CVE
stringlengths 13
16
| Description
stringlengths 20
3.95k
| KeyPhrases
stringlengths 2
343
|
---|---|---|
CVE-2004-2759
|
Shared Sun StorEdge QFS and SAM-QFS file systems, as used in Utilization Suite 4.0 through 4.1 and Performance Suite 4.0 through 4.1, might allow local users to read portions of deleted files by accessing data within sparse files.
|
['read portions of deleted files by accessing data']
|
CVE-2004-2760
|
sshd in OpenSSH 3.5p1, when PermitRootLogin is disabled, immediately closes the TCP connection after a root login attempt with the correct password, but leaves the connection open after an attempt with an incorrect password, which makes it easier for remote attackers to guess the password by observing the connection state, a different vulnerability than CVE-2003-0190. NOTE: it could be argued that in most environments, this does not cross privilege boundaries without requiring leverage of a separate vulnerability.
|
['permitrootlogin']
|
CVE-2004-2761
|
The MD5 Message-Digest Algorithm is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of MD5 in the signature algorithm of an X.509 certificate.
|
['collision resistant', 'spoofing']
|
CVE-2004-2762
|
The server in IBM Tivoli Storage Manager (TSM) 4.2.x on MVS, 5.1.9.x before 5.1.9.1, 5.1.x before 5.1.10, 5.2.2.x before 5.2.2.3, 5.2.x before 5.2.3, 5.3.x before 5.3.0, and 6.x before 6.1, when the HTTP communication method is enabled, allows remote attackers to cause a denial of service (daemon crash or hang) via unspecified HTTP traffic, as demonstrated by the IBM port scanner 1.3.1.
|
['denial of service (daemon crash or hang)', 'cause a denial of service (daemon crash', 'unspecified']
|
CVE-2004-2763
|
The default configuration of Sun ONE/iPlanet Web Server 4.1 SP1 through SP12 and 6.0 SP1 through SP5 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.
|
['steal information using cross-site tracing (', 'cross-site tracing (xst)', 'cross-site scripting']
|
CVE-2004-2764
|
Sun SDK and Java Runtime Environment (JRE) 1.4.2 through 1.4.2_04, 1.4.1 through 1.4.1_07, and 1.4.0 through 1.4.0_04 allows untrusted applets and unprivileged servlets to gain privileges and read data from other applets via unspecified vectors related to classes in the XSLT processor, aka "XML sniffing."
|
['gain privileges', 'gain privileges and read data from other applets', 'unspecified vectors', 'xml sniffing']
|
CVE-2004-2765
|
Cross-site scripting (XSS) vulnerability in Webmail in Sun ONE Messaging Server 6.1 and iPlanet Messaging Server 5.2 before 5.2hf2.02, when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via a crafted e-mail message, a different vulnerability than CVE-2005-2022 and CVE-2006-5486.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via a', 'cross-site scripting (xss)']
|
CVE-2004-2766
|
Webmail in Sun ONE Messaging Server 6.1 and iPlanet Messaging Server 5.2 before 5.2hf2.02 allows remote attackers to obtain unspecified "access" to e-mail via a crafted e-mail message, related to a "session hijacking" issue, a different vulnerability than CVE-2005-2022 and CVE-2006-5486.
|
['obtain unspecified "access', 'obtain unspecified "access" to e-', 'session hijacking']
|
CVE-2004-2767
|
NWFTPD.nlm before 5.04.25 in the FTP server in Novell NetWare does not promptly close DS sessions, which allows remote attackers to cause a denial of service (connection slot exhaustion) by establishing many FTP sessions that persist for the lifetime of a DS session.
|
['denial of service (connection slot exhaustion)', 'cause a denial of service (connection slot']
|
CVE-2004-2768
|
dpkg 1.9.21 does not properly reset the metadata of a file during replacement of the file in a package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid file, (2) setgid file, or (3) device, a related issue to CVE-2010-2059.
|
['gain privileges', 'gain privileges by creating a hard link to', 'setuid file', 'setgid file']
|
CVE-2004-2769
|
Cerberus FTP Server before 4.0.3.0 allows remote authenticated users to list hidden files, even when the "Display hidden files" option is enabled, via the (1) MLSD or (2) MLST commands.
|
['list hidden files']
|
CVE-2004-2771
|
The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.
