Page 222 of 1170 results (0.002 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

ifup-dhcp script in the sysconfig package for SuSE 8.0 allows remote attackers to execute arbitrary commands via spoofed DHCP responses, which are stored and executed in a file. La rutina ifup-dhcp en el paquete sysconfig de SuSE 8.0, permite a atacantes remotos la ejecución arbitraria de comandos mediante respuestas spoofed DHCP, las cuales son almacenadas y ejecutadas en un fichero. • http://www.iss.net/security_center/static/9040.php http://www.novell.com/linux/security/advisories/2002_016_sysconfig_txt.html http://www.securityfocus.com/bid/4695 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

shadow package in SuSE 8.0 allows local users to destroy the /etc/passwd and /etc/shadow files or assign extra group privileges to some users by changing filesize limits before calling programs that modify the files. El paquete shadow en SuSE 8.0 permite a usuarios locales la destrucción de los ficheros /etc/passwd y /etc/shadowo asignar privilegios extra de grupo a algunos usuarios cambiando los límites del tamaño del fichero antes de las llamadas a programas que modifican el fichero. • http://www.iss.net/security_center/static/9102.php http://www.novell.com/linux/security/advisories/2002_17_shadow.html http://www.securityfocus.com/bid/4757 •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in lukemftp FTP client in SuSE 6.4 through 8.0, and possibly other operating systems, allows a malicious FTP server to execute arbitrary code via a long PASV command. • http://www.iss.net/security_center/static/9130.php http://www.novell.com/linux/security/advisories/2002_18_lukemftp.html •

CVSS: 10.0EPSS: 1%CPEs: 38EXPL: 1

Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges. Error 'off-by-one' en el código de canal de OpenSSH 2.0 a 3.0.2 permite a usuarios locales o a servidores remotos ganar privilegios. • https://www.exploit-db.com/exploits/21314 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-004.txt.asc ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.10/CSSA-2002-SCO.10.txt ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.11/CSSA-2002-SCO.11.txt http://archives.neohapsis.com/archives/bugtraq/2002-03/0108.html http://archives.neohapsis.com/archives/vulnw • CWE-193: Off-by-one Error •

CVSS: 7.2EPSS: 0%CPEs: 28EXPL: 0

Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling." El desbordamiento del búfer en ncurses 5.0, y el paquete de compatibilidad ncurses4 basado en él, permite a usuarios locales la obtención de privilegios. • http://www.debian.org/security/2002/dsa-113 http://www.iss.net/security_center/static/8222.php http://www.redhat.com/support/errata/RHSA-2002-020.html http://www.securityfocus.com/bid/2116 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •