Page 18 of 103 results (0.009 seconds)

CVSS: 5.0EPSS: 0%CPEs: 51EXPL: 0

ServerAdmin in Mac OS X 10.2.8 through 10.3.5 uses the same example self-signed certificate on each system, which allows remote attackers to decrypt sessions. • http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html http://www.securityfocus.com/bid/11322 •

CVSS: 10.0EPSS: 8%CPEs: 93EXPL: 0

Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886 http://marc.info/?l=bugtraq&m=109880927526773&w=2 http://marc.info/?l=bugtraq&m=110815379627883&w=2 http://www.debian.org/security/2004/dsa-573 http://www.debian.org/security/2004/dsa-581 http://www.debian.org/security/2004/dsa-599 http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml http://www.mandriva.com/security/ •

CVSS: 10.0EPSS: 5%CPEs: 93EXPL: 0

Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888. • http://marc.info/?l=bugtraq&m=109880927526773&w=2 http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml http://www.mandriva.com/security/advisories?name=MDKSA-2004:113 http://www.securityfocus.com/bid/11501 https://exchange.xforce.ibmcloud.com/vulnerabilities/17819 •

CVSS: 2.1EPSS: 0%CPEs: 51EXPL: 0

CUPS 1.1.20 and earlier records authentication information for a device URI in the error_log file, which allows local users to obtain user names and passwords. • http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html http://www.ciac.org/ciac/bulletins/p-002.shtml http://www.debian.org/security/2004/dsa-566 http://www.kb.cert.org/vuls/id/557062 http://www.mandriva.com/security/advisories?name=MDKSA-2004:116 http://www.redhat.com/support/errata/RHSA-2004-543.html http://www.securityfocus.com/bid/11324 https://exchange.xforce.ibmcloud.com/vulnerabilities/17593 https://oval.cisecurity.org/repository/search/definition/ov •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 2

The Internet Printing Protocol (IPP) implementation in CUPS before 1.1.21 allows remote attackers to cause a denial of service (service hang) via a certain UDP packet to the IPP port. La implementación del Protocolo de Impresión de Internet (IPP) en CUPS anteriores a 1.1.21 permite a atacantes remotos causar una denegación de servicio (cuelgue del servicio) mediante cierto paquete UDP al puerto IPP. • https://www.exploit-db.com/exploits/24599 https://github.com/fibonascii/CVE-2004-0558 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000872 http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html http://marc.info/?l=bugtraq&m=109760654431316&w=2 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57646-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-201005-1 http://sunsolve.sun.com/search/document.do? •