|
['execute arbitrary commands', 'execute arbitrary commands via shell metacharacters in an']
|
CVE-2004-2776
|
go.cgi in GoScript 2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) query string or (2) artarchive parameter.
|
['execute arbitrary commands', 'execute arbitrary commands via shell metacharacters in the']
|
CVE-2004-2777
|
GE Healthcare Centricity Image Vault 3.x has a password of (1) gemnet for the administrator account, (2) webadmin for the webadmin administrator account of the ASACA DVD library, (3) an empty value for the gemsservice account of the Ultrasound Database, and possibly (4) gemnet2002 for the gemnet2002 account of the GEMNet license server, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value.
|
['unspecified impact', 'hardcoded']
|
CVE-2004-2778
|
Ebuild in Gentoo may change directory and file permissions depending on the order of installed packages, which allows local users to read or write to restricted directories or execute restricted commands via navigating to the affected directories, or executing the affected commands.
|
['read or write to restricted directories or execute']
|
CVE-2004-2779
|
id3_utf16_deserialize() in utf16.c in libid3tag through 0.15.1b misparses ID3v2 tags encoded in UTF-16 with an odd number of bytes, triggering an endless loop allocating memory until an OOM condition is reached, leading to denial-of-service (DoS).
|
['oom condition', 'denial-of-service (dos)', 'denial of service']
|
CVE-2005-0001
|
Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.
|
['execute arbitrary code', 'execute arbitrary code via concurrent threads that share', 'race condition']
|
CVE-2005-0002
|
poppassd_pam 1.0 and earlier, when changing a user password, does not verify that the user entered the old password correctly, which allows remote attackers to change passwords for arbitrary users.
|
['change passwords for arbitrary users']
|
CVE-2005-0003
|
The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.
|
['execute arbitrary code', 'denial of service (system crash)', 'cause a denial of service (system crash', 'overlapping vma (virtual memory address) allocations']
|
CVE-2005-0004
|
The mysqlaccess script in MySQL 4.0.23 and earlier, 4.1.x before 4.1.10, 5.0.x before 5.0.3, and other versions including 3.x, allows local users to overwrite arbitrary files or read temporary files via a symlink attack on temporary files.
|
['overwrite arbitrary files', 'overwrite arbitrary files or read temporary files via', 'symlink', 'arbitrary file read']
|
CVE-2005-0005
|
Heap-based buffer overflow in psd.c for ImageMagick 6.1.0, 6.1.7, and possibly earlier versions allows remote attackers to execute arbitrary code via a .PSD image file with a large number of layers.
|
['execute arbitrary code', 'execute arbitrary code via a .PSD image file', 'heap-based buffer overflow', 'heap based buffer overflow']
|
CVE-2005-0006
|
The COPS dissector in Ethereal 0.10.6 through 0.10.8 allows remote attackers to cause a denial of service (infinite loop).
|
['denial of service (infinite loop)', 'cause a denial of service (infinite loop', 'cops dissector']
|
CVE-2005-0007
|
Unknown vulnerability in the DLSw dissector in Ethereal 0.10.6 through 0.10.8 allows remote attackers to cause a denial of service (application crash from assertion).
|
['denial of service (application crash from assertion)', 'cause a denial of service (application crash', 'unknown']
|
CVE-2005-0008
|
Unknown vulnerability in the DNP dissector in Ethereal 0.10.5 through 0.10.8 allows remote attackers to cause "memory corruption."
|
['cause "memory corruption', 'unknown']
|
CVE-2005-0009
|
Unknown vulnerability in the Gnutella dissector in Ethereal 0.10.6 through 0.10.8 allows remote attackers to cause a denial of service (application crash).
|
['denial of service (application crash)', 'cause a denial of service (application crash', 'unknown']
|
CVE-2005-0010
|
Unknown vulnerability in the MMSE dissector in Ethereal 0.10.4 through 0.10.8 allows remote attackers to cause a denial of service by triggering a free of statically allocated memory.
|
['cause a denial of service by triggering a', 'unknown']
|
CVE-2005-0011
|
Multiple vulnerabilities in fliccd, when installed setuid root as part of the kdeedu Kstars support for Instrument Neutral Distributed Interface (INDI) in KDE 3.3 to 3.3.2, allow local users and remote attackers to execute arbitrary code via stack-based buffer overflows.
