Page 2 of 78 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

07 Feb 2005 — Multiple buffer overflows in the enable command for SCO OpenServer 5.0.6 and 5.0.7 allow local users to execute arbitrary code via long command line arguments. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.13/SCOSA-2005.13.txt •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

26 Jan 2005 — The scosession program in OpenServer 5.0.6 and 5.0.7 allows local users to gain privileges via crafted strings on the commandline. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.5/SCOSA-2005.5.txt •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

11 Jan 2005 — The NFS mountd service on SCO UnixWare 7.1.1, 7.1.3, 7.1.4, and 7.0.1, and possibly other versions, when run from inetd, allows remote attackers to cause a denial of service (memory exhaustion) via a series of requests, which causes inetd to launch a separate process for each request. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.1/SCOSA-2005.1.txt •

CVSS: 9.8EPSS: 3%CPEs: 3EXPL: 1

31 Dec 2004 — SCO OpenServer 5.0.5 through 5.0.7 only supports Xauthority style access control when users log in using scologin, which allows remote attackers to gain unauthorized access to an X session via other X login methods. • https://www.exploit-db.com/exploits/20851 •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 2

28 Oct 2004 — Multiple buffer overflows in MMDF on OpenServer 5.0.6 and 5.0.7, and possibly other operating systems, may allow attackers to execute arbitrary code, as demonstrated via the execmail program. Múltiples desbordamientos de búfer en MMDF sobre OpenServer 5.0.6 y 5.0.7, y posiblemente otros sistemas operativos, puede permitir a atacantes ejecutar código de su elección, como se ha demostrado utilizando el programa execmail • https://www.exploit-db.com/exploits/602 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

28 Oct 2004 — Multiple unknown vulnerabilities in MMDF on OpenServer 5.0.6 and 5.0.7, and possibly other operating systems, may allow attackers to cause a denial of service by triggering a core dump. Múltiples vulnerabilidades desconocidas en MMDF sobre OpenServer 5.0.6 y 5.0.7, y posiblemente otros sistemas operativos, puede permitir a atacantes causar una denegación de servicio disparando un volcado de núcleo. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.7/SCOSA-2004.7.txt •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 2

28 Oct 2004 — Multiple unknown vulnerabilities in MMDF on OpenServer 5.0.6 and 5.0.7, and possibly other operating systems, may allow attackers to cause a denial of service by triggering a null dereference. Múltiples vulnerabilidades desconocidas en MMDF sobre OpenServer 5.0.6 y 5.0.7, y posiblemente otros sistemas operativos, pueden permitir a atacantes causar una denegación de servicio disparando una desreferencia nula. • https://www.exploit-db.com/exploits/24293 •

CVSS: 7.5EPSS: 1%CPEs: 20EXPL: 8

05 May 2004 — TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP. TCP, cuando se usa un tamaño de ventana de transmisión grande, hace más fácil a atacantes remotos adivinar números de secuencia y causar una denegación de servicio (pérdida de la conexión) en conexiones TCP persistentes in... • https://www.exploit-db.com/exploits/291 •

CVSS: 7.5EPSS: 0%CPEs: 245EXPL: 0

18 Mar 2004 — The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read. El código que une SSL/TLS en OpenSSL 0.9.7a, 0.9.7b y 0.9.7c, usando Kerberos, no comprueba adecuadamente la longitud de los tickets de Kerberos, lo que permite que atacantes remotos provoquen una dene... • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 0%CPEs: 252EXPL: 0

18 Mar 2004 — OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool. OpenSSL 0.9.6 anteriores a la 0.9.6d no manejan adecuadamente los tipos de mensajes desconocidos, lo que permite a atacantes remotos causar una denegación de servicios (por bucle infinito), como se demuestra utilizando la herramienta de testeo Codenomicon TLS. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt •