Page 29 of 289 results (0.018 seconds)

CVSS: 7.5EPSS: 6%CPEs: 47EXPL: 0

Buffer underflow in extfs.c in Midnight Commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code. • http://secunia.com/advisories/13863 http://securitytracker.com/id?1012903 http://www.debian.org/security/2005/dsa-639 http://www.gentoo.org/security/en/glsa/glsa-200502-24.xml http://www.redhat.com/support/errata/RHSA-2005-217.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18911 https://access.redhat.com/security/cve/CVE-2004-1176 https://bugzilla.redhat.com/show_bug.cgi?id=1617388 •

CVSS: 5.0EPSS: 2%CPEs: 61EXPL: 0

Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed SMB packet. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916 http://secunia.com/advisories/13468 http://www.ciac.org/ciac/bulletins/p-061.shtml http://www.debian.org/security/2004/dsa-613 http://www.ethereal.com/appnotes/enpa-sa-00016.html http://www.gentoo.org/security/en/glsa/glsa-200412-15.xml http://www.mandriva.com/security/advisories?name=MDKSA-2004:152 http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html http://www.redhat.com/su •

CVSS: 5.0EPSS: 0%CPEs: 61EXPL: 0

Unknown vulnerability in the DICOM dissector in Ethereal 0.10.4 through 0.10.7 allows remote attackers to cause a denial of service (application crash). • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916 http://secunia.com/advisories/13468 http://www.ciac.org/ciac/bulletins/p-061.shtml http://www.ethereal.com/appnotes/enpa-sa-00016.html http://www.gentoo.org/security/en/glsa/glsa-200412-15.xml http://www.mandriva.com/security/advisories?name=MDKSA-2004:152 http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html http://www.redhat.com/support/errata/RHSA-2005-037.html http://www.se •

CVSS: 5.0EPSS: 0%CPEs: 61EXPL: 0

Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files. • http://marc.info/?l=bugtraq&m=110356286722875&w=2 http://secunia.com/advisories/13586 http://www.gentoo.org/security/en/glsa/glsa-200501-16.xml http://www.heise.de/security/dienste/browsercheck/tests/java.shtml http://www.kb.cert.org/vuls/id/420222 http://www.kde.org/info/security/advisory-20041220-1.txt http://www.mandriva.com/security/advisories?name=MDKSA-2004:154 http://www.redhat.com/support/errata/RHSA-2005-065.html https://exchange.xforce.ibmcloud.com/vulnera •

CVSS: 10.0EPSS: 3%CPEs: 18EXPL: 0

Multiple integer overflows in xzgv 0.8 and earlier allow remote attackers to execute arbitrary code via images with large width and height values, which trigger a heap-based buffer overflow, as demonstrated in the read_prf_file function in readprf.c. NOTE: CVE-2004-0994 and CVE-2004-1095 identify sets of bugs that only partially overlap, despite having the same developer. Therefore, they should be regarded as distinct. Múltiples desbordamientos de enteros en xzgv 0.8 y anteriores permiten a atacantes remotos ejecutar código de su elección mediante imágenes con valores de anchura y altura largos, lo que dispara un desbordamiento de búfer basado en el montón, como se ha demostrado en la función read_prf_file de readprf.c. Nota: CAN-2004-0994 y CAN-2004-1095 identifican grupos de errores que se solapan sólo parcialemte, a pesar de tener el mismo desarrollador. Por lo tanto, deberían considerarse como diferentes. • http://marc.info/?l=bugtraq&m=110297198402077&w=2 http://rus.members.beeb.net/xzgv-0.8-integer-overflow-fix.diff http://www.debian.org/security/2004/dsa-614 https://exchange.xforce.ibmcloud.com/vulnerabilities/18454 •