Page 2 of 23 results (0.005 seconds)

CVSS: 7.5EPSS: 1%CPEs: 47EXPL: 0

22 Jan 2005 — Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service via "use of already freed memory." • http://secunia.com/advisories/13863 •

CVSS: 7.5EPSS: 1%CPEs: 47EXPL: 0

22 Jan 2005 — direntry.c in Midnight Commander (mc) 4.5.55 and earlier allows attackers to cause a denial of service by "manipulating non-existing file handles." • http://secunia.com/advisories/13863 •

CVSS: 9.8EPSS: 0%CPEs: 47EXPL: 0

22 Jan 2005 — fish.c in midnight commander allows remote attackers to execute arbitrary programs via "insecure filename quoting," possibly using shell metacharacters. • http://secunia.com/advisories/13863 •

CVSS: 9.8EPSS: 2%CPEs: 47EXPL: 0

22 Jan 2005 — Buffer underflow in extfs.c in Midnight Commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code. • http://secunia.com/advisories/13863 •

CVSS: 10.0EPSS: 1%CPEs: 28EXPL: 0

05 May 2004 — Multiple buffer overflows in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code. Múltiples desbordamientos de búfer en Midnight Commander (mc) anteriores a 4.6.0 pueden permitir a atacantes causar una denegación de servicio o ejecutar código arbitrario. • http://security.gentoo.org/glsa/glsa-200405-21.xml •

CVSS: 9.8EPSS: 0%CPEs: 28EXPL: 0

05 May 2004 — Multiple vulnerabilities in Midnight Commander (mc) before 4.6.0, with unknown impact, related to "Insecure temporary file and directory creations." Múltiples vulnerabilidades en Midnight Commander (mc) anteriores a 4.6.0, con impacto desconocido, relacionadas con "creación insegura de ficheros y directorios temporales." • http://security.gentoo.org/glsa/glsa-200405-21.xml •

CVSS: 9.8EPSS: 1%CPEs: 28EXPL: 0

05 May 2004 — Multiple format string vulnerabilities in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code. Mútiples vulnerabilidades de cadena de formato en Midnight Commander (mc) anteriores a 4.6.0 pueden permitir a atacantes causar una denegación de servicio o ejecutar código de su elección. • http://security.gentoo.org/glsa/glsa-200405-21.xml •

CVSS: 9.8EPSS: 8%CPEs: 3EXPL: 0

06 Jan 2004 — Stack-based buffer overflow in vfs_s_resolve_symlink of vfs/direntry.c for Midnight Commander (mc) 4.6.0 and earlier, and possibly later versions, allows remote attackers to execute arbitrary code during symlink conversion. Desbordamiento de búfer basado en la pila en vfs_s_resolve_symlink de vfs/direntry.c en Midnight Commander (mc) 4.6.0 y anteriores, y posiblemente otras versiones permite a atacantes remotos ejecutar código arbitrario durante una conversión de enlaces simbólicos (symlink). • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-014.0.txt •

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 0

12 Nov 2001 — Buffer overflow in mcedit in Midnight Commander 4.5.1 allows local users to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted text file. • http://www.kb.cert.org/vuls/id/203203 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

09 Jan 2001 — cons.saver in Midnight Commander (mc) 4.5.42 and earlier does not properly verify if an output file descriptor is a TTY, which allows local users to corrupt files by creating a symbolic link to the target file, calling mc, and specifying that link as a TTY argument. • http://archives.neohapsis.com/archives/bugtraq/2000-11/0192.html •