Page 21 of 160 results (0.003 seconds)

CVSS: 10.0EPSS: 0%CPEs: 15EXPL: 0

Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 through 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/028590.html http://secunia.com/advisories/13167 http://www.debian.org/security/2004/dsa-592 http://www.gentoo.org/security/en/glsa/glsa-200411-20.xml http://www.mandriva.com/security/advisories?name=MDKSA-2004:129 http://www.securityfocus.com/bid/11657 https://exchange.xforce.ibmcloud.com/vulnerabilities/18032 •

CVSS: 7.5EPSS: 96%CPEs: 48EXPL: 2

RAV antivirus allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. • https://www.exploit-db.com/exploits/629 http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true http://www.kb.cert.org/vuls/id/968818 http://www.securityfocus.com/bid/11448 https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 •

CVSS: 10.0EPSS: 0%CPEs: 20EXPL: 0

Buffer overflow in the getnickuserhost function in BNC 2.8.9, and possibly other versions, allows remote IRC servers to execute arbitrary code via an IRC server response that contains many (1) ! (exclamation) or (2) @ (at sign) characters. • http://marc.info/?l=bugtraq&m=110011817627839&w=2 http://secunia.com/advisories/13149 http://security.lss.hr/en/index.php?page=details&ID=LSS-2004-11-03 http://www.debian.org/security/2004/dsa-595 http://www.securityfocus.com/bid/11647 https://exchange.xforce.ibmcloud.com/vulnerabilities/18013 •

CVSS: 6.8EPSS: 2%CPEs: 22EXPL: 0

Cross-site scripting (XSS) vulnerability in the decoding of encoded text in certain headers in mime.php for SquirrelMail 1.4.3a and earlier, and 1.5.1-cvs before 23rd October 2004, allows remote attackers to execute arbitrary web script or HTML. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000905 http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html http://marc.info/?l=bugtraq&m=110012133608004&w=2 http://voxel.dl.sourceforge.net/sourceforge/squirrelmail/sm143a-xss.diff http://www.gentoo.org/security/en/glsa/glsa-200411-25.xml http://www.squirrelmail.org https://exchange.xforce.ibmcloud.com/vulnerabilities/18031 https:/&#x •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

Directory traversal vulnerability in the -x (extract) command line option in unarj allows remote attackers to overwrite arbitrary files via an arj archive with filenames that contain .. (dot dot) sequences. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027348.html http://lwn.net/Articles/121827 http://security.gentoo.org/glsa/glsa-200411-29.xml http://www.debian.org/security/2005/dsa-628 http://www.debian.org/security/2005/dsa-652 http://www.redhat.com/support/errata/RHSA-2005-007.html http://www.securityfocus.com/bid/11436 https://exchange.xforce.ibmcloud.com/vulnerabilities/17684 https://access.redhat.com/security/cve/CVE-2004-1027 https://bugzilla.re •