Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2005-05-02 CVE-2005-0044 Unspecified vulnerability in Microsoft products
The OLE component in Windows 98, 2000, XP, and Server 2003, and Exchange Server 5.0 through 2003, does not properly validate the lengths of messages for certain OLE data, which allows remote attackers to execute arbitrary code, aka the "Input Validation Vulnerability."
network
low complexity
microsoft
7.5
2005-05-02 CVE-2005-0043 Buffer Overflow vulnerability in Apple Itunes 4.7
Buffer overflow in Apple iTunes 4.7 allows remote attackers to execute arbitrary code via a long URL in (1) .m3u or (2) .pls playlist files.
network
low complexity
apple
7.5
2005-05-02 CVE-2005-0035 Information Disclosure vulnerability in Adobe Acrobat Reader ActiveX Control LoadFile
The Acrobat web control in Adobe Acrobat and Acrobat Reader 7.0 and earlier, when used with Internet Explorer, allows remote attackers to determine the existence of arbitrary files via the LoadFile ActiveX method.
network
high complexity
adobe
5.1
2005-05-02 CVE-2005-0034 Remote Denial Of Service vulnerability in ISC Bind 9.3.0
An "incorrect assumption" in the authvalidated validator function in BIND 9.3.0, when DNSSEC is enabled, allows remote attackers to cause a denial of service (named server exit) via crafted DNS packets that cause an internal consistency test (self-check) to fail.
network
isc
4.3
2005-05-02 CVE-2005-0033 Remote Buffer Overflow vulnerability in ISC Bind 8.4.4/8.4.5
Buffer overflow in the code for recursion and glue fetching in BIND 8.4.4 and 8.4.5 allows remote attackers to cause a denial of service (crash) via queries that trigger the overflow in the q_usedns array that tracks nameservers and addresses.
network
low complexity
isc
5.0
2005-05-02 CVE-2005-0022 Remote Buffer Overflow vulnerability in University of Cambridge Exim 4.41/4.42
Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
local
low complexity
university-of-cambridge
4.6
2005-05-02 CVE-2005-0021 Unspecified vulnerability in University of Cambridge Exim 4.41/4.42
Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
local
low complexity
university-of-cambridge
7.2
2005-05-02 CVE-2005-0018 Local Insecure Temporary File Creation vulnerability in F2C Open Source Project F2C Translator 3.1
The f2 shell script in the f2c package 3.1 allows local users to read arbitrary files via a symlink attack on temporary files.
local
low complexity
f2c-open-source-project
2.1
2005-05-02 CVE-2005-0017 Local Insecure Temporary File Creation vulnerability in F2C
The f2c translator in the f2c package 3.1 allows local users to read arbitrary files via a symlink attack on temporary files.
local
low complexity
f2c-open-source-project
2.1
2005-05-02 CVE-2005-0015 Unspecified vulnerability in Crosswire Bible Society Sword 1.5.7A
diatheke.pl in Sword 1.5.7a allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
network
low complexity
crosswire-bible-society
7.5