Page 3 of 20 results (0.001 seconds)

CVSS: 5.0EPSS: 0%CPEs: 61EXPL: 0

Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files. • http://marc.info/?l=bugtraq&m=110356286722875&w=2 http://secunia.com/advisories/13586 http://www.gentoo.org/security/en/glsa/glsa-200501-16.xml http://www.heise.de/security/dienste/browsercheck/tests/java.shtml http://www.kb.cert.org/vuls/id/420222 http://www.kde.org/info/security/advisory-20041220-1.txt http://www.mandriva.com/security/advisories?name=MDKSA-2004:154 http://www.redhat.com/support/errata/RHSA-2005-065.html https://exchange.xforce.ibmcloud.com/vulnera •

CVSS: 5.0EPSS: 0%CPEs: 13EXPL: 0

Multiple unknown vulnerabilities in viewcvs before 0.9.2, when exporting a repository as a tar archive, does not properly implement the hide_cvsroot and forbidden settings, which could allow remote attackers to gain sensitive information. Múltiples vulnerabilidades desconocidas en viewcvs anteriores a 0.9.2, cuando se exporta un repositorio como un archivo tar, no implementa apropiadamente las configuraciones hide_cvsroot y forbidden_settings, lo que podría permitir a atacantes remotos obtener información sensible. • http://www.debian.org/security/2004/dsa-605 https://exchange.xforce.ibmcloud.com/vulnerabilities/18369 •

CVSS: 7.2EPSS: 0%CPEs: 58EXPL: 1

Multiple buffer overflows in the RtConfigLoad function in rt-config.c for Atari800 before 1.3.4 allow local users to execute arbitrary code via large values in the configuration file. Múltiples desbordamientos de búfer en la función RtConfigLoad en Atari800 1.3.1 permite usuarios locales ejecutar código arbitrrio mediante valores grandes en el fichero de configuración. • http://cvs.sourceforge.net/viewcvs.py/atari800/atari800/DOC/ChangeLog?view=markup http://marc.info/?l=bugtraq&m=110142899319841&w=2 http://marc.info/?l=bugtraq&m=110149441815270&w=2 http://secunia.com/advisories/13670 http://www.debian.org/security/2004/dsa-609 http://www.osvdb.org/12610 http://www.securityfocus.com/bid/11756 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in Eterm 0.9.2 allows local users to gain privileges via a long ETERMPATH environment variable. Desbordamiento de búfer en Eterm 0.9.2 permite a usuarios locales ganar privilegios mediante una variable de entorno ETERMPATH larga. • http://marc.info/?l=bugtraq&m=105427580626001&w=2 http://www.debian.org/security/2003/dsa-309 http://www.securityfocus.com/bid/7708 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

gPS before 1.1.0 does not properly follow the rgpsp connection source acceptation policy as specified in the rgpsp.conf file, which could allow unauthorized remote attackers to connect to rgpsp. gPS anterior a 1.1.0 no sigue correctamente la política rgpsp de aceptación de fuente de conexión tal y como se especifica en el fichero rgpsp.conf, lo que podría permitir a atacantes remotos no autorizados a conectarse a rgpsp • http://gps.seul.org/changelog.html http://www.debian.org/security/2003/dsa-307 •