Page 2 of 27 results (0.014 seconds)

CVSS: 10.0EPSS: 8%CPEs: 23EXPL: 0

The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index increment error that leads to an out-of-bounds memory corruption. El procesador de argumentos de la orden PARTIAL de Cyrus IMAP Server 2.2.6 y anteriores permite a usuarios remotos autentificados ejecutar código de su elección mediante una cierta orden ("body[p") que es tratada como una orden distinta ("body.peek") y produce un error de incremento de índice que conduce a una corrupción de memoria fuera de límites. • http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143 http://asg.web.cmu.edu/cyrus/download/imapd/changes.html http://marc.info/?l=bugtraq&m=110123023521619&w=2 http://secunia.com/advisories/13274 http://security.e-matters.de/advisories/152004.html http://security.gentoo.org/glsa/glsa-200411-34.xml http://www.debian.org/security/2004/dsa-597 http://www.mandriva.com/security/advisories?name=MDKSA-2004:139 https://exchange.xforce.ibmcloud.com/vu •

CVSS: 10.0EPSS: 10%CPEs: 23EXPL: 0

The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption. El procesador de argumentos de la orden FETCH de Cyrus IMAP Server 2.2.x a 2.2.8 permite a usuarios remotos autenticados ejecutar código de su elección mediante ciertos comandos como (1) "body[p", (2) "binary[p", o (3) "binary[p" que producen un error de incremento de índice que conduce a una corrupción de memoria fuera de límites. • http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143 http://asg.web.cmu.edu/cyrus/download/imapd/changes.html http://marc.info/?l=bugtraq&m=110123023521619&w=2 http://secunia.com/advisories/13274 http://security.e-matters.de/advisories/152004.html http://security.gentoo.org/glsa/glsa-200411-34.xml http://www.debian.org/security/2004/dsa-597 http://www.mandriva.com/security/advisories?name=MDKSA-2004:139 https://www.ubuntu.com/usn/usn-31& •

CVSS: 10.0EPSS: 21%CPEs: 25EXPL: 1

Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941. • https://www.exploit-db.com/exploits/600 http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html http://marc.info/?l=bugtraq&m=109882489302099&w=2 http://secunia.com/advisories/18717 http://secunia.com/advisories/20824 http://secunia.com/advisories/20866 http://secunia.com/advisories/21050 http://secunia.com/advisories/23783 http://www.ciac.org/ciac/bulletins/p-071.shtml http://www.debian.org/security/2004/dsa-589 http://www.debian.org/security&#x •

CVSS: 7.8EPSS: 0%CPEs: 21EXPL: 3

Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error. • https://www.exploit-db.com/exploits/587 https://www.exploit-db.com/exploits/24694 http://marc.info/?l=bugtraq&m=109906660225051&w=2 http://secunia.com/advisories/12898 http://secunia.com/advisories/19073 http://securitytracker.com/id?1011783 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1 http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm http://www.apacheweek.com/features/security-13 http://www.debian.org/security/2004/dsa-594 http:/& • CWE-131: Incorrect Calculation of Buffer Size •

CVSS: 6.8EPSS: 0%CPEs: 99EXPL: 0

Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947 http://www.ciac.org/ciac/bulletins/p-018.shtml http://www.debian.org/security/2005/dsa-707 http://www.mandriva.com/security/advisories?name=MDKSA-2005:070 http://www.redhat.com/support/errata/RHSA-2004-597.html http://www.redhat.com/support/errata/RHSA-2004-611.html https://exchange.xforce.ibmcloud.com/vulnerabilities/17783 https://www.ubuntu.com/usn/usn-32-1 https://access.redhat.com/security/cve/CVE&# •