:
Integer overflow in Cisco IOS allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
Applies to:
Created:
2007-10-18
Updated:
2017-07-05

ID:
CVE-2007-5568
Title:
Cisco PIX and ASA appliances with 7.0 through 8.0 software, and Cisco Firewall Services Module (FWSM) 3.1(5) and earlier, allow remote attackers to cause a denial of service (device reload) via a crafted MGCP packet, aka CSCsi90468 (appliance) and...
Type:
Hardware
Bulletins:
CVE-2007-5568
SFBID26104
Severity:
High
Description:
Cisco PIX and ASA appliances with 7.0 through 8.0 software, and Cisco Firewall Services Module (FWSM) 3.1(5) and earlier, allow remote attackers to cause a denial of service (device reload) via a crafted MGCP packet, aka CSCsi90468 (appliance) and CSCsi00694 (FWSM).
Applies to:
Created:
2007-10-18
Updated:
2017-07-05

ID:
CVE-2007-5569
Title:
Cisco PIX and ASA appliances with 7.1 and 7.2 software, when configured for TLS sessions to the device, allow remote attackers to cause a denial of service (device reload) via a crafted TLS packet, aka CSCsg43276 and CSCsh97120.
Type:
Hardware
Bulletins:
CVE-2007-5569
SFBID26104
Severity:
High
Description:
Cisco PIX and ASA appliances with 7.1 and 7.2 software, when configured for TLS sessions to the device, allow remote attackers to cause a denial of service (device reload) via a crafted TLS packet, aka CSCsg43276 and CSCsh97120.
Applies to:
Created:
2007-10-18
Updated:
2017-07-05

ID:
CVE-2007-5537
Title:
Cisco Unified Communications Manager (CUCM, formerly CallManager) 5.1 before 5.1(2), and Unified CallManager 5.0, allow remote attackers to cause a denial of service (kernel panic) via a flood of SIP INVITE messages to UDP port 5060, which triggers...
Type:
Hardware
Bulletins:
CVE-2007-5537
SFBID26105
Severity:
High
Description:
Cisco Unified Communications Manager (CUCM, formerly CallManager) 5.1 before 5.1(2), and Unified CallManager 5.0, allow remote attackers to cause a denial of service (kernel panic) via a flood of SIP INVITE messages to UDP port 5060, which triggers resource exhaustion, aka CSCsi75822.
Applies to:
Unified Callmanager
Unified Communications Manager
Created:
2007-10-17
Updated:
2017-07-05

ID:
CVE-2007-5538
Title:
Buffer overflow in the Centralized TFTP File Locator Service in Cisco Unified Communications Manager (CUCM, formerly CallManager) 5.1 before 5.1(3), and Unified CallManager 5.0, allows remote attackers to execute arbitrary code or cause a denial of...
Type:
Hardware
Bulletins:
CVE-2007-5538
SFBID26105
Severity:
High
Description:
Buffer overflow in the Centralized TFTP File Locator Service in Cisco Unified Communications Manager (CUCM, formerly CallManager) 5.1 before 5.1(3), and Unified CallManager 5.0, allows remote attackers to execute arbitrary code or cause a denial of service via unspecified vectors involving the processing of filenames, aka CSCsh47712.
Applies to:
Unified Callmanager
Unified Communications Manager
Created:
2007-10-17
Updated:
2017-07-05

ID:
CVE-2007-5468
Title:
Cisco CallManager 5.1.1.3000-5 does not verify the Digest authentication header URI against the Request URI in SIP messages, which allows remote attackers to use sniffed Digest authentication credentials to call arbitrary telephone numbers or spoof...
Type:
Hardware
Bulletins:
CVE-2007-5468
SFBID26057
Severity:
Medium
Description:
Cisco CallManager 5.1.1.3000-5 does not verify the Digest authentication header URI against the Request URI in SIP messages, which allows remote attackers to use sniffed Digest authentication credentials to call arbitrary telephone numbers or spoof caller ID (aka "toll fraud and authentication forward attack").
Applies to:
Cisco Call Manager
Created:
2007-10-15
Updated:
2017-07-05

ID:
CVE-2007-5381
Title:
Stack-based buffer overflow in the Line Printer Daemon (LPD) in Cisco IOS before 12.2(18)SXF11, 12.4(16a), and 12.4(2)T6 allow remote attackers to execute arbitrary code by setting a long hostname on the target system, then causing an error message...
Type:
Hardware
Bulletins:
CVE-2007-5381
SFBID26001
Severity:
High
Description:
Stack-based buffer overflow in the Line Printer Daemon (LPD) in Cisco IOS before 12.2(18)SXF11, 12.4(16a), and 12.4(2)T6 allow remote attackers to execute arbitrary code by setting a long hostname on the target system, then causing an error message to be printed, as demonstrated by a telnet session to the LPD from a source port other than 515.
Applies to:
Created:
2007-10-11
Updated:
2017-07-05

ID:
CVE-2007-4786
Title:
Cisco Adaptive Security Appliance (ASA) running PIX 7.0 before 7.0.7.1, 7.1 before 7.1.2.61, 7.2 before 7.2.2.34, and 8.0 before 8.0.2.11, when AAA is enabled, composes %ASA-5-111008 messages from the "test aaa" command with cleartext passwords and...
Type:
Hardware
Bulletins:
CVE-2007-4786
SFBID25548
Severity:
Medium
Description:
Cisco Adaptive Security Appliance (ASA) running PIX 7.0 before 7.0.7.1, 7.1 before 7.1.2.61, 7.2 before 7.2.2.34, and 8.0 before 8.0.2.11, when AAA is enabled, composes %ASA-5-111008 messages from the "test aaa" command with cleartext passwords and sends them over the network to a remote syslog server or places them in a local logging buffer, which allows context-dependent attackers to obtain sensitive information.
Applies to:
Created:
2007-09-10
Updated:
2017-07-05

ID:
CVE-2007-4632
Title:
Cisco IOS 12.2E, 12.2F, and 12.2S places a "no login" line into the VTY configuration when an administrator makes certain changes to a (1) VTY/AUX or (2) CONSOLE setting on a device without AAA enabled, which allows remote attackers to bypass...
Type:
Hardware
Bulletins:
CVE-2007-4632
SFBID25482
Severity:
Medium
Description:
Cisco IOS 12.2E, 12.2F, and 12.2S places a "no login" line into the VTY configuration when an administrator makes certain changes to a (1) VTY/AUX or (2) CONSOLE setting on a device without AAA enabled, which allows remote attackers to bypass authentication and obtain a terminal session, a different vulnerability than CVE-1999-0293 and CVE-2005-2105.
Applies to:
Created:
2007-08-31
Updated:
2017-07-05

ID:
CVE-2007-4633
Title:
Multiple cross-site scripting (XSS) vulnerabilities in Cisco CallManager and Unified Communications Manager (CUCM) before 3.3(5)sr2b, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allow remote attackers to inject arbitrary web...
Type:
Hardware
Bulletins:
CVE-2007-4633
SFBID25480
Severity:
Medium
Description:
Multiple cross-site scripting (XSS) vulnerabilities in Cisco CallManager and Unified Communications Manager (CUCM) before 3.3(5)sr2b, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allow remote attackers to inject arbitrary web script or HTML via the lang variable to the (1) user or (2) admin logon page, aka CSCsi10728.
Applies to:
Cisco Call Manager
Unified Communications Manager
Created:
2007-08-31
Updated:
2017-07-05

ID:
CVE-2007-4634
Title:
Cisco CallManager / CUCM Logon Page lang Parameter SQL Injection
Type:
Hardware
Bulletins:
CVE-2007-4634
SFBID25480
Severity:
High
Description:
Multiple SQL injection vulnerabilities in Cisco CallManager and Unified Communications Manager (CUCM) before 3.3(5)sr2b, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allow remote attackers to execute arbitrary SQL commands via the lang variable to the (1) user or (2) admin logon page, aka CSCsi64265.
Applies to:
Cisco Call Manager
Unified Communications Manager
Created:
2007-08-31
Updated:
2017-07-05

ID:
CVE-2007-4430
Title:
Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows context-dependent attackers to cause a denial of service (device restart and BGP routing table rebuild) via certain regular expressions in a "show ip bgp regexp" command. NOTE:...
Type:
Hardware
Bulletins:
CVE-2007-4430
SFBID25352
Severity:
Medium
Description:
Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows context-dependent attackers to cause a denial of service (device restart and BGP routing table rebuild) via certain regular expressions in a "show ip bgp regexp" command. NOTE: unauthenticated remote attacks are possible in environments with anonymous telnet and Looking Glass access.
Applies to:
Created:
2007-08-20
Updated:
2017-07-05

ID:
CVE-2007-4285
Title:
Unspecified vulnerability in Cisco IOS and Cisco IOS XR 12.x up to 12.3, including some versions before 12.3(15) and 12.3(14)T, allows remote attackers to obtain sensitive information (partial packet contents) or cause a denial of service (router or...
Type:
Hardware
Bulletins:
CVE-2007-4285
Severity:
High
Description:
Unspecified vulnerability in Cisco IOS and Cisco IOS XR 12.x up to 12.3, including some versions before 12.3(15) and 12.3(14)T, allows remote attackers to obtain sensitive information (partial packet contents) or cause a denial of service (router or component crash) via crafted IPv6 packets with a Type 0 routing header.
Applies to:
Created:
2007-08-09
Updated:
2017-07-05