|
['execute arbitrary code', 'execute arbitrary code via stack-based buffer', 'stack-based buffer overflows', 'stack based buffer overflow']
|
CVE-2005-0012
|
Format string vulnerability in the a_Interface_msg function in Dillo before 0.8.3-r4 allows remote attackers to execute arbitrary code via format string specifiers in a web page.
|
['execute arbitrary code', 'execute arbitrary code via format string specifiers in']
|
CVE-2005-0013
|
nwclient.c in ncpfs before 2.2.6 does not drop root privileges before executing utilities using the NetWare client functions, which allows local users to gain privileges.
|
['gain privileges', 'root privilege']
|
CVE-2005-0014
|
Buffer overflow in ncplogin in ncpfs before 2.2.6 allows remote malicious NetWare servers to execute arbitrary code on the NetWare client.
|
['execute arbitrary code', 'execute arbitrary code on the NetWare client', 'buffer overflow']
|
CVE-2005-0015
|
diatheke.pl in Sword 1.5.7a allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
|
['execute arbitrary commands', 'execute arbitrary commands via shell metacharacters in a']
|
CVE-2005-0016
|
Buffer overflow in the exported_display function in xatitv in gatos before 0.0.5 allows local users to execute arbitrary code.
|
['execute arbitrary code', 'buffer overflow']
|
CVE-2005-0017
|
The f2c translator in the f2c package 3.1 allows local users to read arbitrary files via a symlink attack on temporary files.
|
['read arbitrary files', 'read arbitrary files via a symlink attack on']
|
CVE-2005-0018
|
The f2 shell script in the f2c package 3.1 allows local users to read arbitrary files via a symlink attack on temporary files.
|
['read arbitrary files', 'read arbitrary files via a symlink attack on']
|
CVE-2005-0019
|
Unknown vulnerability in hztty 2.0 and earlier allows local users to execute arbitrary commands.
|
['execute arbitrary commands', 'unknown']
|
CVE-2005-0020
|
Buffer overflow in playmidi before 2.4 allows local users to execute arbitrary code.
|
['execute arbitrary code', 'buffer overflow']
|
CVE-2005-0021
|
Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
|
['execute arbitrary code', 'execute arbitrary code via (1) an', 'buffer overflows']
|
CVE-2005-0022
|
Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
|
['execute arbitrary code', 'execute arbitrary code during SPA authentication', 'buffer overflow']
|
CVE-2005-0023
|
gnome-pty-helper in GNOME libzvt2 and libvte4 allows local users to spoof the logon hostname via a modified DISPLAY environment variable. NOTE: the severity of this issue has been disputed.
|
['spoof the logon hostname via a modified DISPLAY', 'severity of this issue', 'spoofing']
|
CVE-2005-0033
|
Buffer overflow in the code for recursion and glue fetching in BIND 8.4.4 and 8.4.5 allows remote attackers to cause a denial of service (crash) via queries that trigger the overflow in the q_usedns array that tracks nameservers and addresses.
|
['denial of service (crash)', 'cause a denial of service (crash)', 'buffer overflow']
|
CVE-2005-0034
|
An "incorrect assumption" in the authvalidated validator function in BIND 9.3.0, when DNSSEC is enabled, allows remote attackers to cause a denial of service (named server exit) via crafted DNS packets that cause an internal consistency test (self-check) to fail.
|
['denial of service (named server exit)', 'cause a denial of service (named server']
|
CVE-2005-0035
|
The Acrobat web control in Adobe Acrobat and Acrobat Reader 7.0 and earlier, when used with Internet Explorer, allows remote attackers to determine the existence of arbitrary files via the LoadFile ActiveX method.
|
['determine the existence of arbitrary files via the']
|
CVE-2005-0036
|
The DNS implementation in DeleGate 8.10.2 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.
|
['cause a denial of service via a compressed', 'incorrect offset', 'infinite loop']
|
CVE-2005-0037
|
The DNS implementation of DNRD before 2.10 allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.
|
['cause a denial of service via a compressed', 'incorrect offset', 'infinite loop']
|
CVE-2005-0038
|
The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.
