Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2005-11-18 | CVE-2005-3668 | Denial-Of-Service vulnerability in Internet KEY Exchange Internet KEY Exchange 1 Multiple buffer overflows in multiple unspecified implementations of Internet Key Exchange version 1 (IKEv1) have multiple unspecified attack vectors and impacts related to denial of service, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. | 5.0 |
2005-11-18 | CVE-2005-3667 | Denial-Of-Service vulnerability in Internet KEY Exchange Internet KEY Exchange 1 Multiple unspecified vulnerabilities in multiple unspecified implementations of Internet Key Exchange version 1 (IKEv1) have multiple unspecified attack vectors and impacts related to denial of service, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. | 5.0 |
2005-11-18 | CVE-2005-3666 | Denial-Of-Service vulnerability in Internet KEY Exchange Internet KEY Exchange 1 Multiple unspecified format string vulnerabilities in multiple unspecified implementations of Internet Key Exchange version 1 (IKEv1) have multiple unspecified attack vectors and impacts, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. | 10.0 |
2005-11-18 | CVE-2005-3664 | Remote Buffer Overflow vulnerability in Kaspersky Anti-Virus Engine CHM File Parser Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote attackers to execute arbitrary code via a crafted CHM file. | 7.5 |
2005-11-18 | CVE-2005-3663 | Local Security vulnerability in Kaspersky LAB Kaspersky Anti-Virus 5.0 Unquoted Windows search path vulnerability in Kaspersky Anti-Virus 5.0 might allow local users to gain privileges via a malicious "program.exe" file in the C: folder. | 7.2 |
2005-11-18 | CVE-2005-3186 | Buffer Overflow vulnerability in GDK-Pixbuf/GTK XPM Images Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow. | 7.5 |
2005-11-18 | CVE-2005-3116 | Buffer Overflow vulnerability in VERITAS NetBackup Volume Manager Daemon Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet. | 10.0 |
2005-11-18 | CVE-2005-2940 | Unspecified vulnerability in Microsoft Antispyware 1.0.509 Unquoted Windows search path vulnerability in Microsoft Antispyware 1.0.509 (Beta 1) might allow local users to gain privileges via a malicious "program.exe" file in the C: folder, involving the programs (1) GIANTAntiSpywareMain.exe, (2) gcASNotice.exe, (3) gcasServ.exe, (4) gcasSWUpdater.exe, or (5) GIANTAntiSpywareUpdater.exe. | 7.2 |
2005-11-18 | CVE-2005-2939 | Unspecified vulnerability in VMWare Workstation 5.0.0Build13124 Unquoted Windows search path vulnerability in VMWare Workstation 5.0.0 build-13124 might allow local users to gain privileges via a malicious "program.exe" file in the C: folder. | 7.2 |
2005-11-18 | CVE-2005-2938 | Permissions, Privileges, and Access Controls vulnerability in Apple Itunes 4.7.1.30/5.0 Unquoted Windows search path vulnerability in iTunesHelper.exe in iTunes 4.7.1.30 and iTunes 5 for Windows might allow local users to gain privileges via a malicious C:\program.exe file. | 7.2 |