Vulnerabilities (CVE)

Filtered by CWE-264
Total 5466 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2007-6222 1 Crm Ctt 1 Interleave 2017-07-29 6.5 MEDIUM N/A
The CheckCustomerAccess function in functions.php in CRM-CTT Interleave before 4.2.0 (formerly CRM-CTT) does not properly verify user privileges, which allows remote authenticated users with the LIMITTOCUSTOMERS privilege to bypass intended access restrictions and edit non-active user settings. NOTE: some of these details are obtained from third party information.
CVE-2007-6209 2 Linux, Zsh 2 Linux Kernel, Zsh 2017-07-29 4.6 MEDIUM N/A
Util/difflog.pl in zsh 4.3.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
CVE-2007-6182 1 Growth 1 Ispmanager 2017-07-29 7.2 HIGH N/A
The responder program in ISPsystem ISPmanager (aka ISPmgr) 4.2.15.1 allows local users to gain privileges via shell metacharacters in command line arguments.
CVE-2007-6174 1 Phpdevshell 1 Phpdevshell 2017-07-29 8.5 HIGH N/A
PHPDevShell before 0.7.0 allows remote authenticated users to gain privileges via a crafted request to update a user profile. NOTE: some of these details are obtained from third party information.
CVE-2007-6018 1 Horde 4 Framework, Groupware Webmail Edition, Horde and 1 more 2017-07-29 5.8 MEDIUM N/A
IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) "purge" deleted emails via a crafted email message.
CVE-2007-5988 1 Bti-tracker 1 Bti-tracker 2017-07-29 7.5 HIGH N/A
blocks/shoutbox_block.php in BtiTracker 1.4.4 does not verify user accounts, which allows remote attackers to post shoutbox entries as arbitrary users via a modified nick field.
CVE-2007-5987 1 Bti-tracker 1 Bti-tracker 2017-07-29 6.8 MEDIUM N/A
details.php in BtiTracker before 1.4.5, when torrent viewing is disabled for guests, allows remote attackers to bypass protection mechanisms via a direct request, as demonstrated by (1) reading the details of an arbitrary torrent and (2) modifying a torrent owned by a guest.
CVE-2007-5945 1 Usvn 1 User-friendly Svn 2017-07-29 5.0 MEDIUM N/A
USVN before 0.6.5 allows remote attackers to obtain a list of repository contents via unspecified vectors.
CVE-2007-5931 1 Orangehrm 1 Orangehrm 2017-07-29 5.0 MEDIUM N/A
The reDirect function in lib/controllers/RepViewController.php in OrangeHRM before 2.2.2 does not verify the privileges of a user, which allows remote attackers to obtain access to data via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
CVE-2007-5857 1 Apple 1 Mac Os X 2017-07-29 6.4 MEDIUM N/A
Quick Look in Apple Mac OS X 10.5.1 does not prevent a movie from accessing URLs when the movie file is previewed or if an icon is created, which might allow remote attackers to obtain sensitive information via HREFTrack.
CVE-2007-5856 1 Apple 1 Mac Os X 2017-07-29 9.4 HIGH N/A
Quick Look Apple Mac OS X 10.5.1, when previewing an HTML file, does not prevent plug-ins from making network requests, which might allow remote attackers to obtain sensitive information.
CVE-2007-5851 1 Apple 1 Mac Os X 2017-07-29 3.6 LOW N/A
iChat in Apple Mac OS X 10.4.11 allows network-adjacent remote attackers to automatically initiate a video connection to another user via unknown vectors.
CVE-2007-5829 1 Symantec 2 Norton Antivirus, Norton Internet Security 2017-07-29 6.0 MEDIUM N/A
The Disk Mount scanner in Symantec AntiVirus for Macintosh 9.x and 10.x, Norton AntiVirus for Macintosh 10.0 and 10.1, and Norton Internet Security for Macintosh 3.x, uses a directory with weak permissions (group writable), which allows local admin users to gain root privileges by replacing unspecified files, which are executed when a user with physical access inserts a disk and the "Show Progress During Mount Scans" option is enabled.
CVE-2007-5827 2 Debian, Iscsitarget 2 Debian Linux, Iscsitarget 2017-07-29 2.1 LOW N/A
iSCSI Enterprise Target (iscsitarget) 0.4.15 uses weak permissions for /etc/ietd.conf, which allows local users to obtain passwords.
CVE-2007-5819 1 Ibm 1 Tivoli Continuous Data Protection For Files 2017-07-29 2.1 LOW N/A
IBM Tivoli Continuous Data Protection for Files (CDP) 3.1.0 uses weak permissions (unrestricted write) for the Central Admin Global download directory, which allows local users to place arbitrary files into a location used for updating CDP clients.
CVE-2007-5761 1 Motorola 1 Netoctopus 2017-07-29 7.2 HIGH N/A
The NantSys device 5.0.0.115 in Motorola netOctopus 5.1.2 build 1011 has weak permissions for the \\.\NantSys device interface (nantsys.sys), which allows local users to gain privileges or cause a denial of service (system crash), as demonstrated by modifying the SYSENTER_EIP_MSR CPU Model Specific Register (MSR) value.
CVE-2007-5751 1 Liferea 1 Liferea 2017-07-29 2.1 LOW N/A
Liferea before 1.4.6 uses weak permissions (0644) for the feedlist.opml backup file, which allows local users to obtain credentials.
CVE-2007-5486 1 Dotproject 1 Dotproject 2017-07-29 6.4 MEDIUM N/A
dotProject before 2.1 does not properly check privileges when invoking the Companies module, which allows remote attackers to access this module via a crafted URL. NOTE: some of these details are obtained from third party information.
CVE-2007-5468 1 Cisco 1 Call Manager 2017-07-29 5.0 MEDIUM N/A
Cisco CallManager 5.1.1.3000-5 does not verify the Digest authentication header URI against the Request URI in SIP messages, which allows remote attackers to use sniffed Digest authentication credentials to call arbitrary telephone numbers or spoof caller ID (aka "toll fraud and authentication forward attack").
CVE-2007-5401 1 Layton Technology 1 Helpbox 2017-07-29 6.5 MEDIUM N/A
Unrestricted file upload vulnerability in uploadrequest.asp in Layton HelpBox 3.7.1 allows remote authenticated users to upload and execute arbitrary ASP files, related to not properly checking file extensions.