Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2006-03-19 CVE-2006-1251 Code Injection vulnerability in Sa-Exim 4.0/4.1/4.2
Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote attackers to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm command.
network
low complexity
sa-exim CWE-94
5.0
2006-03-19 CVE-2006-1250 Multiple Unspecified vulnerability in Amax Information Technologies Winmail 4.3
Unspecified vulnerability in the Webmail module in Winmail before 4.3 has unknown impact and unknown remote attack vectors.
network
low complexity
amax-information-technologies
critical
10.0
2006-03-19 CVE-2006-1249 Numeric Errors vulnerability in Apple Itunes and Quicktime
Integer overflow in Apple QuickTime Player 7.0.3 and 7.0.4 and iTunes 6.0.1 and 6.0.2 allows remote attackers to execute arbitrary code via a FlashPix (FPX) image that contains a field that specifies a large number of blocks.
network
apple CWE-189
6.8
2006-03-17 CVE-2006-1248 Local Unauthorized Access vulnerability in HP Hp-Ux 11.00/11.11/11.23
Unspecified vulnerability in usermod in HP-UX B.11.00, B.11.11, and B.11.23, when run with certain options that involve a new home directory, might cause usermod to change the ownership of all directories and files under the new directory, which might result in less secure permissions than intended.
local
low complexity
hp
4.6
2006-03-17 CVE-2006-1246 Local Privilege Escalation vulnerability in IBM AIX 5.3
Unspecified vulnerability in mklvcopy in BOS.RTE.LVM in IBM AIX 5.3 allows local users to execute arbitrary commands when mklvcopy calls external commands, possibly due to an untrusted search path vulnerability.
local
low complexity
ibm
7.2
2006-03-17 CVE-2006-1245 Buffer Overflow vulnerability in Microsoft IE 6.0
Buffer overflow in mshtml.dll in Microsoft Internet Explorer 6.0.2900.2180, and probably other versions, allows remote attackers to execute arbitrary code via an HTML tag with a large number of script action handlers such as onload and onmouseover, as demonstrated using onclick, aka the "Multiple Event Handler Memory Corruption Vulnerability."
network
low complexity
microsoft
7.5
2006-03-16 CVE-2006-1182 Remote Command Execution vulnerability in Adobe Graphics Server / Document Server
Adobe Graphics Server 2.0 and 2.1 (formerly AlterCast) and Adobe Document Server (ADS) 5.0 and 6.0 allows local users to read files with certain extensions or overwrite arbitrary files and execute code via a crafted SOAP request to the AlterCast web service in which the request uses the (1) saveContent or (2) saveOptimized ADS commands, or the (3) loadContent command.
local
high complexity
adobe
2.6
2006-03-15 CVE-2006-1244 Multiple Unspecified vulnerability in XPDF
Unspecified vulnerability in certain versions of xpdf after 3.00, as used in various products including (a) pdfkit.framework, (b) gpdf, (c) pdftohtml, and (d) libextractor, has unknown impact and user-assisted attack vectors, possibly involving errors in (1) gmem.c, (2) SplashXPathScanner.cc, (3) JBIG2Stream.cc, (4) JPXStream.cc, and/or (5) Stream.cc.
network
high complexity
gnome libextractor xpdf debian
7.6
2006-03-15 CVE-2006-1243 Local File Include vulnerability in Simple PHP Blog
Directory traversal vulnerability in install05.php in Simple PHP Blog (SPB) 0.4.7.1 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences and a NUL (%00) character in the blog_language parameter, as demonstrated by injecting PHP sequences into an Apache access_log file, which is then included using install05.php.
network
low complexity
alexander-palmo
7.5
2006-03-15 CVE-2006-1242 Unspecified vulnerability in Linux Kernel
The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks.
network
low complexity
linux
5.0