Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2005-11-18 CVE-2005-3668 Denial-Of-Service vulnerability in Internet KEY Exchange Internet KEY Exchange 1
Multiple buffer overflows in multiple unspecified implementations of Internet Key Exchange version 1 (IKEv1) have multiple unspecified attack vectors and impacts related to denial of service, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
network
low complexity
internet-key-exchange
5.0
2005-11-18 CVE-2005-3667 Denial-Of-Service vulnerability in Internet KEY Exchange Internet KEY Exchange 1
Multiple unspecified vulnerabilities in multiple unspecified implementations of Internet Key Exchange version 1 (IKEv1) have multiple unspecified attack vectors and impacts related to denial of service, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
network
low complexity
internet-key-exchange
5.0
2005-11-18 CVE-2005-3666 Denial-Of-Service vulnerability in Internet KEY Exchange Internet KEY Exchange 1
Multiple unspecified format string vulnerabilities in multiple unspecified implementations of Internet Key Exchange version 1 (IKEv1) have multiple unspecified attack vectors and impacts, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
network
low complexity
internet-key-exchange
critical
10.0
2005-11-18 CVE-2005-3664 Remote Buffer Overflow vulnerability in Kaspersky Anti-Virus Engine CHM File Parser
Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote attackers to execute arbitrary code via a crafted CHM file.
network
low complexity
f-secure kaspersky-lab
7.5
2005-11-18 CVE-2005-3663 Local Security vulnerability in Kaspersky LAB Kaspersky Anti-Virus 5.0
Unquoted Windows search path vulnerability in Kaspersky Anti-Virus 5.0 might allow local users to gain privileges via a malicious "program.exe" file in the C: folder.
local
low complexity
kaspersky-lab
7.2
2005-11-18 CVE-2005-3186 Buffer Overflow vulnerability in GDK-Pixbuf/GTK XPM Images
Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow.
network
low complexity
gnome gtk
7.5
2005-11-18 CVE-2005-3116 Buffer Overflow vulnerability in VERITAS NetBackup Volume Manager Daemon
Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet.
network
low complexity
symantec-veritas
critical
10.0
2005-11-18 CVE-2005-2940 Unspecified vulnerability in Microsoft Antispyware 1.0.509
Unquoted Windows search path vulnerability in Microsoft Antispyware 1.0.509 (Beta 1) might allow local users to gain privileges via a malicious "program.exe" file in the C: folder, involving the programs (1) GIANTAntiSpywareMain.exe, (2) gcASNotice.exe, (3) gcasServ.exe, (4) gcasSWUpdater.exe, or (5) GIANTAntiSpywareUpdater.exe.
local
low complexity
microsoft
7.2
2005-11-18 CVE-2005-2939 Unspecified vulnerability in VMWare Workstation 5.0.0Build13124
Unquoted Windows search path vulnerability in VMWare Workstation 5.0.0 build-13124 might allow local users to gain privileges via a malicious "program.exe" file in the C: folder.
local
low complexity
vmware
7.2
2005-11-18 CVE-2005-2938 Permissions, Privileges, and Access Controls vulnerability in Apple Itunes 4.7.1.30/5.0
Unquoted Windows search path vulnerability in iTunesHelper.exe in iTunes 4.7.1.30 and iTunes 5 for Windows might allow local users to gain privileges via a malicious C:\program.exe file.
local
low complexity
apple CWE-264
7.2