ID:
CVE-2007-4286
Title:
Buffer overflow in the Next Hop Resolution Protocol (NHRP) functionality in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (restart) and execute arbitrary code via a crafted NHRP packet.
Type:
Hardware
Bulletins:
CVE-2007-4286
SFBID25238
Severity:
High
Description:
Buffer overflow in the Next Hop Resolution Protocol (NHRP) functionality in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (restart) and execute arbitrary code via a crafted NHRP packet.
Applies to:
Created:
2007-08-09
Updated:
2017-07-05

ID:
CVE-2007-4291
Title:
Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service via (1) a malformed MGCP packet, which causes a device hang, aka CSCsf08998; a malformed H.323 packet, which causes a device crash, as identified by (2) CSCsi60004 with...
Type:
Hardware
Bulletins:
CVE-2007-4291
SFBID25239
Severity:
High
Description:
Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service via (1) a malformed MGCP packet, which causes a device hang, aka CSCsf08998; a malformed H.323 packet, which causes a device crash, as identified by (2) CSCsi60004 with Proxy Unregistration and (3) CSCsg70474; and a malformed Real-time Transport Protocol (RTP) packet, which causes a device crash, as identified by (4) CSCse68138, related to VOIP RTP Lib, and (5) CSCse05642, related to I/O memory corruption.
Applies to:
Created:
2007-08-09
Updated:
2017-07-05

ID:
CVE-2007-4292
Title:
Multiple memory leaks in Cisco IOS 12.0 through 12.4 allow remote attackers to cause a denial of service (device crash) via a malformed SIP packet, aka (1) CSCsf11855, (2) CSCeb21064, (3) CSCse40276, (4) CSCse68355, (5) CSCsf30058, (6) CSCsb24007,...
Type:
Hardware
Bulletins:
CVE-2007-4292
SFBID25239
Severity:
High
Description:
Multiple memory leaks in Cisco IOS 12.0 through 12.4 allow remote attackers to cause a denial of service (device crash) via a malformed SIP packet, aka (1) CSCsf11855, (2) CSCeb21064, (3) CSCse40276, (4) CSCse68355, (5) CSCsf30058, (6) CSCsb24007, and (7) CSCsc60249.
Applies to:
Created:
2007-08-09
Updated:
2017-07-05

ID:
CVE-2007-4293
Title:
Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device crash) via (1) "abnormal" MGCP messages, aka CSCsd81407; and (2) a large facsimile packet, aka CSCej20505.
Type:
Hardware
Bulletins:
CVE-2007-4293
SFBID25239
Severity:
High
Description:
Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device crash) via (1) "abnormal" MGCP messages, aka CSCsd81407; and (2) a large facsimile packet, aka CSCej20505.
Applies to:
Created:
2007-08-09
Updated:
2017-07-05

ID:
CVE-2007-4294
Title:
Unspecified vulnerability in Cisco Unified Communications Manager (CUCM) 5.0, 5.1, and 6.0, and IOS 12.0 through 12.4, allows remote attackers to execute arbitrary code via a malformed SIP packet, aka CSCsi80102.
Type:
Hardware
Bulletins:
CVE-2007-4294
SFBID25239
Severity:
Medium
Description:
Unspecified vulnerability in Cisco Unified Communications Manager (CUCM) 5.0, 5.1, and 6.0, and IOS 12.0 through 12.4, allows remote attackers to execute arbitrary code via a malformed SIP packet, aka CSCsi80102.
Applies to:
Unified Communications Manager
Created:
2007-08-09
Updated:
2017-07-05

ID:
CVE-2007-4295
Title:
Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows remote attackers to execute arbitrary code via a malformed SIP packet, aka CSCsi80749.
Type:
Hardware
Bulletins:
CVE-2007-4295
SFBID25239
Severity:
Medium
Description:
Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows remote attackers to execute arbitrary code via a malformed SIP packet, aka CSCsi80749.
Applies to:
Created:
2007-08-09
Updated:
2017-07-05

ID:
CVE-2007-4263
Title:
Unspecified vulnerability in the server side of the Secure Copy (SCP) implementation in Cisco 12.2-based IOS allows remote authenticated users to read, write or overwrite any file on the device's filesystem via unknown vectors.
Type:
Hardware
Bulletins:
CVE-2007-4263
SFBID25240
Severity:
High
Description:
Unspecified vulnerability in the server side of the Secure Copy (SCP) implementation in Cisco 12.2-based IOS allows remote authenticated users to read, write or overwrite any file on the device's filesystem via unknown vectors.
Applies to:
Created:
2007-08-08
Updated:
2017-07-05

ID:
CVE-2007-4011
Title:
Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software before 3.2 20070727, 4.0 before 20070727, and 4.1 before 4.1.180.0 allows remote attackers to cause a denial of service (traffic amplification or...
Type:
Hardware
Bulletins:
CVE-2007-4011
SFBID25043
Severity:
High
Description:
Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software before 3.2 20070727, 4.0 before 20070727, and 4.1 before 4.1.180.0 allows remote attackers to cause a denial of service (traffic amplification or ARP storm) via a crafted unicast ARP request that (1) has a destination MAC address unknown to the Layer-2 infrastructure, aka CSCsj69233; or (2) occurs during Layer-3 roaming across IP subnets, aka CSCsj70841.
Applies to:
Created:
2007-07-25
Updated:
2017-07-05

ID:
CVE-2007-4012
Title:
Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software 4.1 before 4.1.180.0 allows remote attackers to cause a denial of service (ARP storm) via a broadcast ARP packet that "targets the IP address of a...
Type:
Hardware
Bulletins:
CVE-2007-4012
SFBID25043
Severity:
High
Description:
Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software 4.1 before 4.1.180.0 allows remote attackers to cause a denial of service (ARP storm) via a broadcast ARP packet that "targets the IP address of a known client context", aka CSCsj50374.
Applies to:
Created:
2007-07-25
Updated:
2017-07-05

ID:
CVE-2007-3944
Title:
Multiple heap-based buffer overflows in the Perl Compatible Regular Expressions (PCRE) library in the JavaScript engine in WebKit in Apple Safari 3 Beta before Update 3.0.3, and iPhone before 1.0.1, allow remote attackers to execute...
Type:
Mobile Devices
Bulletins:
CVE-2007-3944
SFBID25002
Severity:
High
Description:
Multiple heap-based buffer overflows in the Perl Compatible Regular Expressions (PCRE) library in the JavaScript engine in WebKit in Apple Safari 3 Beta before Update 3.0.3, and iPhone before 1.0.1, allow remote attackers to execute arbitrary code via certain JavaScript regular expressions. NOTE: this issue was originally reported only for MobileSafari on the iPhone. NOTE: it is not clear whether this stems from an issue in the original distribution of PCRE, which might already have a separate CVE identifier.
Applies to:
Created:
2007-07-23
Updated:
2017-07-05

ID:
CVE-2006-5277
Title:
Off-by-one error in the Certificate Trust List (CTL) Provider service (CTLProvider.exe) in Cisco Unified Communications Manager (CUCM, formerly CallManager) before 20070711 allow remote attackers to execute arbitrary code via a crafted packet that...
Type:
Hardware
Bulletins:
CVE-2006-5277
SFBID24868
Severity:
High
Description:
Off-by-one error in the Certificate Trust List (CTL) Provider service (CTLProvider.exe) in Cisco Unified Communications Manager (CUCM, formerly CallManager) before 20070711 allow remote attackers to execute arbitrary code via a crafted packet that triggers a heap-based buffer overflow.
Applies to:
Unified Callmanager
Unified Communications Manager
Created:
2007-07-15
Updated:
2017-07-05

ID:
CVE-2006-5278
Title:
Integer overflow in the Real-Time Information Server (RIS) Data Collector service (RisDC.exe) in Cisco Unified Communications Manager (CUCM, formerly CallManager) before 20070711 allow remote attackers to execute arbitrary code via crafted packets,...
Type:
Hardware
Bulletins:
CVE-2006-5278
SFBID24868
Severity:
High
Description:
Integer overflow in the Real-Time Information Server (RIS) Data Collector service (RisDC.exe) in Cisco Unified Communications Manager (CUCM, formerly CallManager) before 20070711 allow remote attackers to execute arbitrary code via crafted packets, resulting in a heap-based buffer overflow.
Applies to:
Unified Callmanager
Unified Communications Manager
Created:
2007-07-15
Updated:
2017-07-05

ID:
CVE-2007-3775
Title:
Unspecified vulnerability in Cisco Unified Communications Manager (CUCM, formerly CallManager) and Unified Presence Server (CUPS) allows remote attackers to cause a denial of service (loss of cluster services) via unspecified vectors, aka (1)...
Type:
Hardware
Bulletins:
CVE-2007-3775
SFBID24867
Severity:
High
Description:
Unspecified vulnerability in Cisco Unified Communications Manager (CUCM, formerly CallManager) and Unified Presence Server (CUPS) allows remote attackers to cause a denial of service (loss of cluster services) via unspecified vectors, aka (1) CSCsj09859 and (2) CSCsj19985.
Applies to:
Unified Communications Manager
Created:
2007-07-15
Updated:
2017-07-05

ID:
CVE-2007-3776
Title:
Cisco Unified Communications Manager (CUCM, formerly CallManager) and Unified Presence Server (CUPS) allow remote attackers to obtain sensitive information via unspecified vectors that reveal the SNMP community strings and configuration settings,...
Type:
Hardware
Bulletins:
CVE-2007-3776
SFBID24867
Severity:
Medium
Description:
Cisco Unified Communications Manager (CUCM, formerly CallManager) and Unified Presence Server (CUPS) allow remote attackers to obtain sensitive information via unspecified vectors that reveal the SNMP community strings and configuration settings, aka (1) CSCsj20668 and (2) CSCsj25962.
Applies to:
Unified Communications Manager
Created:
2007-07-15
Updated:
2017-07-05

