Buffer overflow in Sysinternals Process Explorer 9.23, and other versions before 9.25, allows local users to execute arbitrary code via a long CompanyName field in the VersionInfo information in a running process.
Max CVSS
10.0
EPSS Score
0.07%
Published
2005-08-23
Updated
2008-09-05
Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets.
Max CVSS
10.0
EPSS Score
2.34%
Published
2005-08-23
Updated
2021-04-14

CVE-2005-2668

Public exploit
Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors.
Max CVSS
10.0
EPSS Score
95.17%
Published
2005-08-23
Updated
2021-04-14
lockmail in maildrop before 1.5.3 does not drop privileges before executing commands, which allows local users to gain privileges via command line arguments.
Max CVSS
10.0
EPSS Score
0.06%
Published
2005-08-30
Updated
2008-09-05
Unspecified vulnerability in Kismet before 2005-08-R1 allows remote attackers to have an unknown impact via unprintable characters in the SSID.
Max CVSS
10.0
EPSS Score
2.81%
Published
2005-08-19
Updated
2011-03-08

CVE-2005-2611

Public exploit
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
Max CVSS
10.0
EPSS Score
97.33%
Published
2005-08-17
Updated
2017-07-11
Parlano MindAlign 5.0 and later versions uses weak encryption, with unknown impact and attack vectors.
Max CVSS
10.0
EPSS Score
0.54%
Published
2005-08-17
Updated
2017-07-11
Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.
Max CVSS
10.0
EPSS Score
0.63%
Published
2005-08-10
Updated
2021-06-18
Unknown vulnerability in Mac OS X 10.4.2 and earlier, when using Kerberos authentication with LDAP, allows attackers to gain access to a root Terminal window.
Max CVSS
10.0
EPSS Score
0.20%
Published
2005-08-19
Updated
2008-09-05
Stack-based buffer overflow in Ares FileShare 1.1 allows remote attackers or local users to execute arbitrary code via a (1) long history parameter in the configuration file (ares.conf) or (2) long search string.
Max CVSS
10.0
EPSS Score
2.08%
Published
2005-08-03
Updated
2017-07-11
flsearch.pl in FtpLocate 2.02 allows remote attackers to execute arbitrary commands via shell metacharacters in an HTTP GET request.
Max CVSS
10.0
EPSS Score
9.89%
Published
2005-08-03
Updated
2017-07-11
Buffer overflow in the AIM and ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an away message with a large number of AIM substitution strings, such as %t or %n.
Max CVSS
9.8
EPSS Score
20.27%
Published
2005-08-16
Updated
2024-02-02
Symantec AntiVirus 9 Corporate Edition allows local users to gain privileges via the "Scan for viruses" option, which launches a help window with raised privileges, a re-introduction of a vulnerability that was originally identified and addressed by CVE-2002-1540.
Max CVSS
10.0
EPSS Score
0.04%
Published
2005-08-30
Updated
2008-09-05

CVE-2005-1983

Public exploit
Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by the Zotob (aka Mytob) worm.
Max CVSS
10.0
EPSS Score
97.52%
Published
2005-08-10
Updated
2018-10-12
14 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!