Page 2 of 66 results (0.004 seconds)

CVSS: 7.1EPSS: 0%CPEs: 19EXPL: 3

09 Mar 2005 — Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events. • https://www.exploit-db.com/exploits/1397 •

CVSS: 9.8EPSS: 4%CPEs: 27EXPL: 3

08 Mar 2005 — Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values. • http://marc.info/?l=bugtraq&m=111038641832400&w=2 •

CVSS: 7.0EPSS: 0%CPEs: 147EXPL: 6

07 Jan 2005 — Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor. Condición de carrera en las llamadas de funciones (1) load_elf_library y (2) binfmt_aout de uselib de los kernel de Linux 2.4 a 2.429-rc2 y 2.6 a 2.6.10 permite a usuarios locales ejecutar código de su elección manipulando el descriptor WMA. • https://packetstorm.news/files/id/35641 •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

23 Dec 2004 — The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 •

CVSS: 8.8EPSS: 5%CPEs: 68EXPL: 0

21 Dec 2004 — Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow. • http://lists.apple.com/archives/security-announce/2005/May/msg00001.html •

CVSS: 7.5EPSS: 8%CPEs: 61EXPL: 0

15 Dec 2004 — Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed SMB packet. Multiple vulnerabilities in Ethereal versions 0.9.0 to 0.10.7 have been discovered that all result in denial of service outcomes. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916 •

CVSS: 9.1EPSS: 6%CPEs: 61EXPL: 0

15 Dec 2004 — Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files. KDE Security Advisory: Two flaws in the Konqueror webbrowser make it possible to by pass the sandbox environment which is used to run Java-applets. One flaw allows access to restricted Java classes via JavaSc... • http://marc.info/?l=bugtraq&m=110356286722875&w=2 •

CVSS: 7.5EPSS: 6%CPEs: 61EXPL: 0

15 Dec 2004 — Unknown vulnerability in the DICOM dissector in Ethereal 0.10.4 through 0.10.7 allows remote attackers to cause a denial of service (application crash). Multiple vulnerabilities in Ethereal versions 0.9.0 to 0.10.7 have been discovered that all result in denial of service outcomes. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916 •

CVSS: 10.0EPSS: 10%CPEs: 23EXPL: 1

24 Nov 2004 — The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index increment error that leads to an out-of-bounds memory corruption. El procesador de argumentos de la orden PARTIAL de Cyrus IMAP Server 2.2.6 y anteriores permite a usuarios remotos autentificados ejecutar código de su elección mediante una cierta orden ("body[p") ... • https://packetstorm.news/files/id/36883 •

CVSS: 10.0EPSS: 10%CPEs: 23EXPL: 1

24 Nov 2004 — The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption. El procesador de argumentos de la orden FETCH de Cyrus IMAP Server 2.2.x a 2.2.8 permite a usuarios remotos autenticados ejecutar código de su elección mediante ciertos comandos como (1) "body[p", (2) "bina... • https://packetstorm.news/files/id/36883 •