Page 17 of 289 results (0.037 seconds)

CVSS: 7.5EPSS: 20%CPEs: 4EXPL: 0

Unspecified vulnerability in Firefox and Thunderbird before 1.5.0.2, and SeaMonkey before 1.0.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors related to DHTML. NOTE: due to the lack of sufficient public details from the vendor as of 20060413, it is unclear how CVE-2006-1529, CVE-2006-1530, CVE-2006-1531, and CVE-2006-1723 are different. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt http://secunia.com/advisories/19631 http://secunia.com/advisories/19649 http://secunia.com/advisories/19863 http://secunia.com/advisories/19941 http://secunia.com/advisories/21033 http://secunia.com/advisories/22065 http://secunia.com/advisories/22066 http://securitytracker.com/id?1015919 http://securitytracker.com/id?1015920 http://securitytracker.com/id?1015921 http://www.debian.org/security/2006/ds •

CVSS: 7.2EPSS: 0%CPEs: 13EXPL: 0

debconf in Debian GNU/Linux, when configuring mnogosearch in the mnogosearch-common 3.2.31-1 package, uses the world-readable config.dat file instead of the restricted passwords.dat for storing the cleartext database administrator password in the mnogosearch-common/database_admin_pass record, which allows local users to view the password. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=361775 http://secunia.com/advisories/19589 http://www.securityfocus.com/bid/17477 •

CVSS: 4.6EPSS: 0%CPEs: 13EXPL: 2

Untrusted search path vulnerability in libgpib-perl 3.2.06-2 in Debian GNU/Linux includes an RPATH value under the /tmp/buildd directory for the LinuxGpib.so module, which might allow local users to gain privileges by installing malicious libraries in that directory. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359239 http://www.securityfocus.com/bid/17288 https://exchange.xforce.ibmcloud.com/vulnerabilities/25681 •

CVSS: 4.6EPSS: 0%CPEs: 13EXPL: 1

Untrusted search path vulnerability in libapache2-svn 1.3.0-4 for Subversion in Debian GNU/Linux includes RPATH values under the /tmp/svn directory for the (1) mod_authz_svn.so and (2) mod_dav_svn.so modules, which might allow local users to gain privileges by installing malicious libraries in that directory. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359234 http://www.securityfocus.com/bid/17288 https://exchange.xforce.ibmcloud.com/vulnerabilities/25680 •

CVSS: 4.6EPSS: 0%CPEs: 13EXPL: 2

Untrusted search path vulnerability in libtunepimp-perl 0.4.2-1 in Debian GNU/Linux includes an RPATH value under the /tmp/buildd directory for the tunepimp.so module, which might allow local users to gain privileges by installing malicious libraries in that directory. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359241 http://www.securityfocus.com/bid/17288 https://exchange.xforce.ibmcloud.com/vulnerabilities/25682 •