Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2005-12-29 CVE-2005-4569 Remote vulnerability in Floosietek Ftgate 4.4Build4.4.000
Stack-based buffer overflow in index.fts in FTGate Technology (formerly known as Floosietek) FTGate 4.4 (aka Build 4.4.000 Oct 26 2005) allows remote attackers to execute arbitrary code via a long tzoffset value.
network
low complexity
floosietek
7.5
2005-12-29 CVE-2005-4568 Remote vulnerability in Floosietek Ftgate 4.4Build4.4.000
Multiple format string vulnerabilities in FTGate Technology (formerly known as Floosietek) FTGate 4.4 (aka Build 4.4.000 Oct 26 2005) allow remote attackers to execute arbitrary code via format string specifiers in the (1) USER, (2) PASS, and (3) TOP commands to the POP3 server; and the (4) LIST and (5) AUTHENTICATE commands to the IMAP server.
network
low complexity
floosietek
7.5
2005-12-29 CVE-2005-4567 Remote vulnerability in Floosietek Ftgate 4.4Build4.4.000
Multiple cross-site scripting (XSS) vulnerabilities in FTGate Technology (formerly known as Floosietek) FTGate 4.4 (Build 4.4.000 Oct 26 2005) allow remote attackers to inject arbitrary web script or HTML by sending (1) the href parameter to index.fts, or the param1 parameter to (2) /domains/index.fts, (3) /config/licence.fts, or (4) /config/systemacl.fts.
network
floosietek
5.8
2005-12-29 CVE-2005-4566 Multiple Unspecified vulnerability in ADTRAN NetVanta Products IKE Traffic
Buffer overflow in the Internet Key Exchange version 1 (IKEv1) implementation in ADTRAN NetVanta before 10.03.03.E might allow remote attackers to have an unknown impact via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
network
low complexity
adtran
critical
10.0
2005-12-29 CVE-2005-4565 Multiple Unspecified vulnerability in ADTRAN NetVanta Products IKE Traffic
Format string vulnerability in the Internet Key Exchange version 1 (IKEv1) implementation in ADTRAN NetVanta before 10.03.03.E might allow remote attackers to have an unknown impact via format string specifiers in crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
network
low complexity
adtran
critical
10.0
2005-12-29 CVE-2005-4564 Multiple Unspecified vulnerability in ADTRAN NetVanta Products IKE Traffic
The Internet Key Exchange version 1 (IKEv1) implementation in ADTRAN NetVanta before 10.03.03.E might allow remote attackers to cause a denial of service via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
network
low complexity
adtran
5.0
2005-12-29 CVE-2005-4563 SQL Injection vulnerability in Enterprise Heart Enterprise Connector 1.0.2
SQL injection vulnerability in main.php in Enterprise Heart Enterprise Connector 1.0.2 allows remote attackers to execute arbitrary SQL commands and bypass login authentication via the loginid parameter, a different vulnerability than CVE-2005-3875.
network
low complexity
enterprise-heart
7.5
2005-12-28 CVE-2005-3345 Local Privilege Escalation vulnerability in RSSH RSSH_CHROOT_HELPER
rssh 2.0.0 through 2.2.3 allows local users to bypass access restrictions and gain root privileges by using the rssh_chroot_helper command to chroot to an external directory.
local
low complexity
rssh
7.2
2005-12-28 CVE-2005-4560 Improper Input Validation vulnerability in Microsoft Windows 2003 Server and Windows XP
The Windows Graphical Device Interface library (GDI32.DLL) in Microsoft Windows allows remote attackers to execute arbitrary code via a Windows Metafile (WMF) format image with a crafted SETABORTPROC GDI Escape function call, related to the Windows Picture and Fax Viewer (SHIMGVW.DLL), a different vulnerability than CVE-2005-2123 and CVE-2005-2124, and as originally discovered in the wild on unionseek.com.
network
low complexity
microsoft CWE-20
7.5
2005-12-28 CVE-2005-4559 Input Validation vulnerability in IceWarp Universal WebMail
mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters.
network
low complexity
deerfield icewarp merak
5.0