|
['cause a denial of service via a compressed', 'incorrect offset', 'infinite loop']
|
CVE-2005-0039
|
Certain configurations of IPsec, when using Encapsulating Security Payload (ESP) in tunnel mode, integrity protection at a higher layer, or Authentication Header (AH), allow remote attackers to decrypt IPSec communications by modifying the outer packet in ways that cause plaintext data from the inner packet to be returned in ICMP messages, as demonstrated using bit-flipping attacks and (1) Destination Address Rewriting, (2) a modified header length that causes portions of the packet to be interpreted as IP Options, or (3) a modified protocol field and source address.
|
['decrypt IPSec communications by modifying the outer packet', 'bit-flipping', 'destination address rewriting', 'modified header length', 'integrity']
|
CVE-2005-0040
|
Multiple cross-site scripting (XSS) vulnerabilities in DotNetNuke before 3.0.12 allow remote attackers to inject arbitrary web script or HTML via the (1) register a new user page, (2) User-Agent, or (3) Username, which is not properly quoted before sending to the error log.
|
['inject arbitrary web script or HTML', 'inject arbitrary web script or HTML via the', 'cross-site scripting (xss)']
|
CVE-2005-0043
|
Buffer overflow in Apple iTunes 4.7 allows remote attackers to execute arbitrary code via a long URL in (1) .m3u or (2) .pls playlist files.
|
['execute arbitrary code', 'execute arbitrary code via a long URL in', 'buffer overflow']
|
CVE-2005-0044
|
The OLE component in Windows 98, 2000, XP, and Server 2003, and Exchange Server 5.0 through 2003, does not properly validate the lengths of messages for certain OLE data, which allows remote attackers to execute arbitrary code, aka the "Input Validation Vulnerability."
|
['execute arbitrary code', 'input validation']
|
CVE-2005-0045
|
The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields.
|
['execute arbitrary code', 'execute arbitrary code via Transaction responses containing (', 'server message block']
|
CVE-2005-0047
|
Windows 2000, XP, and Server 2003 does not properly "validate the use of memory regions" for COM structured storage files, which allows attackers to execute arbitrary code, aka the "COM Structured Storage Vulnerability."
|
['execute arbitrary code', 'com structured storage']
|
CVE-2005-0048
|
Microsoft Windows XP SP2 and earlier, 2000 SP3 and SP4, Server 2003, and older operating systems allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IP packets with malformed options, aka the "IP Validation Vulnerability."
|
['execute arbitrary code', 'cause a denial of service and possibly execute', 'ip validation']
|
CVE-2005-0049
|
Windows SharePoint Services and SharePoint Team Services for Windows Server 2003 does not properly validate an HTTP redirection query, which allows remote attackers to inject arbitrary HTML and web script via a cross-site scripting (XSS) attack, or to spoof the web cache.
|
['inject arbitrary HTML', 'inject arbitrary HTML and web script via a', 'http redirection query', 'cross-site scripting (xss)', 'spoofing']
|
CVE-2005-0050
|
The License Logging service for Windows NT Server, Windows 2000 Server, and Windows Server 2003 does not properly validate the length of messages, which leads to an "unchecked buffer" and allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, aka the "License Logging Service Vulnerability."
|
['execute arbitrary code', 'denial of service (crash)', 'cause a denial of service (crash)', 'unchecked buffer', 'license logging service']
|
CVE-2005-0051
|
The Server service (srvsvc.dll) in Windows XP SP1 and SP2 allows remote attackers to obtain sensitive information (users who are accessing resources) via an anonymous logon using a named pipe, which is not properly authenticated, aka the "Named Pipe Vulnerability."
|
['obtain sensitive information', 'obtain sensitive information (users who are accessing', 'anonymous logon', 'named pipe']
|
CVE-2005-0053
|
Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via drag and drop events, aka the "Drag-and-Drop Vulnerability."
|
['execute arbitrary code', 'execute arbitrary code via drag and drop events', 'drag-and-drop']
|
CVE-2005-0054
|
Internet Explorer 5.01, 5.5, and 6 allows remote attackers to spoof a less restrictive security zone and execute arbitrary code via an HTML page containing URLs that contain hostnames that have been double hex encoded, which are decoded twice to generate a malicious hostname, aka the "URL Decoding Zone Spoofing Vulnerability."
