Page 3 of 20 results (0.019 seconds)

CVSS: 7.2EPSS: 0%CPEs: 22EXPL: 0

Format string vulnerability in Speedtouch USB driver before 1.3.1 allows local users to execute arbitrary code via (1) modem_run, (2) pppoa2, or (3) pppoa3. Vulnerabilidad de cadena de formato en Speedtouch USB driver anteriores a 1.3.1 permite a usuarios locales ejecutar código de su elección mediante modem_run pppoa2, o pppoa3 • http://sourceforge.net/project/showfiles.php?group_id=32758&package_id=28264&release_id=271734 http://speedtouch.sourceforge.net/index.php?/news.en.html http://www.mail-archive.com/speedtouch%40ml.free.fr/msg06688.html https://exchange.xforce.ibmcloud.com/vulnerabilities/17792 •

CVSS: 7.6EPSS: 0%CPEs: 20EXPL: 0

Stack-based buffer overflow in pavuk 0.9pl28, 0.9pl27, and possibly other versions allows remote web sites to execute arbitrary code via a long HTTP Location header. Desbordamiento basado en la pila en pavuk 0.9pl28, 0.9pl27, y posiblemente otras versiones permite a sitios web remotos ejecutar código de su elección mediante una cabecera de localización HTTP larga. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023322.html http://security.gentoo.org/glsa/glsa-200406-22.xml http://www.debian.org/security/2004/dsa-527 http://www.securityfocus.com/bid/10633 https://exchange.xforce.ibmcloud.com/vulnerabilities/16551 •

CVSS: 10.0EPSS: 62%CPEs: 21EXPL: 4

The Unreal Engine, as used in DeusEx 1.112fm and earlier, Devastation 390 and earlier, Mobile Forces 20000 and earlier, Nerf Arena Blast 1.2 and earlier, Postal 2 1337 and earlier, Rune 107 and earlier, Tactical Ops 3.4.0 and earlier, Unreal 1 226f and earlier, Unreal II XMP 7710 and earlier, Unreal Tournament 451b and earlier, Unreal Tournament 2003 2225 and earlier, Unreal Tournament 2004 before 3236, Wheel of Time 333b and earlier, and X-com Enforcer, allows remote attackers to execute arbitrary code via a UDP packet containing a secure query with a long value, which overwrites memory. El Motor de Unreal, usado en in DeusEx 1.112fm y anteriores, , Devastation 390 y anteriores, Mobile Forces 20000 y anteriores, Nerf Arena Blast 1.2 y anteriores, Postal 2 1337 y anteriores, Rune 107 y anteriores, Tactical Ops 3.4.0 y anteriores, Unreal 1 226f y anteriores, Unreal II XMP 7710 y anteriores, Unreal Tournament 451b y anteriores, Unreal Tournament 2003 2225 y anteriores, Unreal Tournament 2004 anteriores a 3236, Wheel of Time 333b y anteriores, and X-com Enforcer permite a atacantes remotos ejecutar código de su elección mediante un paquete UDP conteniendo una consulta segura con un valor largo, lo que sobreescribe memoria. • https://www.exploit-db.com/exploits/16848 https://www.exploit-db.com/exploits/10032 https://www.exploit-db.com/exploits/16693 http://aluigi.altervista.org/adv/unsecure-adv.txt http://marc.info/?l=bugtraq&m=108787105023304&w=2 http://www.gentoo.org/security/en/glsa/glsa-200407-14.xml http://www.securityfocus.com/bid/10570 https://exchange.xforce.ibmcloud.com/vulnerabilities/16451 •

CVSS: 7.5EPSS: 0%CPEs: 11EXPL: 0

ProFTPD 1.2.9 treats the Allow and Deny directives for CIDR based ACL entries as if they were AllowAll, which could allow FTP clients to bypass intended access restrictions. ProFTPD 1.2.9 trata las directivas Permitir y Denegar para ACLS basadas en CIDR como si fueran AllowAll (Permitir Todo), lo que podría permitir a clientes FTP saltarse las restricciones de acceso pretendidas. • http://bugs.proftpd.org/show_bug.cgi?id=2267 http://marc.info/?l=bugtraq&m=108335030208523&w=2 http://marc.info/?l=bugtraq&m=108335051011341&w=2 http://secunia.com/advisories/11527 http://www.mandriva.com/security/advisories?name=MDKSA-2004:041 http://www.securityfocus.com/bid/10252 https://exchange.xforce.ibmcloud.com/vulnerabilities/16038 •

CVSS: 10.0EPSS: 0%CPEs: 28EXPL: 0

Multiple buffer overflows in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code. Múltiples desbordamientos de búfer en Midnight Commander (mc) anteriores a 4.6.0 pueden permitir a atacantes causar una denegación de servicio o ejecutar código arbitrario. • http://security.gentoo.org/glsa/glsa-200405-21.xml http://www.debian.org/security/2004/dsa-497 http://www.mandriva.com/security/advisories?name=MDKSA-2004:039 http://www.novell.com/linux/security/advisories/2004_12_mc.html http://www.redhat.com/support/errata/RHSA-2004-172.html https://exchange.xforce.ibmcloud.com/vulnerabilities/16016 https://access.redhat.com/security/cve/CVE-2004-0226 https://bugzilla.redhat.com/show_bug.cgi?id=1617179 •