CVE names Description
CVE-2005-0399 An exploit for a flaw where malicious GIF image could cause an oveflow. This issue is more serious in Thunderbird, where opening a malicious email could trigger this flaw. Attempts to exploit this flaw should however be caught by Exec-Shield.
CVE-2005-2871 An exploit for a flaw where a malcious web page could cause a heap overflow. The public exploit is designed for Windows platforms, exploiting this flaw on Linux would require different techniques. Attempts to exploit this flaw should be caught by Exec-Shield.
CVE-2005-1476, CVE-2005-1531, CVE-2005-2264, CVE-2005-1160, CVE-2005-1155, CVE-2005-1157 Several exploits for flaws where a malicious web page could run arbitrary javascript, doing things like changing home pages, stealing cookies, cross-site scripting, or creating files on the system.
CVE-2005-2262, CVE-2005-2269 Exploits for two overflow flaws that require the victim to use the 'set as wallpaper' option on a malicious image. Attempts to exploit this flaw should be caught by Exec-Shield.
CVE-2005-3120 An exploit for Lynx, an optional text-based web browser. The public exploit is a proof of concept only, and any attempts to exploit this flaw should be caught by Exec-Shield.

Table 5. Exploits for browser flaws

Close Window