7.5
CVE-2005-0605
- EPSS 2.84%
- Published 02.03.2005 05:00:00
- Last modified 03.04.2025 01:03:51
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow.
Data is provided by the National Vulnerability Database (NVD)
Xfree86 Project ≫ X11r6 Version3.3
Xfree86 Project ≫ X11r6 Version3.3.2
Xfree86 Project ≫ X11r6 Version3.3.3
Xfree86 Project ≫ X11r6 Version3.3.4
Xfree86 Project ≫ X11r6 Version3.3.5
Xfree86 Project ≫ X11r6 Version3.3.6
Xfree86 Project ≫ X11r6 Version4.0
Xfree86 Project ≫ X11r6 Version4.0.1
Xfree86 Project ≫ X11r6 Version4.0.2.11
Xfree86 Project ≫ X11r6 Version4.0.3
Xfree86 Project ≫ X11r6 Version4.1.0
Xfree86 Project ≫ X11r6 Version4.1.11
Xfree86 Project ≫ X11r6 Version4.1.12
Xfree86 Project ≫ X11r6 Version4.2.0
Xfree86 Project ≫ X11r6 Version4.2.1
Xfree86 Project ≫ X11r6 Version4.2.1 Editionerrata
Xfree86 Project ≫ X11r6 Version4.3.0
Xfree86 Project ≫ X11r6 Version4.3.0.1
Xfree86 Project ≫ X11r6 Version4.3.0.2
Mandrakesoft ≫ Mandrake Linux Version10.0
Mandrakesoft ≫ Mandrake Linux Version10.0 Editionamd64
Mandrakesoft ≫ Mandrake Linux Version10.1
Mandrakesoft ≫ Mandrake Linux Version10.1 Editionx86_64
Mandrakesoft ≫ Mandrake Linux Version10.2
Mandrakesoft ≫ Mandrake Linux Version10.2 Editionx86_64
Mandrakesoft ≫ Mandrake Linux Corporate Server Version2.1
Mandrakesoft ≫ Mandrake Linux Corporate Server Version2.1 Editionx86_64
Mandrakesoft ≫ Mandrake Linux Corporate Server Version3.0
Mandrakesoft ≫ Mandrake Linux Corporate Server Version3.0 Editionx86_64
Redhat ≫ Enterprise Linux Version3.0 Editionadvanced_server
Redhat ≫ Enterprise Linux Version3.0 Editionenterprise_server
Redhat ≫ Enterprise Linux Version3.0 Editionworkstation_server
Redhat ≫ Enterprise Linux Version4.0 Editionadvanced_server
Redhat ≫ Enterprise Linux Version4.0 Editionenterprise_server
Redhat ≫ Enterprise Linux Version4.0 Editionworkstation
Redhat ≫ Enterprise Linux Desktop Version3.0
Redhat ≫ Enterprise Linux Desktop Version4.0
Redhat ≫ Fedora Core Versioncore_2.0
Redhat ≫ Fedora Core Versioncore_3.0
Suse ≫ Suse Linux Version6.1
Suse ≫ Suse Linux Version6.1 Updatealpha
Suse ≫ Suse Linux Version6.2
Suse ≫ Suse Linux Version6.3
Suse ≫ Suse Linux Version6.3 Editionppc
Suse ≫ Suse Linux Version6.3 Updatealpha
Suse ≫ Suse Linux Version6.4
Suse ≫ Suse Linux Version6.4 Editioni386
Suse ≫ Suse Linux Version6.4 Editionppc
Suse ≫ Suse Linux Version6.4 Updatealpha
Suse ≫ Suse Linux Version7.0
Suse ≫ Suse Linux Version7.0 Editioni386
Suse ≫ Suse Linux Version7.0 Editionppc
Suse ≫ Suse Linux Version7.0 Editionsparc
Suse ≫ Suse Linux Version7.0 Updatealpha
Suse ≫ Suse Linux Version7.1
Suse ≫ Suse Linux Version7.1 Editionspa
Suse ≫ Suse Linux Version7.1 Editionsparc
Suse ≫ Suse Linux Version7.1 Editionx86
Suse ≫ Suse Linux Version7.1 Updatealpha
Suse ≫ Suse Linux Version7.2
Suse ≫ Suse Linux Version7.2 Editioni386
Suse ≫ Suse Linux Version7.3
Suse ≫ Suse Linux Version7.3 Editioni386
Suse ≫ Suse Linux Version7.3 Editionppc
Suse ≫ Suse Linux Version7.3 Editionsparc
Suse ≫ Suse Linux Version8.0
Suse ≫ Suse Linux Version8.0 Editioni386
Suse ≫ Suse Linux Version8.1
Suse ≫ Suse Linux Version8.2
Suse ≫ Suse Linux Version9.0
Suse ≫ Suse Linux Version9.0 Editionx86_64
Suse ≫ Suse Linux Version9.1
Suse ≫ Suse Linux Version9.1 Editionx86_64
Suse ≫ Suse Linux Version9.2
Suse ≫ Suse Linux Version9.2 Editionx86_64
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 2.84% | 0.857 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|