Page 28 of 193 results (0.007 seconds)

CVSS: 6.8EPSS: 2%CPEs: 22EXPL: 0

Cross-site scripting (XSS) vulnerability in the decoding of encoded text in certain headers in mime.php for SquirrelMail 1.4.3a and earlier, and 1.5.1-cvs before 23rd October 2004, allows remote attackers to execute arbitrary web script or HTML. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000905 http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html http://marc.info/?l=bugtraq&m=110012133608004&w=2 http://voxel.dl.sourceforge.net/sourceforge/squirrelmail/sm143a-xss.diff http://www.gentoo.org/security/en/glsa/glsa-200411-25.xml http://www.squirrelmail.org https://exchange.xforce.ibmcloud.com/vulnerabilities/18031 https:/&#x •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

Directory traversal vulnerability in the -x (extract) command line option in unarj allows remote attackers to overwrite arbitrary files via an arj archive with filenames that contain .. (dot dot) sequences. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027348.html http://lwn.net/Articles/121827 http://security.gentoo.org/glsa/glsa-200411-29.xml http://www.debian.org/security/2005/dsa-628 http://www.debian.org/security/2005/dsa-652 http://www.redhat.com/support/errata/RHSA-2005-007.html http://www.securityfocus.com/bid/11436 https://exchange.xforce.ibmcloud.com/vulnerabilities/17684 https://access.redhat.com/security/cve/CVE-2004-1027 https://bugzilla.re •

CVSS: 10.0EPSS: 5%CPEs: 6EXPL: 0

Buffer overflow in the http_open function in Kaffeine before 0.5, whose code is also used in gxine before 0.3.3, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long Content-Type header for a Real Audio Media (.ram) playlist file. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/028061.html http://secunia.com/advisories/13117 http://security.gentoo.org/glsa/glsa-200411-14.xml http://sourceforge.net/tracker/index.php?func=detail&aid=1060299&group_id=9655&atid=109655 http://www.securityfocus.com/bid/11528 https://exchange.xforce.ibmcloud.com/vulnerabilities/17849 •

CVSS: 5.0EPSS: 5%CPEs: 30EXPL: 1

The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899 http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html http://marc.info/?l=bugtraq&m=109993720717957&w=2 http://marc.info/?l=bugtraq&m=110330519803655&w=2 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101783-1 http://www.gentoo.org/ •

CVSS: 5.0EPSS: 2%CPEs: 17EXPL: 0

The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request. • http://www.debian.org/security/2004/dsa-586 http://www.mandriva.com/security/advisories?name=MDKSA-2004:128 http://www.redhat.com/support/errata/RHSA-2004-635.html http://www.securityfocus.com/bid/11618 https://exchange.xforce.ibmcloud.com/vulnerabilities/17985 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10268 https://usn.ubuntu.com/20-1 https://access.redhat.com/security/cve/CVE-2004-0983 https://bugzilla.redhat.com/show_bug.cgi?id=1 •