ID:
CVE-2007-3574
Title:
Multiple cross-site scripting (XSS) vulnerabilities in setup.cgi on the Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.00.06 firmware allow remote attackers to inject arbitrary web script or HTML via the (1) c4_trap_ip_, (2) devname, (3)...
Type:
Hardware
Bulletins:
CVE-2007-3574
SFBID24682
Severity:
Medium
Description:
Multiple cross-site scripting (XSS) vulnerabilities in setup.cgi on the Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.00.06 firmware allow remote attackers to inject arbitrary web script or HTML via the (1) c4_trap_ip_, (2) devname, (3) snmp_getcomm, or (4) snmp_setcomm parameter.
Applies to:
wag54gs
Created:
2007-07-05
Updated:
2017-07-05

ID:
CVE-2007-3347
Title:
The D-Link DPH-540/DPH-541 phone accepts SIP INVITE messages that are not from the Call Server's IP address, which allows remote attackers to engage in arbitrary SIP communication with the phone, as demonstrated by communication with forged caller ID.
Type:
Hardware
Bulletins:
CVE-2007-3347
SFBID24560
Severity:
High
Description:
The D-Link DPH-540/DPH-541 phone accepts SIP INVITE messages that are not from the Call Server's IP address, which allows remote attackers to engage in arbitrary SIP communication with the phone, as demonstrated by communication with forged caller ID.
Applies to:
DPH-540
DPH-541
Created:
2007-06-22
Updated:
2017-07-05

ID:
CVE-2007-3348
Title:
The D-Link DPH-540/DPH-541 phone allows remote attackers to cause a denial of service (device outage) via a malformed SDP header in a SIP INVITE message.
Type:
Hardware
Bulletins:
CVE-2007-3348
SFBID24538
Severity:
High
Description:
The D-Link DPH-540/DPH-541 phone allows remote attackers to cause a denial of service (device outage) via a malformed SDP header in a SIP INVITE message.
Applies to:
DPH-540
DPH-541
Created:
2007-06-22
Updated:
2017-07-05

ID:
CVE-2007-2832
Title:
Cisco CallManager CCMAdmin/serverlist.asp pattern Parameter XSS
Type:
Hardware
Bulletins:
CVE-2007-2832
SFBID24119
Severity:
Medium
Description:
Cross-site scripting (XSS) vulnerability in the web application firewall in Cisco CallManager before 3.3(5)sr3, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allows remote attackers to inject arbitrary web script or HTML via the pattern parameter to CCMAdmin/serverlist.asp (aka the search-form) and possibly other unspecified vectors.
Applies to:
Cisco Call Manager
Created:
2007-05-23
Updated:
2017-07-05

ID:
CVE-2007-2813
Title:
Cisco IOS Malformed SSL Messages DoS
Type:
Hardware
Bulletins:
CVE-2007-2813
SFBID24097
Severity:
High
Description:
Cisco IOS 12.4 and earlier, when using the crypto packages and SSL support is enabled, allows remote attackers to cause a denial of service via a malformed (1) ClientHello, (2) ChangeCipherSpec, or (3) Finished message during an SSL session.
Applies to:
Created:
2007-05-22
Updated:
2017-07-05

ID:
CVE-2007-2734
Title:
The 3Com TippingPoint IPS do not properly handle certain full-width and half-width Unicode character encodings in an HTTP POST request, which might allow remote attackers to evade detection of HTTP traffic.
Type:
Hardware
Bulletins:
CVE-2007-2734
Severity:
High
Description:
The 3Com TippingPoint IPS do not properly handle certain full-width and half-width Unicode character encodings in an HTTP POST request, which might allow remote attackers to evade detection of HTTP traffic.
Applies to:
TippingPoint 200
TippingPoint 2000E
TippingPoint 2400E
TippingPoint 50
TippingPoint 5000E
TippingPoint 600E
Created:
2007-05-16
Updated:
2017-07-05

ID:
CVE-2007-2688
Title:
Cisco Multiple Products HTTP Unicode Encoding Detection Bypass
Type:
Hardware
Bulletins:
CVE-2007-2688
SFBID23980
Severity:
High
Description:
The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic.
Applies to:
Created:
2007-05-15
Updated:
2017-07-05

ID:
REF000467
Title:
AutoRun is enabled
Type:
Miscellaneous
Bulletins: Severity:
High
Description:
Microsoft Windows supports automatic execution in CD/DVD drives and other removable media. This poses a security risk in the case where a CD or removable disk containing malware that automatically installs itself once the disc is inserted. It is recommended to disable AutoRun both for CD/DVD drives and also for other removable drives.
Applies to:
Created:
2007-05-10
Updated:
2010-09-20

ID:
CVE-2007-2586
Title:
Cisco IOS FTP Server User Credential Handling Remote Overflow
Type:
Hardware
Bulletins:
CVE-2007-2586
SFBID23885
Severity:
High
Description:
The FTP Server in Cisco IOS 11.3 through 12.4 does not properly check user authorization, which allows remote attackers to execute arbitrary code, and have other impact including reading startup-config, as demonstrated by a crafted MKD command that involves access to a VTY device and overflows a buffer, aka bug ID CSCek55259.
Applies to:
Created:
2007-05-09
Updated:
2017-07-05

ID:
CVE-2007-2587
Title:
Cisco IOS FTP Server Unspecified File Transfer DoS
Type:
Hardware
Bulletins:
CVE-2007-2587
SFBID23885
Severity:
Medium
Description:
The IOS FTP Server in Cisco IOS 11.3 through 12.4 allows remote authenticated users to cause a denial of service (IOS reload) via unspecified vectors involving transferring files (aka bug ID CSCse29244).
Applies to:
Created:
2007-05-09
Updated:
2017-07-05

ID:
MITRE:1670
Title:
oval:org.mitre.oval:def:1670: CAPICOM.Certificates Vulnerability
Type:
Software
Bulletins:
MITRE:1670
CVE-2007-0940
Severity:
Low
Description:
Unspecified vulnerability in the Cryptographic API Component Object Model Certificates ActiveX control (CAPICOM.dll) in Microsoft CAPICOM and BizTalk Server 2004 SP1 and SP2 allows remote attackers to execute arbitrary code via unspecified vectors, aka the "CAPICOM.Certificates Vulnerability."
Applies to:
Microsoft Capicom
Created:
2007-05-08
Updated:
2015-08-10

ID:
CVE-2007-2502
Title:
Unspecified vulnerability in HP ProCurve 9300m Series switches with software 08.0.01c through 08.0.01j allows remote attackers to cause a denial of service via unknown vectors, a different switch series than CVE-2006-4015.
Type:
Hardware
Bulletins:
CVE-2007-2502
SFBID23791
Severity:
High
Description:
Unspecified vulnerability in HP ProCurve 9300m Series switches with software 08.0.01c through 08.0.01j allows remote attackers to cause a denial of service via unknown vectors, a different switch series than CVE-2006-4015.
Applies to:
Procurve Switch 9300m
Created:
2007-05-03
Updated:
2017-07-05

ID:
CVE-2007-2461
Title:
Cisco PIX / ASA DHCP Relay Agent Crafted Message Remote DoS
Type:
Hardware
Bulletins:
CVE-2007-2461
SFBID23763
Severity:
High
Description:
The DHCP relay agent in Cisco Adaptive Security Appliance (ASA) and PIX 7.2 allows remote attackers to cause a denial of service (dropped packets) via a DHCPREQUEST or DHCPINFORM message that causes multiple DHCPACK messages to be sent from DHCP servers to the agent, which consumes the memory allocated for a local buffer. NOTE: this issue only occurs when multiple DHCP servers are used.
Applies to:
Created:
2007-05-02
Updated:
2017-07-05

ID:
CVE-2007-2462
Title:
Cisco PIX / ASA Unspecified LDAP Authentication Bypass
Type:
Hardware
Bulletins:
CVE-2007-2462
SFBID23768
Severity:
High
Description:
Unspecified vulnerability in Cisco Adaptive Security Appliance (ASA) and PIX 7.2 before 7.2(2)8, when using Layer 2 Tunneling Protocol (L2TP) or Remote Management Access, allows remote attackers to bypass LDAP authentication and gain privileges via unknown vectors.
Applies to:
Created:
2007-05-02
Updated:
2017-07-05

ID:
CVE-2007-2463
Title:
Cisco PIX / ASA Unspecified VPN Connection DoS
Type:
Hardware
Bulletins:
CVE-2007-2463
SFBID23768
Severity:
High
Description:
Unspecified vulnerability in Cisco Adaptive Security Appliance (ASA) and PIX 7.1 before 7.1(2)49 and 7.2 before 7.2(2)17 allows remote attackers to cause a denial of service (device reload) via unknown vectors related to VPN connection termination and password expiry.
Applies to:
Created:
2007-05-02
Updated:
2017-07-05

ID:
CVE-2007-2464
Title:
Cisco PIX / ASA Crafted Clientless SSL Connection Race Condition DoS
Type:
Hardware
Bulletins:
CVE-2007-2464
SFBID23768
Severity:
High
Description:
Race condition in Cisco Adaptive Security Appliance (ASA) and PIX 7.1 before 7.1(2)49 and 7.2 before 7.2(2)19, when using "clientless SSL VPNs," allows remote attackers to cause a denial of service (device reload) via "non-standard SSL sessions."
Applies to:
Created:
2007-05-02
Updated:
2017-07-05

