CVE-2005-2117
https://notcve.org/view.php?id=CVE-2005-2117
Web View in Windows Explorer on Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 does not properly handle certain HTML characters in preview fields, which allows remote user-assisted attackers to execute arbitrary code. • http://secunia.com/advisories/17168 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.securityfocus.com/bid/15064 http://www.us-cert.gov/cas/techalerts/TA05-284A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-049 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1291 •
CVE-2005-1985
https://notcve.org/view.php?id=CVE-2005-1985
The Client Service for NetWare (CSNW) on Microsoft Windows 2000 SP4, XP SP1 and Sp2, and Server 2003 SP1 and earlier, allows remote attackers to execute arbitrary code due to an "unchecked buffer" when processing certain crafted network messages. • http://secunia.com/advisories/17165 http://securitytracker.com/id?1015041 http://www.osvdb.org/19922 http://www.securityfocus.com/bid/15066 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-046 https://exchange.xforce.ibmcloud.com/vulnerabilities/21700 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1106 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1210 https://oval.cisecurity.org/repository/ •
CVE-2005-1987
https://notcve.org/view.php?id=CVE-2005-1987
Buffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string. • http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0289.html http://marc.info/?l=bugtraq&m=112915118302012&w=2 http://secunia.com/advisories/17167 http://securitytracker.com/id?1015038 http://securitytracker.com/id?1015039 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ907245 http://www.kb.cert.org/vuls/id/883460 http://www.osvdb.org/19905 http://www.securityfocus.com/bid/15067 http://www.us-cert.gov/cas/techalerts/TA05-284A.html https:/ • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2005-2122
https://notcve.org/view.php?id=CVE-2005-2122
Windows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote attackers to execute arbitrary commands via a shortcut (.lnk) file with long font properties that lead to a buffer overflow in the Client/Server Runtime Server Subsystem (CSRSS), a different vulnerability than CVE-2005-2118. • http://secunia.com/advisories/17168 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://securitytracker.com/id?1015040 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.argeniss.com/research/MSBugPaper.pdf http://www.kb.cert.org/vuls/id/922708 http://www.securityfocus.com/bid/15069 http://www.us-cert.gov/cas/techalerts/TA05-284A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-049 https:/ •
CVE-2005-2120 – Microsoft Windows Plug-and-Play - 'Umpnpmgr.dll' Denial of Service (MS05-047)
https://notcve.org/view.php?id=CVE-2005-2120
Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call. • https://www.exploit-db.com/exploits/1269 https://www.exploit-db.com/exploits/1271 http://secunia.com/advisories/17166 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://securityreason.com/securityalert/71 http://securitytracker.com/id?1015042 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.eeye.com/html/research/advisories/AD20051011c.html http://www.kb.cert.org/vuls/id/214572 http://www.osvdb.org/18830 http://ww •