Page 2 of 50 results (0.003 seconds)

CVSS: 7.0EPSS: 0%CPEs: 147EXPL: 6

07 Jan 2005 — Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor. Condición de carrera en las llamadas de funciones (1) load_elf_library y (2) binfmt_aout de uselib de los kernel de Linux 2.4 a 2.429-rc2 y 2.6 a 2.6.10 permite a usuarios locales ejecutar código de su elección manipulando el descriptor WMA. • https://packetstorm.news/files/id/35641 •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

23 Dec 2004 — The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 •

CVSS: 10.0EPSS: 16%CPEs: 23EXPL: 1

24 Nov 2004 — Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015. Desbordamiento basado en la pila en Cyrus IMAP Server 2.2.4 a 2.2.8, con la opción imapmagicplus establecida, permite a atacantes remotos ejecuta código de su elección mediante un comando PROXY o LOGIN largo, una vulnerabilidad distinta de CAN-2004-1015. Cryus v2.... • https://packetstorm.news/files/id/36883 •

CVSS: 10.0EPSS: 10%CPEs: 23EXPL: 1

24 Nov 2004 — The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index increment error that leads to an out-of-bounds memory corruption. El procesador de argumentos de la orden PARTIAL de Cyrus IMAP Server 2.2.6 y anteriores permite a usuarios remotos autentificados ejecutar código de su elección mediante una cierta orden ("body[p") ... • https://packetstorm.news/files/id/36883 •

CVSS: 10.0EPSS: 10%CPEs: 23EXPL: 1

24 Nov 2004 — The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption. El procesador de argumentos de la orden FETCH de Cyrus IMAP Server 2.2.x a 2.2.8 permite a usuarios remotos autenticados ejecutar código de su elección mediante ciertos comandos como (1) "body[p", (2) "bina... • https://packetstorm.news/files/id/36883 •

CVSS: 10.0EPSS: 33%CPEs: 27EXPL: 0

19 Nov 2004 — Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small "maximum data bytes" value. Samba versions 3 through 3.0.7 suffer from a buffer overflow inside the QFILEPATHINFO request handler. This vulnerability allows for remote code execution. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt •

CVSS: 8.8EPSS: 6%CPEs: 73EXPL: 0

24 Sep 2004 — Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817. A heap overflow in imlib2 can be utilized by an attacker to execute arbitrary code on the victims machine. • http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup •

CVSS: 9.1EPSS: 3%CPEs: 73EXPL: 0

17 Sep 2004 — Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file. A heap overflow error in imlib could be abused by an attacker to execute arbitrary code on the vicim's machine. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870 •

CVSS: 8.8EPSS: 3%CPEs: 73EXPL: 0

16 Sep 2004 — Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files. SUSE has discovered several buffer overflows in the ImageMagick graphics library. An attacker could create a malicious image or video file in AVI, BMP, or DIB format that could crash the reading process. It might be possible that carefully crafted im... • http://secunia.com/advisories/28800 •

CVSS: 10.0EPSS: 44%CPEs: 13EXPL: 5

02 Aug 2004 — Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX) 12.17.2 through 12.17.4 allow remote attackers to execute arbitrary code via certain WAV file header fields. Múltiples desbordamientos de búfer en Sound eXchange (SoX) anteriores a 12.17 permite a atacantes remotos ejecutar código arbitrario mediante ciertos campos de cabecera de ficheros WAV. • https://packetstorm.news/files/id/33905 •