Page 11 of 65 results (0.002 seconds)

CVSS: 5.0EPSS: 4%CPEs: 5EXPL: 0

The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions. El manejo de reensamblaje de fragmentos TCP/IP en el Linux kernel 2.4 permite que atacantes remotos provoquen una denegación de servicio (agotamiento de CPU) mediante ciertos paquetes que causan un elevado número de colisiones en la tabla hash. • http://www.debian.org/security/2003/dsa-311 http://www.debian.org/security/2003/dsa-312 http://www.debian.org/security/2003/dsa-332 http://www.debian.org/security/2003/dsa-336 http://www.debian.org/security/2004/dsa-442 http://www.redhat.com/support/errata/RHSA-2003-187.html http://www.redhat.com/support/errata/RHSA-2003-195.html http://www.redhat.com/support/errata/RHSA-2003-198.html http://www.turbolinux.com/security/TLSA-2003-41.txt https://oval&# •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 2

Buffer overflow in KON kon2 0.3.9b and earlier allows local users to execute arbitrary code via a long -Coding command line argument. Desbordamiento de búfer en KON kon2 0.3.9b y anteriores permite que usuarios locales ejecuten código arbitrario mediante un argumento largo -Coding de la línea de comandos. • https://www.exploit-db.com/exploits/22719 https://www.exploit-db.com/exploits/22720 http://marc.info/?l=bugtraq&m=105474080512376&w=2 http://marc.info/?l=bugtraq&m=105577912106710&w=2 http://www.mandriva.com/security/advisories?name=MDKSA-2003:064 http://www.redhat.com/support/errata/RHSA-2003-047.html http://www.redhat.com/support/errata/RHSA-2003-050.html https://access.redhat.com/security/cve/CVE-2002-1155 https://bugzilla.redhat.com/show_bug.cgi?id=1616848 •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

Unknown vulnerability in GNU Ghostscript before 7.07 allows attackers to execute arbitrary commands, even when -dSAFER is enabled, via a PostScript file that causes the commands to be executed from a malicious print job. Vulnerabilidad desconocida en GNU Ghostscript anterior a la 7.07 permite que atacantes remotos ejecuten comandos arbitrarios, incluso cuando -dSAFER está habilitado, mediante un fichero PostScript dañino. • http://marc.info/?l=bugtraq&m=105465818929172&w=2 http://www.mandriva.com/security/advisories?name=MDKSA-2003:065 http://www.redhat.com/support/errata/RHSA-2003-181.html http://www.redhat.com/support/errata/RHSA-2003-182.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A133 https://access.redhat.com/security/cve/CVE-2003-0354 https://bugzilla.redhat.com/show_bug.cgi?id=1617019 •

CVSS: 5.0EPSS: 3%CPEs: 5EXPL: 0

Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops"). Vulnerabilidad desconocida en la capa TTY del kernel de Linux 2.4 permite que atacantes causen una denegación de servicio ("kernel oops"). • http://www.debian.org/security/2003/dsa-311 http://www.debian.org/security/2003/dsa-312 http://www.debian.org/security/2003/dsa-332 http://www.debian.org/security/2003/dsa-336 http://www.debian.org/security/2004/dsa-442 http://www.mandriva.com/security/advisories?name=MDKSA-2003:066 http://www.mandriva.com/security/advisories?name=MDKSA-2003:074 http://www.redhat.com/support/errata/RHSA-2003-187.html http://www.redhat.com/support/errata/RHSA-2003-195.html http& •

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. El código mxcsr en el kernel de Linux 2.4 permite que atacantes modifiquen el estado de los registros de la CPU mediante una dirección mal construida. • http://www.debian.org/security/2003/dsa-311 http://www.debian.org/security/2003/dsa-312 http://www.debian.org/security/2003/dsa-332 http://www.debian.org/security/2003/dsa-336 http://www.debian.org/security/2004/dsa-442 http://www.mandriva.com/security/advisories?name=MDKSA-2003:066 http://www.mandriva.com/security/advisories?name=MDKSA-2003:074 http://www.redhat.com/support/errata/RHSA-2003-187.html http://www.redhat.com/support/errata/RHSA-2003-195.html http& •