5 results (0.008 seconds)

CVSS: 5.0EPSS: 1%CPEs: 24EXPL: 0

typespeed before 0.6.4 allows remote attackers to cause a denial of service (application crash) via unspecified network behavior that triggers a divide-by-zero error. typespeed anterior a 0.6.4 permite a atacantes remotos provocar denegación de servicio (caida de aplicación) a través de una red de comportamiento no especificado que dispara error de división por cero. • http://secunia.com/advisories/27905 http://tobias.eyedacor.org/typespeed/#News http://tobias.eyedacor.org/typespeed/ChangeLog http://www.securityfocus.com/bid/26671 https://exchange.xforce.ibmcloud.com/vulnerabilities/38807 • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 15%CPEs: 12EXPL: 0

Buffer overflow in the addnewword function in typespeed 0.4.4 and earlier might allow remote attackers to execute arbitrary code via unknown vectors. • http://secunia.com/advisories/20379 http://secunia.com/advisories/20393 http://secunia.com/advisories/20708 http://www.debian.org/security/2006/dsa-1084 http://www.gentoo.org/security/en/glsa/glsa-200606-20.xml http://www.securityfocus.com/bid/18194 http://www.vupen.com/english/advisories/2006/2087 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

Unknown vulnerability in typespeed 0.4.1 and earlier allows local users to gain privileges. • https://www.exploit-db.com/exploits/25106 http://www.debian.org/security/2005/dsa-684 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

Buffer overflow in net_swapscore for typespeed 0.4.1 and earlier allows remote attackers to execute arbitrary code. Desbordamiento de búfer en net_swapscore para typespeed 0.4.1 y versiones anteriores, permite a atacantes remotos la ejecución arbitraria de código. • http://marc.info/?l=bugtraq&m=105553002105111&w=2 http://www.debian.org/security/2003/dsa-322 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in typespeed 0.4.2 and earlier allows local users to gain privileges via long input. Desbordamiento de búfer en typespeed 0.4.2 y anteriores permite a usuarios locales ganar privilegios mediante una entrada larga. • http://www.debian.org/security/2002/dsa-217 http://www.securityfocus.com/bid/6485 https://exchange.xforce.ibmcloud.com/vulnerabilities/10936 •