|
['execute arbitrary code', 'spoof a less restrictive security zone and execute', 'url decoding zone spoofing']
|
CVE-2005-0055
|
Internet Explorer 5.01, 5.5, and 6 does not properly validate buffers when handling certain DHTML methods including the createControlRange Javascript function, which allows remote attackers to execute arbitrary code, aka the "DHTML Method Heap Memory Corruption Vulnerability."
|
['execute arbitrary code', 'dhtml method heap memory corruption']
|
CVE-2005-0056
|
Internet Explorer 5.01, 5.5, and 6 does not properly validate certain URLs in Channel Definition Format (CDF) files, which allows remote attackers to obtain sensitive information or execute arbitrary code, aka the "Channel Definition Format (CDF) Cross Domain Vulnerability."
|
['execute arbitrary code', 'obtain sensitive information', 'obtain sensitive information or execute arbitrary code', 'cross domain']
|
CVE-2005-0057
|
The Hyperlink Object Library for Windows 98, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a crafted link that triggers an "unchecked buffer" in the library, possibly due to a buffer overflow.
|
['execute arbitrary code', 'execute arbitrary code via a crafted link that', 'unchecked buffer', 'buffer overflow']
|
CVE-2005-0058
|
Buffer overflow in the Telephony Application Programming Interface (TAPI) for Microsoft Windows 98, Windows 98 SE, Windows ME, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to elevate privileges or execute arbitrary code via a crafted message.
|
['execute arbitrary code', 'elevate privileges or execute arbitrary code via a', 'buffer overflow']
|
CVE-2005-0059
|
Buffer overflow in the Message Queuing component of Microsoft Windows 2000 and Windows XP SP1 allows remote attackers to execute arbitrary code via a crafted message.
|
['execute arbitrary code', 'execute arbitrary code via a crafted message', 'buffer overflow']
|
CVE-2005-0060
|
Buffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application.
|
['gain privileges', 'gain privileges via a specially-designed application', 'buffer overflow']
|
CVE-2005-0061
|
The kernel of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via certain access requests.
|
['gain privileges', 'gain privileges via certain access requests']
|
CVE-2005-0063
|
The document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.
|
['execute arbitrary code', 'execute arbitrary code by modifying the CLSID stored', 'clsid']
|
CVE-2005-0064
|
Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.
|
['execute arbitrary code', 'execute arbitrary code via a PDF file with', 'buffer overflow']
|
CVE-2005-0065
|
The original design of TCP does not check that the TCP sequence number in an ICMP error message is within the range of sequence numbers for data that has been sent but not acknowledged (aka "TCP sequence number checking"), which makes it easier for attackers to forge ICMP error messages for specific TCP connections and cause a denial of service, as demonstrated using (1) blind connection-reset attacks with forged "Destination Unreachable" messages, (2) blind throughput-reduction attacks with forged "Source Quench" messages, or (3) blind throughput-reduction attacks with forged ICMP messages that cause the Path MTU to be reduced. NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
|
['icmp error message', 'denial of service', 'blind connection-reset', 'blind throughput-reduction']
|
CVE-2005-0066
|
The original design of TCP does not check that the TCP Acknowledgement number in an ICMP error message generated by an intermediate router is within the range of possible values for data that has already been acknowledged (aka "TCP acknowledgement number checking"), which makes it easier for attackers to forge ICMP error messages for specific TCP connections and cause a denial of service, as demonstrated using (1) blind connection-reset attacks with forged "Destination Unreachable" messages, (2) blind throughput-reduction attacks with forged "Source Quench" messages, or (3) blind throughput-reduction attacks with forged ICMP messages that cause the Path MTU to be reduced. NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
|
['icmp error message', 'denial of service', 'blind connection-reset', 'blind throughput-reduction']
|
CVE-2005-0067
|
The original design of TCP does not require that port numbers be assigned randomly (aka "Port randomization"), which makes it easier for attackers to forge ICMP error messages for specific TCP connections and cause a denial of service, as demonstrated using (1) blind connection-reset attacks with forged "Destination Unreachable" messages, (2) blind throughput-reduction attacks with forged "Source Quench" messages, or (3) blind throughput-reduction attacks with forged ICMP messages that cause the Path MTU to be reduced. NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
|
['icmp error messages', 'denial of service', 'blind connection-reset', 'blind throughput-reduction']
|
CVE-2005-0068
|
The original design of ICMP does not require authentication for host-generated ICMP error messages, which makes it easier for attackers to forge ICMP error messages for specific TCP connections and cause a denial of service, as demonstrated using (1) blind connection-reset attacks with forged "Destination Unreachable" messages, (2) blind throughput-reduction attacks with forged "Source Quench" messages, or (3) blind throughput-reduction attacks with forged ICMP messages that cause the Path MTU to be reduced. NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
|
['host-generated icmp error messages', 'denial of service', 'blind connection-reset', 'blind throughput-reduction']
|
CVE-2005-0069
|
The (1) tcltags or (2) vimspell.sh scripts in vim 6.3 allow local users to overwrite or create arbitrary files via a symlink attack on temporary files.
