Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2005-09-15 CVE-2005-2918 Unspecified vulnerability in Gtkdiskfree
The open_cmd_tube function in mount.c for gtkdiskfree 1.9.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the gtkdiskfree temporary file.
network
low complexity
gtkdiskfree
5.0
2005-09-15 CVE-2005-2799 Remote Security vulnerability in Linksys Wrt54G 3.01.3/3.03.6
Buffer overflow in apply.cgi in Linksys WRT54G 3.01.03, 3.03.6, and possibly other versions before 4.20.7, allows remote attackers to execute arbitrary code via a long HTTP POST request.
network
low complexity
linksys
7.5
2005-09-15 CVE-2005-2658 Remote Buffer Overflow vulnerability in Softwolves Software Turquoise Superstat 2.2.4
Buffer overflow in utility.cpp in Turquoise SuperStat (turqstat) 2.2.4 and earlier might allow remote NNTP servers to execute arbitrary code via a date with a long month.
network
low complexity
softwolves-software
7.5
2005-09-15 CVE-2005-2495 Numeric Errors vulnerability in Xfree86 Project Xfree86
Multiple integer overflows in XFree86 before 4.3.0 allow user-assisted attackers to execute arbitrary code via a crafted pixmap image.
network
high complexity
xfree86-project CWE-189
5.1
2005-09-14 CVE-2005-2916 Remote Security vulnerability in Linksys Wrt54G 3.01.3/3.03.6/4.00.7
Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions before 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote attackers to (1) modify configuration using restore.cgi or (2) upload new firmware using upgrade.cgi.
network
low complexity
linksys
5.0
2005-09-14 CVE-2005-2915 Remote Security vulnerability in Linksys Wrt54G 2.04.4Nondefault/3.01.3/3.03.6
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, uses weak encryption (XOR encoding with a fixed byte mask) for configuration information, which could allow attackers to decrypt the information and possibly re-encrypt it in conjunction with CVE-2005-2914.
network
low complexity
linksys
5.0
2005-09-14 CVE-2005-2914 Remote Security vulnerability in Linksys Wrt54G 2.04.4/3.01.3/3.03.6
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, does not use an authentication initialization function, which allows remote attackers to obtain encrypted configuration information and, if the key is known, modify the configuration.
network
low complexity
linksys
7.5
2005-09-14 CVE-2005-2912 Denial-Of-Service vulnerability in Linksys Wrt54G 3.01.3/3.03.6/4.00.7
Linksys WRT54G router allows remote attackers to cause a denial of service (CPU consumption and server hang) via an HTTP POST request with a negative Content-Length value.
network
low complexity
linksys
5.0
2005-09-14 CVE-2005-2904 Remote Denial Of Service vulnerability in Zebedee 2.4.1
Zebedee 2.4.1, when "allowed redirection port" is not set, allows remote attackers to cause a denial of service (application crash) via a zero in the port number of the protocol option header, which triggers an assert error in the makeConnection function in zebedee.c.
network
low complexity
zebedee
5.0
2005-09-14 CVE-2005-2903 Remote Buffer Overflow vulnerability in Eset Software Nod32 Antivirus 2.5
Heap-based buffer overflow in NOD32 2.5 with nod32.002 1.033 build 1127, with active scanning enabled, allows remote attackers to execute arbitrary code via an ARJ archive containing a file with a long filename.
network
low complexity
eset-software
7.5