ID:
CVE-2007-2332
Title:
Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 6_05.140 uses a fixed DES key to encrypt passwords, which allows remote authenticated users to obtain a password via a brute force attack on a hash from the LDAP store.
Type:
Hardware
Bulletins:
CVE-2007-2332
SFBID23562
Severity:
High
Description:
Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 6_05.140 uses a fixed DES key to encrypt passwords, which allows remote authenticated users to obtain a password via a brute force attack on a hash from the LDAP store.
Applies to:
Contivity 1740 VPN Router
Contivity1010
Contivity1050
Contivity1100
Contivity1700
Contivity1750
Contivity2700
Contivity5000
Created:
2007-04-27
Updated:
2017-07-05

ID:
CVE-2007-2333
Title:
Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 5_05.149, 5_05.3xx before 5_05.304, and 6.x before 6_05.140 includes the FIPSecryptedtest1219 and FIPSunecryptedtest1219 default accounts in the LDAP template, which might allow...
Type:
Hardware
Bulletins:
CVE-2007-2333
SFBID23562
Severity:
High
Description:
Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 5_05.149, 5_05.3xx before 5_05.304, and 6.x before 6_05.140 includes the FIPSecryptedtest1219 and FIPSunecryptedtest1219 default accounts in the LDAP template, which might allow remote attackers to access the private network.
Applies to:
Contivity1000
Contivity2000
Contivity4000
Contivity5000
Created:
2007-04-27
Updated:
2017-07-05

ID:
CVE-2007-2334
Title:
Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 5_05.149, 5_05.3xx before 5_05.304, and 6.x before 6_05.140 has two template HTML files lacking certain verification tags, which allows remote attackers to access the administration...
Type:
Hardware
Bulletins:
CVE-2007-2334
SFBID23562
Severity:
High
Description:
Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 5_05.149, 5_05.3xx before 5_05.304, and 6.x before 6_05.140 has two template HTML files lacking certain verification tags, which allows remote attackers to access the administration interface and change the device configuration via certain requests.
Applies to:
Contivity1000
Contivity2000
Contivity4000
Contivity5000
Created:
2007-04-27
Updated:
2017-07-05

ID:
CVE-2007-2036
Title:
The SNMP implementation in the Cisco Wireless LAN Controller (WLC) before 20070419 uses the default read-only community public, and the default read-write community private, which allows remote attackers to read and modify SNMP variables, aka Bug ID...
Type:
Hardware
Bulletins:
CVE-2007-2036
SFBID23461
Severity:
High
Description:
The SNMP implementation in the Cisco Wireless LAN Controller (WLC) before 20070419 uses the default read-only community public, and the default read-write community private, which allows remote attackers to read and modify SNMP variables, aka Bug ID CSCse02384.
Applies to:
Created:
2007-04-16
Updated:
2017-07-05

ID:
CVE-2007-2037
Title:
Cisco Wireless LAN Controller (WLC) before 3.2.116.21, and 4.0.x before 4.0.155.0, allows remote attackers on a local network to cause a denial of service (device crash) via malformed Ethernet traffic.
Type:
Hardware
Bulletins:
CVE-2007-2037
SFBID23461
Severity:
Low
Description:
Cisco Wireless LAN Controller (WLC) before 3.2.116.21, and 4.0.x before 4.0.155.0, allows remote attackers on a local network to cause a denial of service (device crash) via malformed Ethernet traffic.
Applies to:
Created:
2007-04-16
Updated:
2017-07-05

ID:
CVE-2007-2038
Title:
The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.193.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1)...
Type:
Hardware
Bulletins:
CVE-2007-2038
SFBID23461
Severity:
Medium
Description:
The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.193.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1) crafted SNAP packets, (2) malformed 802.11 traffic, or (3) packets with certain header length values, aka Bug ID CSCsg36361.
Applies to:
Cisco WLC 2000
Cisco WLC 2100
Cisco WLC 4100
Cisco WLC 4400
Created:
2007-04-16
Updated:
2017-07-05

ID:
CVE-2007-2039
Title:
The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.171.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1)...
Type:
Hardware
Bulletins:
CVE-2007-2039
SFBID23461
Severity:
Medium
Description:
The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.171.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1) crafted SNAP packets, (2) malformed 802.11 traffic, or (3) packets with certain header length values, aka Bug IDs CSCsg15901 and CSCsh10841.
Applies to:
Created:
2007-04-16
Updated:
2017-07-05

ID:
CVE-2007-2040
Title:
Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points before 3.2.185.0, and 4.0.x before 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192.
Type:
Hardware
Bulletins:
CVE-2007-2040
SFBID23461
Severity:
Medium
Description:
Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points before 3.2.185.0, and 4.0.x before 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192.
Applies to:
Created:
2007-04-16
Updated:
2017-07-05

ID:
CVE-2007-2041
Title:
Cisco Wireless LAN Controller (WLC) before 4.0.206.0 saves the WLAN ACL configuration with an invalid checksum, which prevents WLAN ACLs from being loaded at boot time, and might allow remote attackers to bypass intended access restrictions, aka Bug...
Type:
Hardware
Bulletins:
CVE-2007-2041
SFBID23461
Severity:
Medium
Description:
Cisco Wireless LAN Controller (WLC) before 4.0.206.0 saves the WLAN ACL configuration with an invalid checksum, which prevents WLAN ACLs from being loaded at boot time, and might allow remote attackers to bypass intended access restrictions, aka Bug ID CSCse58195.
Applies to:
Cisco WLC 2100
Cisco WLC 4400
Created:
2007-04-16
Updated:
2017-07-05

ID:
MITRE:2001
Title:
oval:org.mitre.oval:def:2001: CMS Memory Corruption Vulnerability
Type:
Software
Bulletins:
MITRE:2001
CVE-2007-0938
Severity:
Low
Description:
Microsoft Content Management Server (MCMS) 2001 SP1 and 2002 SP2 does not properly handle certain characters in a crafted HTTP GET request, which allows remote attackers to execute arbitrary code, aka the "CMS Memory Corruption Vulnerability."
Applies to:
Microsoft Content Management Server 2001
Microsoft Content Management Server 2002
Created:
2007-04-11
Updated:
2015-08-10

ID:
MITRE:1575
Title:
oval:org.mitre.oval:def:1575: CMS Cross-Site Scripting and Spoofing Vulnerability
Type:
Software
Bulletins:
MITRE:1575
CVE-2007-0939
Severity:
Low
Description:
Cross-site scripting (XSS) vulnerability in Microsoft Content Management Server (MCMS) 2001 SP1 and 2002 SP2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving HTML redirection queries, aka "Cross-site Scripting and Spoofing Vulnerability."
Applies to:
Microsoft Content Management Server 2001
Microsoft Content Management Server 2002
Created:
2007-04-11
Updated:
2015-08-10

ID:
CVE-2007-1826
Title:
Unspecified vulnerability in the IPSec Manager Service for Cisco Unified CallManager (CUCM) 5.0 before 5.0(4a)SU1 and Cisco Unified Presence Server (CUPS) 1.0 before 1.0(3) allows remote attackers to cause a denial of service (loss of cluster...
Type:
Hardware
Bulletins:
CVE-2007-1826
SFBID23181
Severity:
High
Description:
Unspecified vulnerability in the IPSec Manager Service for Cisco Unified CallManager (CUCM) 5.0 before 5.0(4a)SU1 and Cisco Unified Presence Server (CUPS) 1.0 before 1.0(3) allows remote attackers to cause a denial of service (loss of cluster services) via a "specific UDP packet" to UDP port 8500, aka bug ID CSCsg60949.
Applies to:
Unified Callmanager
Created:
2007-04-02
Updated:
2017-07-05

ID:
CVE-2007-1833
Title:
The Skinny Call Control Protocol (SCCP) implementation in Cisco Unified CallManager (CUCM) 3.3 before 3.3(5)SR2a, 4.1 before 4.1(3)SR4, 4.2 before 4.2(3)SR1, and 5.0 before 5.0(4a)SU1 allows remote attackers to cause a denial of service (loss of...
Type:
Hardware
Bulletins:
CVE-2007-1833
SFBID23181
Severity:
Medium
Description:
The Skinny Call Control Protocol (SCCP) implementation in Cisco Unified CallManager (CUCM) 3.3 before 3.3(5)SR2a, 4.1 before 4.1(3)SR4, 4.2 before 4.2(3)SR1, and 5.0 before 5.0(4a)SU1 allows remote attackers to cause a denial of service (loss of voice services) by sending crafted packets to the (1) SCCP (2000/tcp) or (2) SCCPS (2443/tcp) port.
Applies to:
Unified Callmanager
Created:
2007-04-02
Updated:
2017-07-05

ID:
CVE-2007-1834
Title:
Cisco Unified CallManager (CUCM) 5.0 before 5.0(4a)SU1 and Cisco Unified Presence Server (CUPS) 1.0 before 1.0(3) allow remote attackers to cause a denial of service (loss of voice services) via a flood of ICMP echo requests, aka bug ID CSCsf12698.
Type:
Hardware
Bulletins:
CVE-2007-1834
SFBID23181
Severity:
High
Description:
Cisco Unified CallManager (CUCM) 5.0 before 5.0(4a)SU1 and Cisco Unified Presence Server (CUPS) 1.0 before 1.0(3) allow remote attackers to cause a denial of service (loss of voice services) via a flood of ICMP echo requests, aka bug ID CSCsf12698.
Applies to:
Unified Callmanager
Created:
2007-04-02
Updated:
2017-07-05