|
['create arbitrary files', 'overwrite or create arbitrary files via a symlink', 'tcltags']
|
CVE-2005-0070
|
Synaesthesia 2.1 and earlier, and possibly other versions, when installed setuid root, does not drop privileges before processing configuration and mixer files, which allows local users to read arbitrary files.
|
['read arbitrary files', 'setuid root']
|
CVE-2005-0071
|
vdr before 1.2.6 does not securely create files, which allows attackers to overwrite arbitrary files.
|
['overwrite arbitrary files']
|
CVE-2005-0072
|
zhcon before 0.2 does not drop privileges before reading a user configuration file, which allows local users to read arbitrary files.
|
['read arbitrary files']
|
CVE-2005-0073
|
Buffer overflow in queue.c in a support script for sympa 3.3.3, when running setuid, allows local users to execute arbitrary code.
|
['execute arbitrary code', 'buffer overflow']
|
CVE-2005-0074
|
Buffer overflow in pcdsvgaview in xpcd 2.08 allows local users to execute arbitrary code.
|
['execute arbitrary code', 'buffer overflow']
|
CVE-2005-0075
|
prefs.php in SquirrelMail before 1.4.4, with register_globals enabled, allows remote attackers to inject local code into the SquirrelMail code via custom preference handlers.
|
['inject local code into the SquirrelMail code via', 'register_globals']
|
CVE-2005-0076
|
Multiple buffer overflows in the XView library 3.2 may allow local users to execute arbitrary code via setuid applications that use the library.
|
['execute arbitrary code', 'execute arbitrary code via setuid applications that use', 'buffer overflows']
|
CVE-2005-0077
|
The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.
|
['overwrite arbitrary files', 'overwrite arbitrary files via a symlink attack on']
|
CVE-2005-0078
|
The KDE screen saver in KDE before 3.0.5 does not properly check the return value from a certain function call, which allows attackers with physical access to cause a crash and access the desktop session.
|
['cause a crash and access the desktop session', 'return value']
|
CVE-2005-0079
|
Buffer overflow in xtrlock 2.0 allows local users to cause a denial of service (application crash) and hijack the desktop session.
|
['denial of service (application crash)', 'cause a denial of service (application crash', 'buffer overflow', 'hijack']
|
CVE-2005-0080
|
The 55_options_traceback.dpatch patch for mailman 2.1.5 in Ubuntu 4.10 displays a different error message depending on whether the e-mail address is subscribed to a private list, which allows remote attackers to determine the list membership for a given e-mail address.
|
['determine the list membership for a given e']
|
CVE-2005-0081
|
MySQL MaxDB 7.5.0.0, and other versions before 7.5.0.21, allows remote attackers to cause a denial of service (crash) via an HTTP request with invalid headers.
|
['denial of service (crash)', 'cause a denial of service (crash)', 'invalid headers']
|
CVE-2005-0082
|
The sapdbwa_GetUserData function in MySQL MaxDB 7.5.0.0, and other versions before 7.5.0.21, allows remote attackers to cause a denial of service (crash) via invalid parameters to the WebDAV handler code, which triggers a null dereference that causes the SAP DB Web Agent to crash.
|
['denial of service (crash)', 'cause a denial of service (crash)', 'invalid parameters', 'null dereference']
|
CVE-2005-0083
|
MySQL MaxDB 7.5.00 for Windows, and possibly earlier versions and other platforms, allows remote attackers to cause a denial of service (application crash) via invalid parameters to the (1) DBMCli_String::ReallocString, (2) DBMCli_String::operator, (3) DBMCli_Buffer::ForceResize, (4) DBMCli_Wizard::InstallDatabase, (5) DBMCli_Devspaces::Complete, (6) DBMWeb_TemplateWizard::askForWriteCountStep5, or (7) DBMWeb_DBMWeb::wizardDB functions, which triggers a null dereference.
