Page 12 of 130 results (0.015 seconds)

CVSS: 10.0EPSS: 3%CPEs: 9EXPL: 2

Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106. Desbordamiento de búfer en ReadFontAlias de XFree86 4.1.0 a 4.3.0 permite a usuarios locales y atacantes remotos ejecutar código arbitrario mediante un fichero de aliases de fuentes (font.alias) con un token largo, una vulnerabilidad distinta de CAN-2004-0084 y CAN-2004-0106. • https://www.exploit-db.com/exploits/23682 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000821 http://marc.info/?l=bugtraq&m=107644835523678&w=2 http://marc.info/?l=bugtraq&m=107653324115914&w=2 http://marc.info/?l=bugtraq&m=110979666528890&w=2 http://security.gentoo.org/glsa/glsa-200402-02.xml http://sunsolve.sun.com/search/document.do? •

CVSS: 7.5EPSS: 0%CPEs: 47EXPL: 0

mod_digest_apple for Apache 1.3.31 and 1.3.32 on Mac OS X Server does not properly verify the nonce of a client response, which allows remote attackers to replay credentials. • http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html http://www.ciac.org/ciac/bulletins/p-049.shtml http://www.securityfocus.com/bid/9571 http://www.securitytracker.com/alerts/2004/Dec/1012414.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18347 •

CVSS: 3.3EPSS: 0%CPEs: 13EXPL: 1

chpass in OpenBSD 2.0 through 3.2 allows local users to read portions of arbitrary files via a hard link attack on a temporary file used to store user database information. • https://www.exploit-db.com/exploits/22210 http://securityreason.com/securityalert/3238 http://www.epita.fr/~bevand_m/asa/asa-0001 http://www.securityfocus.com/archive/1/309962 http://www.securityfocus.com/bid/6748 http://www.securitytracker.com/id?1006035 https://exchange.xforce.ibmcloud.com/vulnerabilities/11233 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 3

OpenBSD kernel 3.3 and 3.4 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code in 3.4 via a program with an invalid header that is not properly handled by (1) ibcs2_exec.c in the iBCS2 emulation (compat_ibcs2) or (2) exec_elf.c, which leads to a stack-based buffer overflow. El Kernel OpenBSD 3.3 y 3.4 permite que usuarios locales causen una denegación de servicio (kernel panic) y posiblemente ejecuten código arbitrario en 3.4 mediante un programa con una cabecera inválida. Esto no lo maneja adecuadamente en (1) bcs2_exec.c o (2) exec_elf.c, que lleva a un desbordamiento de búfer. • https://www.exploit-db.com/exploits/118 https://www.exploit-db.com/exploits/125 ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/005_exec.patch http://lists.grok.org.uk/pipermail/full-disclosure/2003-November/013315.html http://marc.info/?l=openbsd-security-announce&m=106808820119679&w=2 http://marc.info/?l=openbsd-security-announce&m=106917441524978&w=2 http://www.guninski.com/msuxobsd2.html http://www.openbsd.org/errata33.html http://www.securityfocus.com/bid/ •

CVSS: 5.0EPSS: 1%CPEs: 33EXPL: 0

The arplookup function in FreeBSD 5.1 and earlier, Mac OS X before 10.2.8, and possibly other BSD-based systems, allows remote attackers on a local subnet to cause a denial of service (resource starvation and panic) via a flood of spoofed ARP requests. La función asplookup en FreeBSD 5.1 y anteriores, Max OS X anteriores a 10.2.8, y posiblemente otros sistemas basados en BSD, permite a atacantes remotos en una subred local causar una denegación de servicio (agotamiento de recursos y pánico) mediante una inundación de peticiones ARP suplantadas. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:14.arp.asc ftp://patches.sgi.com/support/free/security/advisories/20040502-01-P.asc http://docs.info.apple.com/article.html?artnum=61798 •