ID:
CVE-2007-1585
Title:
The Linksys WAG200G with firmware 1.01.01, WRT54GC 2 with firmware 1.00.7, and WRT54GC 1 with firmware 1.03.0 and earlier allow remote attackers to obtain sensitive information (passwords and configuration data) via a packet to UDP port 916. NOTE:...
Type:
Hardware
Bulletins:
CVE-2007-1585
SFBID23063
Severity:
Medium
Description:
The Linksys WAG200G with firmware 1.01.01, WRT54GC 2 with firmware 1.00.7, and WRT54GC 1 with firmware 1.03.0 and earlier allow remote attackers to obtain sensitive information (passwords and configuration data) via a packet to UDP port 916. NOTE: some of these details are obtained from third party information.
Applies to:
wag200g
wrt54gc
Created:
2007-03-21
Updated:
2017-07-05

ID:
CVE-2007-1467
Title:
Multiple cross-site scripting (XSS) vulnerabilities in (1) PreSearch.html and (2) PreSearch.class in Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace...
Type:
Hardware
Bulletins:
CVE-2007-1467
SFBID22982
Severity:
Low
Description:
Multiple cross-site scripting (XSS) vulnerabilities in (1) PreSearch.html and (2) PreSearch.class in Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace Express, CallManager, IP Communicator, Unified Video Advantage, Unified Videoconferencing 35xx products, Unified Videoconferencing Manager, WAN Manager, Security Device Manager, Network Analysis Module (NAM), CiscoWorks and related products, Wireless LAN Solution Engine (WLSE), 2006 Wireless LAN Controllers (WLC), and Wireless Control System (WCS) allow remote attackers to inject arbitrary web script or HTML via the text field of the search form.
Applies to:
Cisco Call Manager
Created:
2007-03-16
Updated:
2017-07-05

ID:
CVE-2007-1258
Title:
Unspecified vulnerability in Cisco IOS 12.2SXA, SXB, SXD, and SXF; and the MSFC2, MSFC2a and MSFC3 running in Hybrid Mode on Cisco Catalyst 6000, 6500 and Cisco 7600 series systems; allows remote attackers on a local network segment to cause a...
Type:
Hardware
Bulletins:
CVE-2007-1258
Severity:
Medium
Description:
Unspecified vulnerability in Cisco IOS 12.2SXA, SXB, SXD, and SXF; and the MSFC2, MSFC2a and MSFC3 running in Hybrid Mode on Cisco Catalyst 6000, 6500 and Cisco 7600 series systems; allows remote attackers on a local network segment to cause a denial of service (software reload) via a certain MPLS packet.
Applies to:
Cisco Catalyst 6000
Cisco Catalyst 6500 Series Switches
Cisco Catalyst 7600
Created:
2007-03-03
Updated:
2017-07-05

ID:
REF000459
Title:
P2P Software: BitTorrent Installed
Type:
Software
Bulletins: Severity:
Low
Description:
P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution.
Applies to:
BitTorrent
Created:
2007-03-02
Updated:
2010-08-21

ID:
REF000460
Title:
P2P Software: DC++ Installed
Type:
Software
Bulletins: Severity:
Low
Description:
P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution.
Applies to:
DC++
Created:
2007-03-02
Updated:
2010-08-21

ID:
REF000461
Title:
P2P Software: eDonkey 2000 Installed
Type:
Software
Bulletins: Severity:
Low
Description:
P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution.
Applies to:
eDonkey 2000
Created:
2007-03-02
Updated:
2010-08-21

ID:
REF000462
Title:
P2P Software: eMule Installed
Type:
Software
Bulletins: Severity:
Low
Description:
P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution.
Applies to:
Created:
2007-03-02
Updated:
2010-08-21

ID:
REF000463
Title:
P2P Software: IMESH Installed
Type:
Software
Bulletins: Severity:
Low
Description:
P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution.
Applies to:
IMesh
Created:
2007-03-02
Updated:
2010-08-21

ID:
REF000464
Title:
P2P Software: Kazaa Installed
Type:
Software
Bulletins: Severity:
Low
Description:
P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution.
Applies to:
Kazaa
Created:
2007-03-02
Updated:
2010-08-21

ID:
REF000465
Title:
P2P Software: Shareaza Installed
Type:
Software
Bulletins: Severity:
Low
Description:
P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution.
Applies to:
Shareaza
Created:
2007-03-02
Updated:
2010-08-21

ID:
REF000466
Title:
P2P Software: SoulSeek Installed
Type:
Software
Bulletins: Severity:
Low
Description:
P2P Clients can pose a number of security risks. Even when used legitimately to download only authorized material, P2P clients might still constitute a security issue. P2P networks are huge networks interconnecting all clients together. P2P networks are made up from millions of users sharing and downloading files from each other. While most modern P2P networks use a hash system to ensure file authenticity most searches are performed using string searching and thus a download file might not be what the user thinks it to be, it might be a virus or a Trojan which would threaten network integrity. It might also be a copyright work disguised poorly as something benign thus potentially exposing the company to potential legal issues. P2P Clients also share content off the hard disk with all millions of users on the network. While care might be taken to make sure no confidential data is shared, vulnerability in the P2P client could potentially expose the entire system. Further more a disgruntled employee might use p2p to smuggle confidential data out of the company, or abuse the legitimate use and download copyrighted material. Solution: If P2P technology is needed by the company it might be wise considering running you own network of servers so that better control can be maintained on who has access to the network or what files are circulating. If an alternative can be used it might be advisable to find a more secure way of file distribution.
Applies to:
SoulSeek
Created:
2007-03-02
Updated:
2010-08-21

ID:
REF000454
Title:
Config shadow: incorrect file premissions
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
the shadow file has incorrect permissions. Consider setting the permissions to '400' or '-r--------' and owner/group to '0:0'.
Applies to:
Created:
2007-02-16
Updated:
2010-08-21

ID:
REF000455
Title:
Config GRUB: no password configured
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
grub boot manager has no password set. Consider configuring a password to avoid overriding the boot settings.
Applies to:
Created:
2007-02-16
Updated:
2010-08-21

ID:
REF000456
Title:
Config LILO: no password configured
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
lilo boot manager has no password set. Consider configuring a password to avoid overriding the boot settings.
Applies to:
Created:
2007-02-16
Updated:
2010-08-21

ID:
REF000457
Title:
Config INIT: pasword-less single user mode
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
Applies to:
Created:
2007-02-16
Updated:
2010-08-21

ID:
REF000458
Title:
Config passwd: incorrect file permissions
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
the passwd file has incorrect permissions. Consider setting the permissions to '644' or '-rw-r--r--' and owner/group to '0:0'.
Applies to:
Created:
2007-02-16
Updated:
2010-08-21

ID:
REF000431
Title:
Config GDM: remote root login enabled
Type:
Services
Bulletins: Severity:
Low
Description:
GDM login manager remote root login enabled. If you don't need this feature, set 'AllowRemoteRoot=false'.
Applies to:
Created:
2007-02-15
Updated:
2010-08-21

ID:
REF000448
Title:
Config GDM: remote autologin enabled
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
GDM login manager remote autologin enabled. If you don't need this feature, set 'AllowRemoteAutoLogin=false'.
Applies to:
Created:
2007-02-15
Updated:
2010-08-21

ID:
REF000449
Title:
Config GDM: remote logins enabled
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
GDM login manager remote logins enabled. If you don't need this feature, set 'Enable=false' in /etc/X11/gdm/gfm.conf.
Applies to:
Created:
2007-02-15
Updated:
2010-08-21

ID:
REF000450
Title:
Config PAM: minimum password lenght less than 6
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
pluggable authentication modules pam_unix.so or pam_cracklib.so minimum password lenght is less than 6. Consider increasing the minimum password lenght.
Applies to:
Created:
2007-02-15
Updated:
2010-08-21

ID:
REF000451
Title:
Config PAM: password strenght checking not configured
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
pluggable authentication modules pam_cracklib.so password strenght checking not configured.
Applies to:
Created:
2007-02-15
Updated:
2010-08-21

ID:
REF000452
Title:
Config PAM: empty passwords enabled
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
pluggable authentication modules pam_unix.so empty passwords enabled. Consider removing 'nullok' form the pam_unix.so config line in /etc/pam.d/common-password.
Applies to:
Created:
2007-02-15
Updated:
2010-08-21

ID:
REF000453
Title:
Config PAM: difference between paswords less than 6
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
pluggable authentication modules pam_cracklib.so minimum required difference between passwords is less than 6 characters. Consider increasing this value.
Applies to:
Created:
2007-02-15
Updated:
2010-08-21

ID:
CVE-2007-0959
Title:
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets.
Type:
Hardware
Bulletins:
CVE-2007-0959
SFBID22561
Severity:
High
Description:
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets.
Applies to:
Created:
2007-02-15
Updated:
2017-07-05

ID:
CVE-2007-0960
Title:
Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors.
Type:
Hardware
Bulletins:
CVE-2007-0960
SFBID22561
Severity:
High
Description:
Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors.
Applies to:
Created:
2007-02-15
Updated:
2017-07-05

ID:
CVE-2007-0961
Title:
Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the "inspect sip" option is enabled, allows remote attackers to cause a denial of...
Type:
Hardware
Bulletins:
CVE-2007-0961
SFBID22561
Severity:
High
Description:
Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the "inspect sip" option is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed SIP packets.
Applies to:
Created:
2007-02-15
Updated:
2017-07-05

ID:
CVE-2007-0962
Title:
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when "inspect http" is enabled, allows remote attackers to cause a denial of service...
Type:
Hardware
Bulletins:
CVE-2007-0962
SFBID22561
Severity:
High
Description:
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when "inspect http" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic.
Applies to:
Created:
2007-02-15
Updated:
2017-07-05

