Page 10 of 76 results (0.016 seconds)

CVSS: 5.0EPSS: 0%CPEs: 61EXPL: 0

Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files. • http://marc.info/?l=bugtraq&m=110356286722875&w=2 http://secunia.com/advisories/13586 http://www.gentoo.org/security/en/glsa/glsa-200501-16.xml http://www.heise.de/security/dienste/browsercheck/tests/java.shtml http://www.kb.cert.org/vuls/id/420222 http://www.kde.org/info/security/advisory-20041220-1.txt http://www.mandriva.com/security/advisories?name=MDKSA-2004:154 http://www.redhat.com/support/errata/RHSA-2005-065.html https://exchange.xforce.ibmcloud.com/vulnera •

CVSS: 5.0EPSS: 4%CPEs: 37EXPL: 0

The SNMP dissector in Ethereal 0.8.15 through 0.10.4 allows remote attackers to cause a denial of service (process crash) via a (1) malformed or (2) missing community string, which causes an out-of-bounds read. El diseccionador SNMP de Ethereal 0.8.15 a 0.10.4 permite a atacantes remotos causar una denegación de servicio (caída del proceso) mediante cadenas de comunidad (1) malformadas o (2) inexistentes, lo que causa una lectura fuera de límites. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916 http://secunia.com/advisories/12024 http://securitytracker.com/id?1010655 http://www.debian.org/security/2004/dsa-528 http://www.ethereal.com/appnotes/enpa-sa-00015.html http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml http://www.kb.cert.org/vuls/id/835846 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:067 http& •

CVSS: 7.5EPSS: 28%CPEs: 1EXPL: 0

The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a malformed RADIUS packet that triggers a null dereference. La función dissect_attribue_value_pairs en packet-radius.c de Ethereal 0.8.13 a 0.10.2 permite a atacantes remotos causar una denegación de servicio (caída) mediante un paquete RADIUS malformado que dispara una desreferencia nula. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835 http://marc.info/?l=bugtraq&m=108058005324316&w=2 http://marc.info/?l=bugtraq&m=108213710306260&w=2 http://marc.info/?l=ethereal-dev&m=107962966700423&w=2 http://secunia.com/advisories/11185 http://security.gentoo.org/glsa/glsa-200403-07.xml http://www.ethereal.com/appnotes/enpa-sa-00013.html http://www.kb.cert.org/vuls/id/124454 http://www.mandriva.com/security/advisories? • CWE-476: NULL Pointer Dereference •

CVSS: 5.0EPSS: 11%CPEs: 24EXPL: 0

Ethereal 0.10.1 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a zero-length Presentation protocol selector. Ethereal 0.8.13 a 0.10.2 permite a atacantes remotos causar una denegación de servicio (caída) mediante un seleccionador de protocolo de Presentación de longitud cero. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835 http://marc.info/?l=bugtraq&m=108058005324316&w=2 http://secunia.com/advisories/11185 http://security.gentoo.org/glsa/glsa-200403-07.xml http://www.ethereal.com/appnotes/enpa-sa-00013.html http://www.ethereal.com/lists/ethereal-dev/200404/msg00296.html http://www.kb.cert.org/vuls/id/792286 http://www.mandriva.com/security/advisories?name=MDKSA-2004:024 http://www.redhat.com/support/errata/RHSA-2004-13 •

CVSS: 5.0EPSS: 93%CPEs: 24EXPL: 2

Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors. Múltiples desbordamientos de búfer en Ethereal 0.8.13 a 0.10.2 permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante los diseccionadores (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, o (8) TCAP. • https://www.exploit-db.com/exploits/167 https://www.exploit-db.com/exploits/170 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835 http://marc.info/?l=bugtraq&m=108007072215742&w=2 http://marc.info/?l=bugtraq&m=108058005324316&w=2 http://marc.info/?l=bugtraq&m=108213710306260&w=2 http://secunia.com/advisories/11185 http://security.e-matters.de/advisories/032004.html http://security.gentoo.org/glsa/glsa-200403-07.xml http://www.debian.org/secu •