Page 2 of 8 results (0.004 seconds)

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

The PPTP server in Astaro Security Linux before 4.024 provides information about its version, which makes it easier for remote attackers to construct specialized attacks. • http://secunia.com/advisories/13089 http://securitytracker.com/id?1012065 http://www.astaro.org/showflat.php?Cat=&Number=51459&page=0&view=collapsed&sb=5&o=&fpart=1#51459 http://www.osvdb.org/11406 https://exchange.xforce.ibmcloud.com/vulnerabilities/17959 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Astaro Security Linux 2.016 creates world-writable files and directories, which allows local users to overwrite arbitrary files. • http://online.securityfocus.com/archive/1/256124 http://online.securityfocus.com/archive/1/256127 http://www.securityfocus.com/bid/4103 https://exchange.xforce.ibmcloud.com/vulnerabilities/8190 •

CVSS: 7.5EPSS: 93%CPEs: 18EXPL: 0

Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka "LIBRESOLV: buffer overrun" and a different vulnerability than CVE-2002-0684. Desbordamientos de búfer en la libreria de resolución de raíz DNS en ISC BIND 4.9.2 a 4.9.10, y otras librerías derivadas como BSD libc y GNU libc, permite a atacantes remotos ejecutar código arbitrario mediante respuestas de servidor DNS que disparan el desbordamiento en las funciones getnetbyname() y getnetbyaddr(). También conocidad como "LIBRESOLV:desbordamiento de búfer. Es una vulnerabilidad distinta de CAN-2002-0684. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-028.txt.asc ftp://patches.sgi.com/support/free/security/advisories/20021201-01-P http://lists.apple.com/archives/Security-announce/2002/Nov/msg00000.html http://www.cert.org/advisories/CA-2002-31.html http://www.isc.org/products/BIND/bind-security.html http://www.iss.net/security_center/static/10624.php http://www.kb.cert.org/vuls/id/844360 http://www.securityfocus.com/bid/6186 https://access.redhat&# •