ID:
REF000402
Title:
Config VSFTPd: anonymous login enabled
Type:
FTP
Bulletins: Severity:
Low
Description:
VSFTPd anonymous login enabled. If you don't need this feature, set 'anonymous_enable=NO'.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000403
Title:
Config VSFTPd: upload enabled
Type:
FTP
Bulletins: Severity:
Low
Description:
VSFTPd upload enabled. If you don't need this feature, set 'write_enable=NO'.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000404
Title:
Config VSFTPd: anonymous upload enabled
Type:
FTP
Bulletins: Severity:
Low
Description:
VSFTPd anonymous upload enabled. If you don't need this feature, set 'anon_upload_enable=NO'.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000427
Title:
Config SSHd: .rhosts and .shosts enabled
Type:
Services
Bulletins: Severity:
Low
Description:
use of .rhost and .shost files is enabled. If you don't need this functionality, set 'IgnoreRhosts yes'.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000428
Title:
Config SSHd: using default port
Type:
Services
Bulletins: Severity:
Low
Description:
SSH service is running on the default port 22. Consider changing the port to avoid automated attacks.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000429
Title:
Config SSHd: protocol 1 enabled
Type:
Services
Bulletins: Severity:
Low
Description:
SSH protocol 1 enabled. If you don't need this functionality, set 'Protocol 2'.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000430
Title:
Config SSH: protocol 1 enabled
Type:
Services
Bulletins: Severity:
Low
Description:
SSH protocol 1 enabled. If you don't need this functionality, set 'Protocol 2'.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000437
Title:
Config shadow: weak encryption detected
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
Some or all of the passwords in /etc/shadow are not encrypted using SHA-256/512 or stronger encryption Algorithms
Applies to:
Created:
2007-02-14
Updated:
2016-07-21

ID:
REF000438
Title:
Config KDM: autologin enabled
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
KDM login manager autologin enabled. If you don't need this functionality, set 'AutoLoginEnabled=false'.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000439
Title:
Config KDM: password-less login enabled
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
KDM login manager password-less login enabled. If you don't need this functionality, set 'NoPassEnabled=false'.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000440
Title:
Config KDM: empty password login enabled
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
KDM login manager empty password login enabled. If you don't need this functionality, set 'AllowNullPasswd=false'.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000441
Title:
Config KDM: root login enabled
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
KDM login manager root login enabled. If you don't need this functionality, set 'AllowRootLogin=false'.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000442
Title:
Config KDM: shutdown by everybody enabled
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
KDM login manager allows shutdown to everybody. If you don't need this functionality, set 'AllowShutdown=None'.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000443
Title:
Config GDM: autologin enabled
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
GDM login manager autologin enabled. If you don't need this feature, set 'AutomaticLoginEnable=false'.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000444
Title:
Config GDM: root login enabled
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
GDM login manager root login enabled. If you don't need this feature, set 'AllowRoot=false'.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000445
Title:
Config GDM: shutdown by everbody enabled
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
GDM login manager allows shutdown to everybody. If you don't need this feature, set 'SystemMenu=false'.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000446
Title:
Config passwd: multiple root accounts
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
file /etc/passwd contains user with ID:0 other than root. Make sure this is a legal account.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
REF000447
Title:
Config passwd: no shadow file detected
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
shadow file not found. Consider configuring a shadow file for password storage.
Applies to:
Created:
2007-02-14
Updated:
2010-08-21

ID:
MITRE:1120
Title:
oval:org.mitre.oval:def:1120: COM Object Instantiation Memory Corruption Vulnerability
Type:
Web
Bulletins:
MITRE:1120
CVE-2006-4697
Severity:
Low
Description:
Microsoft Internet Explorer 5.01, 6, and 7 uses certain COM objects from Imjpcksid.dll as ActiveX controls, which allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: this issue might be related to CVE-2006-4193.
Applies to:
Microsoft Internet Explorer
Created:
2007-02-14
Updated:
2015-08-03

ID:
MITRE:746
Title:
oval:org.mitre.oval:def:746: Word Malformed Data Structures Vulnerability
Type:
Software
Bulletins:
MITRE:746
CVE-2006-6456
Severity:
Low
Description:
Unspecified vulnerability in Microsoft Word 2000, 2002, and 2003 and Word Viewer 2003 allows remote attackers to execute code via unspecified vectors related to malformed data structures that trigger memory corruption, a different vulnerability than CVE-2006-5994.
Applies to:
Microsoft Word
Created:
2007-02-14
Updated:
2015-08-10

ID:
MITRE:257
Title:
oval:org.mitre.oval:def:257: COM Object Instantiation Memory Corruption Vulnerability
Type:
Web
Bulletins:
MITRE:257
CVE-2007-0219
Severity:
Low
Description:
Microsoft Internet Explorer 5.01, 6, and 7 uses certain COM objects from (1) Msb1fren.dll, (2) Htmlmm.ocx, and (3) Blnmgrps.dll as ActiveX controls, which allows remote attackers to execute arbitrary code via unspecified vectors, a different issue than CVE-2006-4697.
Applies to:
Microsoft Internet Explorer 5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Created:
2007-02-14
Updated:
2015-08-10

ID:
MITRE:1141
Title:
oval:org.mitre.oval:def:1141: FTP Server Response Parsing Memory Corruption Vulnerability
Type:
Web
Bulletins:
MITRE:1141
CVE-2007-0217
Severity:
Low
Description:
The wininet.dll FTP client code in Microsoft Internet Explorer 5.01 and 6 might allow remote attackers to execute arbitrary code via an FTP server response of a specific length that causes a terminating null byte to be written outside of a buffer, which causes heap corruption.
Applies to:
Microsoft Internet Explorer
Created:
2007-02-14
Updated:
2015-08-03

ID:
REF000382
Title:
GFI EndPointSecurity agent missing
Type:
Services
Bulletins: Severity:
High
Description:
The GFI EndPointSecurity agent is not installed on this machine. EndPointSecurity controls entry and exit of data via USB sticks, iPods, PDAs and other devices. For more information, visit http://www.gfi.com/endpointsecurity
Applies to:
GFI EndPointSecurity
Created:
2007-02-13
Updated:
2010-08-21

ID:
REF000383
Title:
GFI EndPointSecurity Report
Type:
Services
Bulletins: Severity:
High
Description:
This check generates a report regarding the status of GFI EndPointSecurity and EndPointSecurity Agent. This report is created on the GFI LANguard Network Security Scanner directory on Data\Reports\ESEC-Network-Report.csv. EndPointSecurity controls entry and exit of data via USB sticks, iPods, PDAs and other devices. For more information, visit http://www.gfi.com/endpointsecurity
Applies to:
GFI EndPointSecurity
Created:
2007-02-13
Updated:
2010-08-21

ID:
CVE-2007-0917
Title:
The Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XE to 12.3T allows remote attackers to bypass IPS signatures that use regular expressions via fragmented packets.
Type:
Hardware
Bulletins:
CVE-2007-0917
SFBID22549
Severity:
Medium
Description:
The Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XE to 12.3T allows remote attackers to bypass IPS signatures that use regular expressions via fragmented packets.
Applies to:
Created:
2007-02-13
Updated:
2017-07-05

ID:
CVE-2007-0918
Title:
The ATOMIC.TCP signature engine in the Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XA, 12.3YA, 12.3T, and other trains allows remote attackers to cause a denial of service (IPS crash and traffic loss) via unspecified manipulations...
Type:
Hardware
Bulletins:
CVE-2007-0918
SFBID22549
Severity:
High
Description:
The ATOMIC.TCP signature engine in the Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XA, 12.3YA, 12.3T, and other trains allows remote attackers to cause a denial of service (IPS crash and traffic loss) via unspecified manipulations that are not properly handled by the regular expression feature, as demonstrated using the 3123.0 (Netbus Pro Traffic) signature.
Applies to:
Created:
2007-02-13
Updated:
2017-07-05

ID:
CVE-2006-5084
Title:
SANS06C4: Skype for Mac 1.5.*.79 and earlier vulnerable to DoS or remote code execution.
Type:
Software
Bulletins:
CVE-2006-5084
SFBID20218
Severity:
High
Description:
In some circumstances, a Skype URL can be crafted that, if followed, could cause the execution of arbitrary code on the platform on which Skype is running. It is recommended to update to Skype version 1.5.*.80 or later.
Applies to:
Skype
Created:
2007-02-12
Updated:
2010-08-21

ID:
CVE-2006-1249
Title:
SANS06C5: Multiple iTunes and QuickTime for Mac Vulnerabilities
Type:
Software
Bulletins:
CVE-2006-1249
CVE-2005-4092
CVE-2005-3713
CVE-2006-2238
CVE-2006-1456
CVE-2005-3711
CVE-2005-3710
CVE-2005-3709
CVE-2005-3708
CVE-2005-3707
CVE-2005-2340
CVE-2005-2743
SFBID17074
SFBID15732
SFBID17953
SFBID16202
Severity:
High
Description:
Multiple vulnerabilities exist in QuickTime Player versions before 7.0.4, and in iTunes 6.0.2 and earlier. These include integer overflow, and heap-based buffer overflows. It is recommended to update to the latest versions of these products.
Applies to:
iTunes and QuickTime
Created:
2007-02-12
Updated:
2010-08-21

