9 results (0.006 seconds)

CVSS: 5.0EPSS: 3%CPEs: 33EXPL: 0

The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets. • http://secunia.com/advisories/14584 http://security.gentoo.org/glsa/glsa-200503-33.xml http://securitytracker.com/id?1013433 http://sourceforge.net/mailarchive/forum.php?thread_id=6787713&forum_id=32000 http://www.mandriva.com/security/advisories?name=MDKSA-2005:062 http://www.redhat.com/support/errata/RHSA-2005-232.html http://www.securityfocus.com/bid/12804 http://www.vupen.com/english/advisories/2005/0264 https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=109966&action=view •

CVSS: 7.5EPSS: 2%CPEs: 27EXPL: 3

Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values. • http://marc.info/?l=bugtraq&m=111038641832400&w=2 http://marc.info/?l=bugtraq&m=111083125521813&w=2 http://security.gentoo.org/glsa/glsa-200503-16.xml http://security.lss.hr/en/index.php?page=details&ID=LSS-2005-03-04 http://www.ethereal.com/appnotes/enpa-sa-00018.html http://www.mandriva.com/security/advisories?name=MDKSA-2005:053 http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html http://www.redhat.com/support/errata/RHSA-2005-306.html& •

CVSS: 5.1EPSS: 5%CPEs: 27EXPL: 0

Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message. • http://secunia.com/advisories/14491 http://securitytracker.com/id?1013376 http://sylpheed.good-day.net/changelog-devel.html.en http://sylpheed.good-day.net/changelog.html.en http://www.gentoo.org/security/en/glsa/glsa-200503-26.xml http://www.redhat.com/support/errata/RHSA-2005-303.html https://access.redhat.com/security/cve/CVE-2005-0667 https://bugzilla.redhat.com/show_bug.cgi?id=1617556 •

CVSS: 7.5EPSS: 1%CPEs: 56EXPL: 0

Multiple vulnerabilities in xli before 1.17 may allow remote attackers to execute arbitrary code via "buffer management errors" from certain image properties, some of which may be related to integer overflows in PPM files. • http://bugs.gentoo.org/show_bug.cgi?id=79762 http://secunia.com/advisories/14459 http://security.gentoo.org/glsa/glsa-200503-05.xml http://www.debian.org/security/2005/dsa-695 •

CVSS: 7.5EPSS: 1%CPEs: 82EXPL: 0

scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.5/SCOSA-2006.5.txt ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.57/SCOSA-2005.57.txt ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U http://bugs.gentoo.org/show_bug.cgi?id=83598 http://bugs.gentoo.org/show_bug.cgi?id=83655 http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html http://secunia.c •