Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2005-05-02 CVE-2005-0522 Unspecified vulnerability in Lionmax Software Chat Anywhere 2.72A
Chat Anywhere 2.72a stores sensitive information such as passwords in plaintext in the .INI file for a chatroom, which allows local users to gain privileges.
local
low complexity
lionmax-software
4.6
2005-05-02 CVE-2005-0501 Remote Nickname Buffer Overrun vulnerability in Digipen Institute of Technology Bontago 1.1
Buffer overflow in Bontago 1.1 and earlier allows remote attackers to execute arbitrary code via a long nickname.
network
low complexity
digipen-institute-of-technology
7.5
2005-05-02 CVE-2005-0500 Unspecified vulnerability in Microsoft IE and Internet Explorer
Internet Explorer 6.0 on Windows XP SP2 allows remote attackers to spoof the domain name of a URL in a titlebar for a script-initiated popup window, which could facilitate phishing attacks.
network
low complexity
microsoft
5.0
2005-05-02 CVE-2005-0498 Information Disclosure vulnerability in Gigafast Router
Gigafast router (aka CompUSA router) allows remote attackers to gain sensitive information and bypass the login page via a direct request to backup.cfg, which reveals the administrator password in plaintext.
network
low complexity
gigafast-ethernet
7.5
2005-05-02 CVE-2005-0497 Local Security vulnerability in Elite System Max 9000
ADP Elite System Max 9000 allows remote authenticated users to gain privileges by uploading a .profile that sets the ADPROOT environment variable to the root directory.
local
low complexity
adp
7.2
2005-05-02 CVE-2005-0493 Security Bypass vulnerability in Biz Mail Form
CRLF injection vulnerability in bizmail.cgi in Biz Mail Form before 2.2 allows remote attackers to bypass the email check and send spam e-mail via CRLF sequences and forged mail headers in the email parameter.
network
low complexity
seth-m-knorr
5.0
2005-05-02 CVE-2005-0492 Improper Input Validation vulnerability in Adobe Acrobat Reader 6.0.3/7.0
Adobe Acrobat Reader 6.0.3 and 7.0.0 allows remote attackers to cause a denial of service (application crash) via a PDF file that contains a negative Count value in the root page node.
network
high complexity
adobe CWE-20
2.6
2005-05-02 CVE-2005-0491 Remote Stack-Based Buffer Overrun vulnerability in Knox Arkeia Type 77 Request
Stack-based buffer overflow in Knox Arkeia Server Backup 5.3.x allows remote attackers to execute arbitrary code via a long type 77 request.
network
low complexity
knox-software
critical
10.0
2005-05-02 CVE-2005-0490 Incorrect Calculation of Buffer Size vulnerability in Haxx Curl and Libcurl
Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.
network
low complexity
haxx CWE-131
8.8
2005-05-02 CVE-2005-0469 Remote Buffer Overflow vulnerability in Multiple Vendor Telnet Client LINEMODE Sub-Options
Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.
network
low complexity
ncsa
7.5