ID:
CVE-2006-1450
Title:
SANS06M1: Multiple vulnerabilities in Mail in Apple Mac OS X 10.3.9 and 10.4.6
Type:
Mail
Bulletins:
CVE-2006-1450
CVE-2006-1449
SFBID17951
Severity:
High
Description:
Multiple vulnerabilities exist in Mail in Apple Mac OS X 10.3.9 and 10.4.6 which can allow execution of arbitrary code. It is recommended to install Security Update 2006-003 or the latest version of Mac OS X. More information about this update can be obtained from http://docs.info.apple.com/article.html?artnum=303737.
Applies to:
Mail
Created:
2007-02-09
Updated:
2010-08-21

ID:
CVE-2006-0848
Title:
SANS06M1: Vulnerability in Safari and LaunchServices can lead to remote code exencution.
Type:
Web
Bulletins:
CVE-2006-0848
Severity:
High
Description:
It is possible to construct a file which appears to be a safe file type, such as an image or movie, but is actually an application. When the "Open `safe' files after downloading" option is enabled in Safari's General preferences, visiting a malicious web site may result in the automatic download and execution of such a file. A proof-of-concept has been detected on public web sites that demonstrates the automatic execution of shell scripts. It is recommended to install Apple Security Update 2006-001 or update to the latest version of Mac OS X. More information about this update can be obtained from http://docs.info.apple.com/article.html?artnum=303382
Applies to:
LaunchServices
Created:
2007-02-09
Updated:
2010-08-21

ID:
CVE-2005-3705
Title:
SANS06M1: Heap-based buffer overflow in WebKit in Mac OS X and OS X Server 10.3.9 and 10.4.3, allows remote attackers to execute arbitrary code.
Type:
Web
Bulletins:
CVE-2005-3705
SFBID15647
Severity:
High
Description:
WebKit contains a heap overflow that may lead to the execution of arbitrary code. This may be triggered by content downloaded from malicious web sites in applications that use WebKit such as Safari. It is recommended to install Apple Security Update 2005-009 or update to the latest Mac OS X version. More information regarding this update can be obtained from http://docs.info.apple.com/article.html?artnum=302847
Applies to:
Safari
Created:
2007-02-09
Updated:
2010-08-21

ID:
CVE-2006-3505
Title:
SANS06M1: WebKit in Apple Mac OS X 10.3.9 and 10.4.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.
Type:
Web
Bulletins:
CVE-2006-3505
SFBID19289
Severity:
High
Description:
A maliciously-crafted HTML document could cause a previously deallocated object to be accessed. This may lead to an application crash or arbitrary code execution. It is recommended to install Apple Security Update 2006-004 or update to the latest Mac OS X version. More information regarding this update may be obtained from http://docs.info.apple.com/article.html?artnum=304063
Applies to:
WebKit
Created:
2007-02-09
Updated:
2010-08-21

ID:
CVE-2006-3946
Title:
SANS06M1: WebCore in Apple Mac OS X 10.3.9 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.
Type:
Web
Bulletins:
CVE-2006-3946
SFBID19250
Severity:
High
Description:
A memory management error in WebKit's handling of certain HTML could allow a malicious web site to cause a crash or potentially execute arbitrary code as the user viewing the site. It is recommended to install Apple Security Update 2006-006. More information regarding this update can be obtained from http://docs.info.apple.com/article.html?artnum=304460
Applies to:
WebCore
Created:
2007-02-09
Updated:
2010-08-21

ID:
CVE-2006-3946
Title:
SANS06M1: WebCore in Apple Mac OS X 10.4 through 10.4.7 allows remote attackers to cause a denial of service
Type:
Web
Bulletins:
CVE-2006-3946
SFBID19250
Severity:
High
Description:
A memory management error in WebKit's handling of certain HTML could allow a malicious web site to cause a crash or potentially execute arbitrary code as the user viewing the site. It is recommended to update to Mac OS X version 10.4.8 or later.
Applies to:
WebCore
Created:
2007-02-09
Updated:
2010-08-21

ID:
CVE-2005-2516
Title:
SANS06M1: Safari in Mac OS X 10.3.9 and 10.4.2 allows remote attackers to execute arbitrary commands.
Type:
Web
Bulletins:
CVE-2005-2516
Severity:
High
Description:
Safari in Mac OS X 10.3.9 and 10.4.2, when rendering Rich Text Format (RTF) files, can directly access URLs without performing the normal security checks, which allows remote attackers to execute arbitrary commands. It is recommended to install Apple Security Update 2005-007 or update to the latest Mac OS X release. More information regarding this update can be obtained from http://docs.info.apple.com/article.html?artnum=302163
Applies to:
Safari
Created:
2007-02-09
Updated:
2010-08-21

ID:
CVE-2006-0397
Title:
SANS06M1: Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 10.4 up to 10.4.5
Type:
Web
Bulletins:
CVE-2006-0397
CVE-2006-0398
CVE-2006-0399
Severity:
High
Description:
Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 10.4 up to 10.4.5 allows attackers to trick a user into opening an application that appears to be a safe file type. It is recommended to install Apple Security Update 2006-002 or update to the latest Mac OS X release. More information regarding this update can be obtained from http://docs.info.apple.com/article.html?artnum=303453
Applies to:
Safari
Created:
2007-02-09
Updated:
2010-08-21

ID:
CVE-2006-1987
Title:
SANS06M1: Apple Safari 2.0.3 allows remote attackers to cause a denial of service and possibly execute code via an invalid FRAME tag.
Type:
Web
Bulletins:
CVE-2006-1987
SFBID17634
Severity:
High
Description:
Apple Safari 2.0.3 allows remote attackers to cause a denial of service and possibly execute code via an invalid FRAME tag, possibly due to (1) multiple SCROLLING attributes with no values, or (2) a SRC attribute with no value. It is recommended to update Safari by installing Apple Security Update 2006-004 or updating to the latest Mac OS X release. More information regarding this update can be obtained from http://docs.info.apple.com/article.html?artnum=304063
Applies to:
Safari
Created:
2007-02-09
Updated:
2010-08-21

ID:
CVE-2006-3498
Title:
SANS06M1: Buffer overflow in the DHCP component for Apple Mac OS X 10.3.9 and 10.4.7 and earlier
Type:
Services
Bulletins:
CVE-2006-3498
SFBID19289
Severity:
High
Description:
Stack-based buffer overflow in bootpd in the DHCP component for Apple Mac OS X 10.3.9 and 10.4.7 and earlier allows remote attackers to execute arbitrary code via a crafted BOOTP request. It is recommended to install Apple Security Update 2006-004 or update to the latest version of Mac OS X. More information about this update can be obtained from http://docs.info.apple.com/article.html?artnum=304063
Applies to:
Mac OS X
Created:
2007-02-09
Updated:
2010-08-21

ID:
CVE-2005-2518
Title:
SANS06M1: Buffer overflow in servermgrd in Mac OS X Server 10.4.2 and earlier
Type:
Software
Bulletins:
CVE-2005-2518
Severity:
High
Description:
A buffer overflow in the handling of authentication can lead to arbitrary code execution by a remote attacker. This vulnerability is present in Mac OS X Server 10.4 to 10.4.2. It is recommended to install Apple Security Update 2005-007 or update to the latest version of Mac OS X. More information about this update can be obtained from http://docs.info.apple.com/article.html?artnum=302163
Applies to:
servermgrd
Created:
2007-02-09
Updated:
2010-08-21

ID:
CVE-2006-4394
Title:
SANS06M1: Vulnerability in LoginWindow in Apple Mac OS X 10.4 through 10.4.7, allows network accounts without GUIDs to bypass service access controls.
Type:
Software
Bulletins:
CVE-2006-4394
SFBID20271
Severity:
High
Description:
Service access controls can be used to restrict which users are allowed to log in to a system via loginwindow. A logic error in loginwindow allows network accounts without GUIDs to bypass service access controls. This issue only affects systems that have been configured to use service access controls for loginwindow and to allow network accounts to authenticate users without a GUID. It is recommended to update to Mac OS X version 10.4.8 or later.
Applies to:
LoginWindow
Created:
2007-02-09
Updated:
2010-08-21

ID:
CVE-2006-1469
Title:
SANS06M1: Multiple Vulnerabilities in ImageIO
Type:
Software
Bulletins:
CVE-2006-1469
CVE-2006-1982
CVE-2005-2747
SFBID18731
SFBID17634
SFBID17951
SFBID14914
Severity:
High
Description:
Multiple vulnerabilities exist in ImageIO in Mac OS X versions 10.4 to 10.4.6. It is recommended to update to version 10.4.7 or later immediately.
Applies to:
Mac OS X
Created:
2007-02-08
Updated:
2010-08-21

ID:
CVE-2006-0384
Title:
SANS06M1: automount in Mac OS X 10.4.5 and earlier vulnerable to denial of service or execution of arbitrary code.
Type:
Software
Bulletins:
CVE-2006-0384
SFBID16907
Severity:
High
Description:
File servers on the local network may be able to cause Mac OS X systems to mount file systems with reserved names. This could cause the systems to become unresponsive, or possibly allow arbitrary code delivered from the file servers to run on the target system. It is recommended to install Security Update 2006-001 or update to the latest Mac OS X version.
Applies to:
automount
Created:
2007-02-08
Updated:
2010-08-21

ID:
CVE-2006-3507
Title:
SANS06M1: Multiple vulnerabilities in AirPort wireless driver
Type:
Software
Bulletins:
CVE-2006-3507
CVE-2006-3508
CVE-2006-3509
SFBID20144
Severity:
High
Description:
Multiple vulnerabilities exist in AirPort wireless driver on Apple Mac OS X 10.3.9 and 10.4.7 and earlier. It is recommended to install AirPort Update 2006-001 and Security Update 2006-005 on this machine or update to the latest Mac OS X version. More information about these updates can be obtained from http://docs.info.apple.com/article.html?artnum=304420
Applies to:
Mac OS X
Created:
2007-02-07
Updated:
2010-08-21

