Page 16 of 193 results (0.004 seconds)

CVSS: 7.5EPSS: 2%CPEs: 18EXPL: 0

Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote attackers to execute arbitrary code. • ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.0-kdewebdev-kommander.diff http://marc.info/?l=bugtraq&m=111419664411051&w=2 http://secunia.com/advisories/15060 http://www.kde.org/info/security/advisory-20050420-1.txt http://www.securityfocus.com/bid/13313 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 1

Format string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and earlier, as called by the auth functions in the passwd_mysql and passwd_pgsql modules, may allow attackers to execute arbitrary code via a URL. • http://rst.void.ru/papers/advisory24.txt http://security.gentoo.org/glsa/glsa-200505-02.xml http://www.debian.org/security/2005/dsa-726 http://www.securityfocus.com/bid/13172 https://exchange.xforce.ibmcloud.com/vulnerabilities/20191 •

CVSS: 3.7EPSS: 0%CPEs: 104EXPL: 0

Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html http://rhn.redhat.com/errata/RHSA-2005-357.html http://secunia.com/advisories/18100 http://secunia.com/advisories/21253 http://secunia.com/advisories/22033 http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1 http://www& •

CVSS: 5.1EPSS: 5%CPEs: 27EXPL: 0

Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message. • http://secunia.com/advisories/14491 http://securitytracker.com/id?1013376 http://sylpheed.good-day.net/changelog-devel.html.en http://sylpheed.good-day.net/changelog.html.en http://www.gentoo.org/security/en/glsa/glsa-200503-26.xml http://www.redhat.com/support/errata/RHSA-2005-303.html https://access.redhat.com/security/cve/CVE-2005-0667 https://bugzilla.redhat.com/show_bug.cgi?id=1617556 •

CVSS: 7.5EPSS: 0%CPEs: 12EXPL: 0

Cross-site request forgery (CSRF) vulnerability in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allows remote attackers to perform unauthorized actions as authenticated MediaWiki users. • http://secunia.com/advisories/14360 http://securitytracker.com/id?1013260 http://sourceforge.net/project/shownotes.php?release_id=307067 http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml •