Page 26 of 134 results (0.003 seconds)

CVSS: 7.5EPSS: 2%CPEs: 5EXPL: 0

Avaya Cajun switches P880, P882, P580, and P550R 5.2.14 and earlier contain undocumented accounts (1) manuf and (2) diag with default passwords, which allows remote attackers to gain privileges. • http://marc.info/?l=bugtraq&m=103470243012971&w=2 http://support.avaya.com/japple/css/japple?PAGE=avaya.css.OpenPage&temp.template.name=Avaya_P580_P882_Undocumented http://www.iss.net/security_center/static/10374.php http://www.kb.cert.org/vuls/id/482241 http://www.securityfocus.com/bid/5965 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

An undocumented SNMP read/write community string ('NoGaH$@!') in Avaya P330, P130, and M770-ATM Cajun products allows remote attackers to gain administrative privileges. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0519.html http://support.avaya.com/security/Unauthorized_SNMP/index.jhtml http://www.iss.net/security_center/static/9769.php http://www.securityfocus.com/bid/5396 •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 1

The printf wrappers in libsafe 2.0-11 and earlier do not properly handle argument indexing specifiers, which could allow attackers to exploit certain function calls through arguments that are not verified by libsafe. Los envolventes de printf() en libsafe 2.0-11 y anteriores no manejan adecuamente especificadores de indización de argumentos, lo que podria permitir a atacantes explotar ciertas llamadas a funciones mediante argumentos no verificados por libsafe. • http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0070.html http://online.securityfocus.com/archive/1/263121 http://www.iss.net/security_center/static/8594.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-026.php http://www.securityfocus.com/bid/4327 •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 1

libsafe 2.0-11 and earlier allows attackers to bypass protection against format string vulnerabilities via format strings that use the "'" and "I" characters, which are implemented in libc but not libsafe. libsafe 2.0-11 y anteriores permiten a atacantes sortear la protección contra vulnerabilidades de cadenas formateadas mediante cadenas formateadas que usan caractéres "|" (tubería) y otros, que están implentados en libc pero no en libsafe. • http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0070.html http://online.securityfocus.com/archive/1/263121 http://www.iss.net/security_center/static/8593.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-026.php http://www.securityfocus.com/bid/4326 •

CVSS: 5.5EPSS: 0%CPEs: 7EXPL: 0

script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command. • http://seclists.org/bugtraq/2001/Dec/0122.html http://seclists.org/bugtraq/2001/Dec/0123.html http://secunia.com/advisories/16785 http://secunia.com/advisories/18502 http://support.avaya.com/elmodocs2/security/ASA-2006-014.htm http://www.redhat.com/support/errata/RHSA-2005-782.html http://www.securityfocus.com/bid/16280 https://exchange.xforce.ibmcloud.com/vulnerabilities/7718 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10723 https://a • CWE-59: Improper Link Resolution Before File Access ('Link Following') •