Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2005-07-18 CVE-2005-1914 Unspecified vulnerability in Centericq
CenterICQ 4.20.0 and earlier creates temporary files with predictable file names, which allows local users to overwrite arbitrary files via a symlink attack on the gg.token.PID temporary file.
local
low complexity
centericq
2.1
2005-07-18 CVE-2005-1689 Double Free vulnerability in multiple products
Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to execute arbitrary code via certain error conditions.
network
low complexity
mit apple debian CWE-415
critical
9.8
2005-07-18 CVE-2005-1175 Remote Single Byte Heap Overflow vulnerability in MIT Kerberos 5 Key Distribution Center
Heap-based buffer overflow in the Key Distribution Center (KDC) in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a certain valid TCP or UDP request.
network
low complexity
mit
7.5
2005-07-18 CVE-2005-1174 Remote Denial of Service vulnerability in MIT Kerberos 5 Key Distribution Center
MIT Kerberos 5 (krb5) 1.3 through 1.4.1 Key Distribution Center (KDC) allows remote attackers to cause a denial of service (application crash) via a certain valid TCP connection that causes a free of unallocated memory.
network
low complexity
mit
5.0
2005-07-13 CVE-2005-2274 Unspecified vulnerability in Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."
network
high complexity
microsoft
2.6
2005-07-13 CVE-2005-2273 Unspecified vulnerability in Opera Browser
Opera 7.x and 8 before 8.01 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."
network
high complexity
opera
2.6
2005-07-13 CVE-2005-2272 Unspecified vulnerability in Apple Safari 2.0
Safari version 2.0 (412) does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."
network
high complexity
apple
2.6
2005-07-13 CVE-2005-2271 Remote Security vulnerability in Alexander Clauss Icab 2.9.8
iCab 2.9.8 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."
network
high complexity
alexander-clauss
2.6
2005-07-13 CVE-2005-2270 Unspecified vulnerability in Mozilla Firefox and Mozilla
Firefox before 1.0.5 and Mozilla before 1.7.9 does not properly clone base objects, which allows remote attackers to execute arbitrary code by navigating the prototype chain to reach a privileged object.
network
low complexity
mozilla
7.5
2005-07-13 CVE-2005-2269 Unspecified vulnerability in Mozilla Firefox and Mozilla
Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 does not properly verify the associated types of DOM node names within the context of their namespaces, which allows remote attackers to modify certain tag properties, possibly leading to execution of arbitrary script or code, as demonstrated using an XHTML document with IMG tags with custom properties ("XHTML node spoofing").
network
low complexity
mozilla
7.5