Page 22 of 193 results (0.010 seconds)

CVSS: 7.5EPSS: 2%CPEs: 6EXPL: 2

rssh 2.2.2 and earlier does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via (1) rdist -P, (2) rsync, or (3) scp -S. • https://www.exploit-db.com/exploits/24795 http://marc.info/?l=bugtraq&m=110202047507273&w=2 http://marc.info/?l=bugtraq&m=110581113814623&w=2 http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml http://www.securityfocus.com/bid/11792 •

CVSS: 10.0EPSS: 5%CPEs: 7EXPL: 0

Multiple integer overflows in the image handler for imlib 1.9.14 and earlier, which is used by gkrellm and several window managers, allow remote attackers to cause a denial of service (application crash) and execute arbitrary code via certain image files. Múltiples desbordamientos de búfer en el manejador de imágenes de imlib 1.9.14 y anteriores, que es usado en gkrellm y varios gestores de ventanas, permite a atacantes remotos causar una denegación de servicio (caída de aplicación) y ejecutar código arbitrario mediante ciertos ficheros de imágenes. • http://www.debian.org/security/2005/dsa-628 http://www.gentoo.org/security/en/glsa/glsa-200412-03.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:007 http://www.redhat.com/support/errata/RHSA-2004-651.html http://www.securityfocus.com/bid/11830 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10771 https://access.redhat.com/security/cve/CVE-2004-1026 https://bugzilla.redhat.com/show_bug.cgi?id=1617355 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 1

The unison command in scponly before 4.0 does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via the (1) -rshcmd or (2) -sshcmd flags. • http://marc.info/?l=bugtraq&m=110202047507273&w=2 http://marc.info/?l=bugtraq&m=110581113814623&w=2 http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml http://www.securityfocus.com/bid/11791 http://www.sublimation.org/scponly/#relnotes https://exchange.xforce.ibmcloud.com/vulnerabilities/18362 •

CVSS: 5.0EPSS: 0%CPEs: 9EXPL: 0

mirrorselect before 0.89 creates temporary files in a world-writable location with predictable file names, which allows remote attackers to overwrite arbitrary files via a symlink attack. • http://secunia.com/advisories/13392 http://www.gentoo.org/security/en/glsa/glsa-200412-05.xml https://exchange.xforce.ibmcloud.com/vulnerabilities/18382 •

CVSS: 7.5EPSS: 2%CPEs: 47EXPL: 2

Archive::Zip Perl module before 1.14, when used by antivirus programs such as amavisd-new, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. El módulo Perl Archive::Zip anterior a 1.14, cuando se usa en programas antivirus como amavisd-new, permite a atacantes remotos saltarse la protección del antivirus mediante un ficheros comprimido con cabeceras globales y locales establecido a cero, lo que no impide que el fichero comprimido sea abierto en un sistema objetivo. • https://www.exploit-db.com/exploits/629 http://secunia.com/advisories/13038 http://www.gentoo.org/security/en/glsa/glsa-200410-31.xml http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true http://www.kb.cert.org/vuls/id/492545 http://www.mandriva.com/security/advisories?name=MDKSA-2004:118 http://www.securityfocus.com/bid/11448 https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 •