CVE-2003-0434 – Adobe Acrobat Reader (UNIX) 5.0 6 / Xpdf 0.9x Hyperlinks - Arbitrary Command Execution
https://notcve.org/view.php?id=CVE-2003-0434
Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to execute arbitrary commands via shell metacharacters in an embedded hyperlink. Varios visores de PDF, incluidos Adobe Acrobat 5.06 y Xpdf 1.01 permiten a atacantes remotos la ejecución arbitraria de comandos mediante metacaracteres de shell en un hipervínculo embebido. • https://www.exploit-db.com/exploits/22771 http://lists.grok.org.uk/pipermail/full-disclosure/2003-June/005719.html http://marc.info/?l=bugtraq&m=105777963019186&w=2 http://secunia.com/advisories/9037 http://secunia.com/advisories/9038 http://www.kb.cert.org/vuls/id/200132 http://www.mandriva.com/security/advisories?name=MDKSA-2003:071 http://www.redhat.com/support/errata/RHSA-2003-196.html http://www.redhat.com/support/errata/RHSA-2003-197.html https://oval. •
CVE-2003-0364
https://notcve.org/view.php?id=CVE-2003-0364
The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions. El manejo de reensamblaje de fragmentos TCP/IP en el Linux kernel 2.4 permite que atacantes remotos provoquen una denegación de servicio (agotamiento de CPU) mediante ciertos paquetes que causan un elevado número de colisiones en la tabla hash. • http://www.debian.org/security/2003/dsa-311 http://www.debian.org/security/2003/dsa-312 http://www.debian.org/security/2003/dsa-332 http://www.debian.org/security/2003/dsa-336 http://www.debian.org/security/2004/dsa-442 http://www.redhat.com/support/errata/RHSA-2003-187.html http://www.redhat.com/support/errata/RHSA-2003-195.html http://www.redhat.com/support/errata/RHSA-2003-198.html http://www.turbolinux.com/security/TLSA-2003-41.txt https://oval •
CVE-2002-1155 – kon2 - Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2002-1155
Buffer overflow in KON kon2 0.3.9b and earlier allows local users to execute arbitrary code via a long -Coding command line argument. Desbordamiento de búfer en KON kon2 0.3.9b y anteriores permite que usuarios locales ejecuten código arbitrario mediante un argumento largo -Coding de la línea de comandos. • https://www.exploit-db.com/exploits/22719 https://www.exploit-db.com/exploits/22720 http://marc.info/?l=bugtraq&m=105474080512376&w=2 http://marc.info/?l=bugtraq&m=105577912106710&w=2 http://www.mandriva.com/security/advisories?name=MDKSA-2003:064 http://www.redhat.com/support/errata/RHSA-2003-047.html http://www.redhat.com/support/errata/RHSA-2003-050.html https://access.redhat.com/security/cve/CVE-2002-1155 https://bugzilla.redhat.com/show_bug.cgi?id=1616848 •
CVE-2003-0354
https://notcve.org/view.php?id=CVE-2003-0354
Unknown vulnerability in GNU Ghostscript before 7.07 allows attackers to execute arbitrary commands, even when -dSAFER is enabled, via a PostScript file that causes the commands to be executed from a malicious print job. Vulnerabilidad desconocida en GNU Ghostscript anterior a la 7.07 permite que atacantes remotos ejecuten comandos arbitrarios, incluso cuando -dSAFER está habilitado, mediante un fichero PostScript dañino. • http://marc.info/?l=bugtraq&m=105465818929172&w=2 http://www.mandriva.com/security/advisories?name=MDKSA-2003:065 http://www.redhat.com/support/errata/RHSA-2003-181.html http://www.redhat.com/support/errata/RHSA-2003-182.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A133 https://access.redhat.com/security/cve/CVE-2003-0354 https://bugzilla.redhat.com/show_bug.cgi?id=1617019 •
CVE-2003-0247
https://notcve.org/view.php?id=CVE-2003-0247
Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops"). Vulnerabilidad desconocida en la capa TTY del kernel de Linux 2.4 permite que atacantes causen una denegación de servicio ("kernel oops"). • http://www.debian.org/security/2003/dsa-311 http://www.debian.org/security/2003/dsa-312 http://www.debian.org/security/2003/dsa-332 http://www.debian.org/security/2003/dsa-336 http://www.debian.org/security/2004/dsa-442 http://www.mandriva.com/security/advisories?name=MDKSA-2003:066 http://www.mandriva.com/security/advisories?name=MDKSA-2003:074 http://www.redhat.com/support/errata/RHSA-2003-187.html http://www.redhat.com/support/errata/RHSA-2003-195.html http& •