Page 2 of 57 results (0.005 seconds)

CVSS: 5.0EPSS: 1%CPEs: 127EXPL: 1

The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html http://rhn.redhat.com/errata/RHSA-2006-0177.html http://scary.beasts.org/security/CESA-2005-003.txt http://secunia.com/ • CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

nss_ldap 181 to versions before 213, as used in Mandrake Corporate Server and Mandrake 10.0, and other operating systems, does not properly handle a SIGPIPE signal when sending a search request to an LDAP directory server, which might allow remote attackers to cause a denial of service (crond and other application crash) if they can cause an LDAP server to become unavailable. NOTE: it is not clear whether this attack scenario is sufficient to include this item in CVE. nss_ldap 181 hasta la versión 213, usado en Madrake Corporate Server y Mandarke 10.0 y otros sistemas operativos no maneja adecuadamente la señal SIGPIPE cuando envía una petición a un servidor de directorios LDAP, lo que podría permitir que atacantes remotos causen una denegación de servicio (caída de crond y otras aplicaciones). • http://qa.mandriva.com/show_bug.cgi?id=13271 http://www.mandriva.com/security/advisories?name=MDKSA-2005:121 https://exchange.xforce.ibmcloud.com/vulnerabilities/40501 •

CVSS: 7.5EPSS: 1%CPEs: 82EXPL: 0

scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.5/SCOSA-2006.5.txt ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.57/SCOSA-2005.57.txt ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U http://bugs.gentoo.org/show_bug.cgi?id=83598 http://bugs.gentoo.org/show_bug.cgi?id=83655 http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html http://secunia.c •

CVSS: 5.0EPSS: 12%CPEs: 14EXPL: 0

Gaim before 1.1.3 allows remote attackers to cause a denial of service (infinite loop) via malformed SNAC packets from (1) AIM or (2) ICQ. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000933 http://gaim.sourceforge.net/security/index.php?id=10 http://marc.info/?l=bugtraq&m=110935655500670&w=2 http://secunia.com/advisories/14322 http://www.debian.org/security/2005/dsa-716 http://www.gentoo.org/security/en/glsa/glsa-200503-03.xml http://www.kb.cert.org/vuls/id/839280 http://www.mandriva.com/security/advisories?name=MDKSA-2005:049 http://www.novell.com/linux/security/advisories/2005_36_ •

CVSS: 5.0EPSS: 17%CPEs: 14EXPL: 0

The HTML parsing functions in Gaim before 1.1.3 allow remote attackers to cause a denial of service (application crash) via malformed HTML that causes "an invalid memory access," a different vulnerability than CVE-2005-0208. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000933 http://gaim.sourceforge.net/security/index.php?id=11 http://marc.info/?l=bugtraq&m=110935655500670&w=2 http://secunia.com/advisories/14322 http://www.gentoo.org/security/en/glsa/glsa-200503-03.xml http://www.kb.cert.org/vuls/id/523888 http://www.mandriva.com/security/advisories?name=MDKSA-2005:049 http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.redhat.com/support/errata&# •