|
['denial of service (application crash)', 'cause a denial of service (application crash', 'invalid parameters', 'null dereference']
|
CVE-2005-0084
|
Buffer overflow in the X11 dissector in Ethereal 0.8.10 through 0.10.8 allows remote attackers to execute arbitrary code via a crafted packet.
|
['execute arbitrary code', 'execute arbitrary code via a crafted packet', 'buffer overflow']
|
CVE-2005-0085
|
Cross-site scripting (XSS) vulnerability in ht://dig (htdig) before 3.1.6-r7 allows remote attackers to execute arbitrary web script or HTML via the config parameter, which is not properly sanitized before it is displayed in an error message.
|
['execute arbitrary web script or HTML', 'execute arbitrary web script or HTML via the', 'cross-site scripting (xss)']
|
CVE-2005-0086
|
Heap-based buffer overflow in less in Red Hat Enterprise Linux 3 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted file, as demonstrated using the UTF-8 locale.
|
['execute arbitrary code', 'denial of service (application crash)', 'cause a denial of service (application crash', 'heap-based buffer overflow', 'heap based buffer overflow']
|
CVE-2005-0087
|
The alsa-lib package in Red Hat Linux 4 disables stack protection for the libasound.so library, which makes it easier for attackers to execute arbitrary code if there are other vulnerabilities in the library.
|
['execute arbitrary code']
|
CVE-2005-0088
|
The publisher handler for mod_python 2.7.8 and earlier allows remote attackers to obtain access to restricted objects via a crafted URL.
|
['obtain access', 'obtain access to restricted objects via a crafted']
|
CVE-2005-0089
|
The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
|
['execute arbitrary code', 'read or modify globals of the associated module', 'dotted attributes']
|
CVE-2005-0090
|
A regression error in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch omits an "access check," which allows local users to cause a denial of service (crash).
|
['denial of service (crash)', 'cause a denial of service (crash)', 'access check']
|
CVE-2005-0091
|
Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when using the hugemem kernel, allows local users to read and write to arbitrary kernel memory and gain privileges via certain syscalls.
|
['gain privileges', 'read and write to arbitrary kernel memory and', 'unknown']
|
CVE-2005-0092
|
Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when running on x86 with the hugemem kernel, allows local users to cause a denial of service (crash).
|
['denial of service (crash)', 'cause a denial of service (crash)', 'unknown']
|
CVE-2005-0094
|
Buffer overflow in the gopherToHTML function in the Gopher reply parser for Squid 2.5.STABLE7 and earlier allows remote malicious Gopher servers to cause a denial of service (crash) via crafted responses.
|
['denial of service (crash)', 'cause a denial of service (crash)', 'buffer overflow']
|
CVE-2005-0095
|
The WCCP message parsing code in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via malformed WCCP messages with source addresses that are spoofed to reference Squid's home router and invalid WCCP_I_SEE_YOU cache numbers.
|
['denial of service (crash)', 'cause a denial of service (crash)', 'malformed wccp messages', 'invalid wccp_i_see_you cache numbers', 'spoofing']
|
CVE-2005-0096
|
Memory leak in the NTLM fakeauth_auth helper for Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (memory consumption).
|
['denial of service (memory consumption)', 'cause a denial of service (memory consumption', 'memory leak']
|
CVE-2005-0097
|
The NTLM component in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via a malformed NTLM type 3 message that triggers a NULL dereference.
|
['denial of service (crash)', 'cause a denial of service (crash)', 'null dereference']
|
CVE-2005-0098
|
Multiple buffer overflows in the SDL port of abuse (abuse-SDL) before 2.00 allow local users to execute arbitrary code via the command line.
|
['execute arbitrary code', 'execute arbitrary code via the command line', 'buffer overflows']
|
CVE-2005-0099
|
The SDL port of abuse (abuse-SDL) before 2.00 does not properly drop privileges before creating certain files, which allows local users to create or overwrite arbitrary files.
|
['overwrite arbitrary files', 'create or overwrite arbitrary files', 'sdl port of abuse']
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.