ID:
REF000408
Title:
Config SSHd: root login permited
Type:
Services
Bulletins: Severity:
Low
Description:
root SSH logins are permitted. If you don't need this functionality, set 'PermitRootLogin no'.
Applies to:
Created:
2007-02-07
Updated:
2010-08-21

ID:
REF000409
Title:
Config SSHd: X11 forwarding enabled
Type:
Services
Bulletins: Severity:
Low
Description:
X11 forwarding over ssh is enabled. If you don't need this functionality, set 'X11Forwarding no'.
Applies to:
Created:
2007-02-07
Updated:
2010-08-21

ID:
REF000410
Title:
Config SSHd: empty passwords permited
Type:
Services
Bulletins: Severity:
Low
Description:
SSH logins with empty passwords are permitted. If you don't need this functionality, set 'PermitEmptyPasswords no'.
Applies to:
Created:
2007-02-07
Updated:
2010-08-21

ID:
REF000411
Title:
Config SElinux: not in enforcing mode
Type:
Services
Bulletins: Severity:
Low
Description:
SElinux is disabled or in permissive mode. Consider switching to enforcing mode.
Applies to:
Created:
2007-02-07
Updated:
2010-08-21

ID:
REF000412
Title:
Config SElinux: not in strict mode
Type:
Services
Bulletins: Severity:
Low
Description:
SElinux is in targeted mode. Consider switching to strict mode.
Applies to:
Created:
2007-02-07
Updated:
2010-08-21

ID:
REF000436
Title:
Config shadow: empty password detected
Type:
Miscellaneous
Bulletins: Severity:
Low
Description:
password file /etc/shadow contains an empty password
Applies to:
Created:
2007-02-07
Updated:
2010-08-21

ID:
REF000407
Title:
Service running: SSH
Type:
Services
Bulletins: Severity:
Low
Description:
If this computer is not administered via secure shell, the SSH service is most likely unnecessary.
Applies to:
Created:
2007-02-06
Updated:
2010-08-21

ID:
REF000432
Title:
Config BIND: allow-query not specified
Type:
DNS
Bulletins: Severity:
Low
Description:
allow-recursion keyword specifies who can do queries on this dns server. The dns service is available to everyone by default. It's recomended to restrict access if this is not an authoritative dns server.
Applies to:
Created:
2007-02-05
Updated:
2010-08-21

ID:
REF000433
Title:
Config BIND: allow-update not specified
Type:
DNS
Bulletins: Severity:
Low
Description:
allow-update keyword specifies who can do zone updates on this dns server.
Applies to:
Created:
2007-02-05
Updated:
2010-08-21

ID:
REF000434
Title:
Config BIND: allow-transfer not specified
Type:
DNS
Bulletins: Severity:
Low
Description:
allow-transfer keyword specifies who can do zone transfers from this dns server.
Applies to:
Created:
2007-02-05
Updated:
2010-08-21

ID:
REF000435
Title:
Config BIND: allow-recursion not specified
Type:
DNS
Bulletins: Severity:
Low
Description:
allow-recursion keyword specifies who can do recursive queries on this dns server. The dns recursive queries are available to everyone by default. It's recomended to restrict access if this is not a public dns server.
Applies to:
Created:
2007-02-05
Updated:
2010-08-21

ID:
REF000406
Title:
Service running: HTTP
Type:
Services
Bulletins: Severity:
Low
Description:
If this is not an web server, the HTTP service is most likely unnecessary.
Applies to:
Created:
2007-01-31
Updated:
2010-08-21

ID:
REF000413
Title:
Service running: Finger
Type:
Services
Bulletins: Severity:
Low
Description:
If this is not an Finger server, this service is most likely unnecessary. Finger is an obsolete and insecure service, use LDAP directory services instead.
Applies to:
Created:
2007-01-31
Updated:
2010-08-21

ID:
REF000414
Title:
Service running: FTP
Type:
Services
Bulletins: Severity:
Low
Description:
If this is not a FTP server, the FTP service is most likely unnecessary. FTP is very problematic and insecure service, use HTTP, HTTPS or SFTP instead.
Applies to:
Created:
2007-01-31
Updated:
2010-08-21

ID:
REF000415
Title:
Service running: Telnet
Type:
Services
Bulletins: Severity:
Low
Description:
If this is not a Telnet server, this service is most likely unnecessary. Telnet is an obsolete and insecure service, use SSH instead.
Applies to:
Created:
2007-01-31
Updated:
2010-08-21

ID:
REF000416
Title:
Service running: SMTP
Type:
Services
Bulletins: Severity:
Low
Description:
If this is not a SMTP mail server, the SMTP service is most likely unnecessary.
Applies to:
Created:
2007-01-31
Updated:
2010-08-21

ID:
REF000417
Title:
Service running: DNS
Type:
Services
Bulletins: Severity:
Low
Description:
If this is not a internet domain name server, the DNS service is most likely unnecessary.
Applies to:
Created:
2007-01-31
Updated:
2010-08-21

ID:
REF000418
Title:
Service running: CUPS
Type:
Services
Bulletins: Severity:
Low
Description:
If this is not a CUPS print server, the CUPS server service is most likely unnecessary.
Applies to:
Created:
2007-01-31
Updated:
2010-08-21

ID:
REF000419
Title:
Service running: HTTPS
Type:
Services
Bulletins: Severity:
Low
Description:
If this is not a secure web server, the HTTPS service is most likely unnecessary.
Applies to:
Created:
2007-01-31
Updated:
2010-08-21

ID:
REF000420
Title:
Service running: POP3
Type:
Services
Bulletins: Severity:
Low
Description:
If this is not a POP mail server, the POP3 service is most likely unnecessary.
Applies to:
Created:
2007-01-31
Updated:
2010-08-21

ID:
REF000421
Title:
Service running: IMAP4
Type:
Services
Bulletins: Severity:
Low
Description:
If this is not an IMAP mail server, the IMAP4 service is most likely unnecessary.
Applies to:
Created:
2007-01-31
Updated:
2010-08-21

ID:
REF000422
Title:
Service running: SWAT
Type:
Services
Bulletins: Severity:
Low
Description:
If this is not a SAMBA file server, this service is most likely unnecessary.
Applies to:
Created:
2007-01-31
Updated:
2010-08-21

ID:
REF000423
Title:
Service running: MySQL
Type:
Services
Bulletins: Severity:
Low
Description:
If this is not a database server, the MySQL service is most likely unnecessary.
Applies to:
Created:
2007-01-31
Updated:
2010-08-21

ID:
REF000424
Title:
Service running: PostgeSQL
Type:
Services
Bulletins: Severity:
Low
Description:
If this is not a database server, the PostgreSQL service is most likely unnecessary.
Applies to:
Created:
2007-01-31
Updated:
2010-08-21

ID:
REF000425
Title:
Service running: SAMBA SMB
Type:
Services
Bulletins: Severity:
Low
Description:
If this is not a SAMBA file server, the SMB service is most likely unnecessary.
Applies to:
Created:
2007-01-31
Updated:
2010-08-21

ID:
REF000426
Title:
Service running: SAMBA NMB
Type:
Services
Bulletins: Severity:
Low
Description:
Applies to:
Created:
2007-01-31
Updated:
2010-08-21

ID:
CVE-2007-0648
Title:
Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP.
Type:
Hardware
Bulletins:
CVE-2007-0648
SFBID22330
Severity:
High
Description:
Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP.
Applies to:
Created:
2007-01-31
Updated:
2017-07-05

ID:
CVE-2007-0199
Title:
The Data-link Switching (DLSw) feature in Cisco IOS 11.0 through 12.4 allows remote attackers to cause a denial of service (device reload) via "an invalid value in a DLSw message... during the capabilities exchange."
Type:
Hardware
Bulletins:
CVE-2007-0199
SFBID21990
Severity:
Medium
Description:
The Data-link Switching (DLSw) feature in Cisco IOS 11.0 through 12.4 allows remote attackers to cause a denial of service (device reload) via "an invalid value in a DLSw message... during the capabilities exchange."
Applies to:
Created:
2007-01-11
Updated:
2017-07-05

ID:
CVE-2007-0057
Title:
Cisco Clean Access (CCA) 3.6.x through 3.6.4.2 and 4.0.x through 4.0.3.2 does not properly configure or allow modification of a shared secret authentication key, which causes all devices to have the same shared sercet and allows remote attackers to...
Type:
Hardware
Bulletins:
CVE-2007-0057
Severity:
High
Description:
Cisco Clean Access (CCA) 3.6.x through 3.6.4.2 and 4.0.x through 4.0.3.2 does not properly configure or allow modification of a shared secret authentication key, which causes all devices to have the same shared sercet and allows remote attackers to gain unauthorized access.
Applies to:
Created:
2007-01-04
Updated:
2017-07-05

ID:
CVE-2007-0058
Title:
Cisco Clean Access (CCA) 3.5.x through 3.5.9 and 3.6.x through 3.6.1.1 on the Clean Access Manager (CAM) allows remote attackers to bypass authentication and download arbitrary manual database backups by guessing the snapshot filename using brute...
Type:
Hardware
Bulletins:
CVE-2007-0058
Severity:
High
Description:
Cisco Clean Access (CCA) 3.5.x through 3.5.9 and 3.6.x through 3.6.1.1 on the Clean Access Manager (CAM) allows remote attackers to bypass authentication and download arbitrary manual database backups by guessing the snapshot filename using brute force, then making a direct request for the file.
Applies to:
Created:
2007-01-04
Updated:
2017-07-05