Page 22 of 120 results (0.004 seconds)

CVSS: 10.0EPSS: 2%CPEs: 1EXPL: 1

Multiple buffer overflows in NEC SOCKS5 1.0 r11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via a long username to (1) the GetString function in proxy.c for the SOCKS5 module or (2) the HandleS4Connection function in proxy.c for the SOCKS4 module. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0033.html http://www.iss.net/security_center/static/9485.php http://www.securityfocus.com/bid/5145 http://www.securityfocus.com/bid/5147 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 3%CPEs: 28EXPL: 0

IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors. Implementaciones de IPSEC, incluyendo FreeS/WAN y KAME no calculan adecuadamente la longitud de los datos de autenticación, lo que permite a atacantes remotos causar una denegación de servicio (kernel panic) mediante paquetes Encapsulating Security Payload (EPS) cortos falsificados, lo que resulta en errores de enteros sin signos. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-016.txt.asc http://razor.bindview.com/publish/advisories/adv_ipsec.html http://www.debian.org/security/2002/dsa-201 http://www.iss.net/security_center/static/10411.php http://www.kb.cert.org/vuls/id/459371 http://www.securityfocus.com/bid/6011 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in socks5 server on Linux allows attackers to execute arbitrary commands via a long connection request. • http://archives.neohapsis.com/archives/bugtraq/2000-11/0219.html •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in libsocks5 library of Socks 5 (socks5) 1.0r5 allows local users to gain privileges via long environmental variables. • http://marc.info/?l=bugtraq&m=90221104525933&w=2 http://www.securityfocus.com/bid/154 •

CVSS: 10.0EPSS: 1%CPEs: 26EXPL: 0

Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer. • ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 •