Page 12 of 62 results (0.008 seconds)

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. El código mxcsr en el kernel de Linux 2.4 permite que atacantes modifiquen el estado de los registros de la CPU mediante una dirección mal construida. • http://www.debian.org/security/2003/dsa-311 http://www.debian.org/security/2003/dsa-312 http://www.debian.org/security/2003/dsa-332 http://www.debian.org/security/2003/dsa-336 http://www.debian.org/security/2004/dsa-442 http://www.mandriva.com/security/advisories?name=MDKSA-2003:066 http://www.mandriva.com/security/advisories?name=MDKSA-2003:074 http://www.redhat.com/support/errata/RHSA-2003-187.html http://www.redhat.com/support/errata/RHSA-2003-195.html http& •

CVSS: 7.2EPSS: 0%CPEs: 13EXPL: 0

lv reads a .lv file from the current working directory, which allows local users to execute arbitrary commands as other lv users by placing malicious .lv files into other directories. lv lee un fichero .lv desde el directorio de trabajo actual, lo que permitiría que usuarios locales ejecuten comandos arbitrarios como otros usuarios lv (colocando ficheros .lv dentro de otros directorios). • http://www.debian.org/security/2003/dsa-304 http://www.redhat.com/support/errata/RHSA-2003-167.html http://www.redhat.com/support/errata/RHSA-2003-169.html http://www.turbolinux.com/security/TLSA-2003-35.txt https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A430 https://access.redhat.com/security/cve/CVE-2003-0188 https://bugzilla.redhat.com/show_bug.cgi?id=1616995 •

CVSS: 4.6EPSS: 0%CPEs: 11EXPL: 0

tcpdump does not properly drop privileges to the pcap user when starting up. Cuando se arranca tcpdump, éste no rebaja privilegios adecuadamente al usuario pcap • http://www.redhat.com/support/errata/RHSA-2003-151.html http://www.redhat.com/support/errata/RHSA-2003-174.html https://access.redhat.com/security/cve/CVE-2003-0194 https://bugzilla.redhat.com/show_bug.cgi?id=1616999 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

vsftpd FTP daemon in Red Hat Linux 9 is not compiled against TCP wrappers (tcp_wrappers) but is installed as a standalone service, which inadvertently prevents vsftpd from restricting access as intended. • http://www.redhat.com/support/errata/RHSA-2003-084.html http://www.securityfocus.com/bid/7253 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A634 •

CVSS: 10.0EPSS: 1%CPEs: 38EXPL: 1

Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges. Error 'off-by-one' en el código de canal de OpenSSH 2.0 a 3.0.2 permite a usuarios locales o a servidores remotos ganar privilegios. • https://www.exploit-db.com/exploits/21314 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-004.txt.asc ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.10/CSSA-2002-SCO.10.txt ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.11/CSSA-2002-SCO.11.txt http://archives.neohapsis.com/archives/bugtraq/2002-03/0108.html http://archives.neohapsis.com/archives/vulnw • CWE-193: Off-by-one Error •