Latest CVE Feed
-
7.5
HIGHCVE-2005-0671
Format string vulnerability in Carsten's 3D Engine (Ca3DE), March 2004 version and earlier, allows remote attackers to execute arbitrary code via format string specifiers in a command.... Read more
Affected Products : ca3de- Published: Mar. 03, 2005
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2005-0639
Multiple vulnerabilities in xli before 1.17 may allow remote attackers to execute arbitrary code via "buffer management errors" from certain image properties, some of which may be related to integer overflows in PPM files.... Read more
- Published: Mar. 02, 2005
- Modified: Apr. 03, 2025
-
4.6
MEDIUMCVE-2005-0640
Computer Associates (CA) Unicenter Asset Management (UAM) 4.0 does not properly initialize the "Change Credentials for Database" window, which allows local users to recover the SQL Admin password via certain methods.... Read more
Affected Products : unicenter_asset_management- Published: Mar. 02, 2005
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-2005-0636
Format string vulnerability in Foxmail Server 2.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in the USER command.... Read more
Affected Products : foxmail_email_server- Published: Mar. 02, 2005
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2005-0605
scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow.... Read more
Affected Products : enterprise_linux enterprise_linux_desktop suse_linux propack mandrake_linux mandrake_linux_corporate_server fedora_core lesstif x11r6 x11r6 +1 more products- Published: Mar. 02, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2005-0620
Einstein 1.0 stores credit card information in plaintext in the world-readable wallets.dat file, which allows local users to steal the information.... Read more
Affected Products : einstein- Published: Mar. 02, 2005
- Modified: Apr. 03, 2025
-
4.3
MEDIUMCVE-2005-0641
Cross-site scripting (XSS) vulnerability in the Reporter for Computer Associates (CA) Unicenter Asset Management (UAM) 4.0 allows remote attackers to inject arbitrary HTML or web script via the (1) name or (2) description in a report template.... Read more
Affected Products : unicenter_asset_management- Published: Mar. 02, 2005
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2005-0633
Buffer overflow in Trillian 3.0 and Pro 3.0 allows remote attackers to execute arbitrary code via a crafted PNG image file.... Read more
- Published: Mar. 02, 2005
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2005-0638
xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.... Read more
- Published: Mar. 02, 2005
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2004-1021
iCal before 1.5.4 on Mac OS X 10.2.3, and other later versions, does not alert the user when handling calendars that use alarms, which allows attackers to execute programs and send e-mail via alarms.... Read more
Affected Products : ical- Published: Mar. 01, 2005
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2004-0988
Integer overflow on Apple QuickTime before 6.5.2, when running on Windows systems, allows remote attackers to cause a denial of service (memory consumption) via certain inputs that cause a large memory operation.... Read more
Affected Products : quicktime- Published: Mar. 01, 2005
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2004-1027
Directory traversal vulnerability in the -x (extract) command line option in unarj allows remote attackers to overwrite arbitrary files via an arj archive with filenames that contain .. (dot dot) sequences.... Read more
- Published: Mar. 01, 2005
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-2004-1052
Buffer overflow in the getnickuserhost function in BNC 2.8.9, and possibly other versions, allows remote IRC servers to execute arbitrary code via an IRC server response that contains many (1) ! (exclamation) or (2) @ (at sign) characters.... Read more
- Published: Mar. 01, 2005
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-2004-1037
The search function in TWiki 20030201 allows remote attackers to execute arbitrary commands via shell metacharacters in a search string.... Read more
- Published: Mar. 01, 2005
- Modified: Apr. 03, 2025
-
7.2
HIGHCVE-2004-1038
A design error in the IEEE1394 specification allows attackers with physical access to a device to read and write to sensitive memory using a modified FireWire/IEEE 1394 client, thus bypassing intended restrictions that would normally require greater degre... Read more
Affected Products : firewire_ieee- Published: Mar. 01, 2005
- Modified: Apr. 03, 2025
-
6.4
MEDIUMCVE-2004-1035
Multiple integer signedness errors in (1) imapcommon.c, (2) main.c, (3) request.c, and (4) select.c for up-imapproxy IMAP proxy 1.2.2 allow remote attackers to cause a denial of service (server crash) and possibly leak sensitive information via certain li... Read more
Affected Products : imap_proxy- Published: Mar. 01, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2004-1033
Fcron 2.0.1, 2.9.4, and possibly earlier versions leak file descriptors of open files, which allows local users to bypass access restrictions and read fcron.allow and fcron.deny via the EDITOR environment variable.... Read more
- Published: Mar. 01, 2005
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-2004-0992
Format string vulnerability in the -a option (daemon mode) in Proxytunnel before 1.2.3 allows remote attackers to execute arbitrary code via format string specifiers in an invalid proxy answer.... Read more
Affected Products : proxytunnel- Published: Mar. 01, 2005
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2004-0986
Iptables before 1.2.11, under certain conditions, does not properly load the required modules at system startup, which causes the firewall rules to fail to load and protect the system from remote attackers.... Read more
- Published: Mar. 01, 2005
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-2004-0990
Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based... Read more
- Published: Mar. 01, 2005
- Modified: Apr. 03, 2025