Vulnerabilities > Low

DATE CVE VULNERABILITY TITLE RISK
2005-05-02 CVE-2005-0492 Improper Input Validation vulnerability in Adobe Acrobat Reader 6.0.3/7.0
Adobe Acrobat Reader 6.0.3 and 7.0.0 allows remote attackers to cause a denial of service (application crash) via a PDF file that contains a negative Count value in the root page node.
network
high complexity
adobe CWE-20
2.6
2005-05-02 CVE-2005-0465 Unspecified vulnerability in SGI Irix
gr_osview in SGI IRIX does not drop privileges before opening files, which allows local users to overwrite arbitrary files via the -s option.
local
low complexity
sgi
2.1
2005-05-02 CVE-2005-0464 Unspecified vulnerability in SGI Irix 6.5.22
gr_osview in SGI IRIX 6.5.22, and possibly other 6.5 versions, does not drop privileges when opening description files while in debug mode, which allows local users to read a line from arbitrary files via the -d and -D options, which prints the line as a formatting error.
local
low complexity
sgi
2.1
2005-05-02 CVE-2005-0448 Local Race Condition Privilege Escalation vulnerability in Perl 'rmdir()'
Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to create arbitrary setuid binaries in the tree being deleted, a different vulnerability than CVE-2004-0452.
local
high complexity
larry-wall
1.2
2005-05-02 CVE-2005-0402 Unspecified vulnerability in Mozilla Firefox
Firefox before 1.0.2 allows remote attackers to execute arbitrary code by tricking a user into saving a page as a Firefox sidebar panel, then using the sidebar panel to inject Javascript into a privileged page.
network
high complexity
mozilla
2.6
2005-05-02 CVE-2005-0400 Unspecified vulnerability in Linux Kernel
The ext2_make_empty function call in the Linux kernel before 2.6.11.6 does not properly initialize memory when creating a block for a new directory entry, which allows local users to obtain potentially sensitive information by reading the block.
local
low complexity
linux
2.1
2005-05-02 CVE-2005-0396 Local Denial of Service vulnerability in KDE Dcopserver and Desktop Communication Protocol Daemon
Desktop Communication Protocol (DCOP) daemon, aka dcopserver, in KDE before 3.4 allows local users to cause a denial of service (dcopserver consumption) by "stalling the DCOP authentication process."
local
low complexity
kde
2.1
2005-05-02 CVE-2005-0387 Unspecified vulnerability in Remstats
remstats 1.0.13 and earlier, when processing uptime data, allows local users to create or overwrite arbitrary files via a symlink attack on temporary files.
local
low complexity
remstats
2.1
2005-05-02 CVE-2005-0365 Unspecified vulnerability in KDE 3.2.X/3.3.X
The dcopidlng script in KDE 3.2.x and 3.3.x creates temporary files with predictable filenames, which allows local users to overwrite arbitrary files via a symlink attack.
local
low complexity
kde
2.1
2005-05-02 CVE-2005-0348 Remote vulnerability in RealNetworks RealArcade
Directory traversal vulnerability in RealArcade 1.2.0.994 allows remote attackers to delete arbitrary files via an RGP file with a ..
network
high complexity
realnetworks
2.6