10 results (0.007 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Buffer overflow in the processLine function in maptemplate.c in MapServer before 4.10.3 allows attackers to cause a denial of service and possibly execute arbitrary code via a mapfile with a long layer name, group name, or metadata entry name. Desbordamiento del buffer en la función processLine en maptemplate.c en MapServer en versiones anteriores a 4.10.3 permite a atacantes remotos provocar una caída de servicio y posiblemente ejecutar un código arbitrario a través de un mapfile con un nombre largo de capa, nombre de grupo o nombre de entrada metadata largos. • http://mapserver.gis.umn.edu/download/current/HISTORY.TXT http://secunia.com/advisories/26561 http://secunia.com/advisories/26718 http://secunia.com/advisories/29688 http://securityreason.com/securityalert/3082 http://trac.osgeo.org/mapserver/ticket/2252 http://www.debian.org/security/2008/dsa-1539 http://www.securityfocus.com/bid/25582 http://www.vupen.com/english/advisories/2007/2974 https://bugzilla.redhat.com/show_bug.cgi?id=272081 https://www.redhat.com/archives/fedo • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in MapServer before 4.10.3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving the (1) processLine function in maptemplate.c and the (2) writeError function in mapserv.c in the mapserv CGI program. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en MapServer anterior a 4.10.3 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de vectores no especificados afectando a la función (1) processLine en maptemplate.c y la función (2) writeError en mapserv.c en el programa mapserv CGI. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=439346 http://mapserver.gis.umn.edu/download/current/HISTORY.TXT http://secunia.com/advisories/26561 http://secunia.com/advisories/26718 http://secunia.com/advisories/29688 http://trac.osgeo.org/mapserver/attachment/ticket/2256/ms-bug-2256-4.8.patch http://trac.osgeo.org/mapserver/ticket/2256 http://www.debian.org/security/2008/dsa-1539 http://www.securityfocus.com/bid/25582 http://www.vupen.com/english/advisories/2007&# • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

Multiple stack-based buffer overflows in University of Minnesota gopher client 3.0.9 allow remote malicious servers to execute arbitrary code via (1) a long "+VIEWS:" reply, which is not properly handled in the VIfromLine function, and (2) certain arguments when launching third party programs such as a web browser from a web link, which is not properly handled in the FIOgetargv function. • https://www.exploit-db.com/exploits/1187 http://marc.info/?l=bugtraq&m=112559902931614&w=2 http://secunia.com/advisories/16614 http://secunia.com/advisories/17016 http://www.debian.org/security/2005/dsa-832 http://www.kb.cert.org/vuls/id/619812 http://www.securityfocus.com/bid/14693 https://exchange.xforce.ibmcloud.com/vulnerabilities/22053 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

gopher.c in the Gopher client 3.0.5 does not properly create temporary files, which allows local users to gain privileges. gopher.c en el cliente Gopher 3.0.5 no crea adecuadamente los ficheros temporales, lo que permite que usuarios locales ganen privilegios. • http://www.debian.org/security/2005/dsa-770 http://www.securitytracker.com/alerts/2005/Jul/1014599.html •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Integer overflow in gopher daemon (gopherd) 3.0.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted content of a certain size that triggers the overflow. • http://secunia.com/advisories/13855 http://www.debian.org/security/2004/dsa-638 •