Page 3 of 15 results (0.001 seconds)

CVSS: 5.0EPSS: 0%CPEs: 22EXPL: 0

The X Display Manager Control Protocol (XDMCP) support for GDM before 2.4.1.6 allows attackers to cause a denial of service (daemon crash) when a chosen host expires, a different issue than CVE-2003-0549. Vulnerabilidad desconocida en el soporte XDMPC (X Display Manager Control Protocol - Protocolo de Control de Administrador de Visualizador X) en GDM anteriores a 2.4.1.6 permite a atacantes causar una denegación de servicio (caída del demonio), un problema diferente de CAN-2003-0549. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000729 http://mail.gnome.org/archives/gnome-hackers/2003-August/msg00045.html http://www.redhat.com/support/errata/RHSA-2003-258.html http://www.redhat.com/support/errata/RHSA-2003-259.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A113 https://access.redhat.com/security/cve/CVE-2003-0548 https://bugzilla.redhat.com/show_bug.cgi?id=1617051 •

CVSS: 5.0EPSS: 0%CPEs: 22EXPL: 0

The X Display Manager Control Protocol (XDMCP) support for GDM before 2.4.1.6 allows attackers to cause a denial of service (daemon crash) via a short authorization key name. Vulnerabilidad desconocida en el soporte XDMPC (X Display Manager Control Protocol - Protocolo de Control de Administrador de Visualizador X) en GDM anteriores a 2.4.1.6 permite a atacantes causar una denegación de servicio (caída del demonio), un problema diferente de CAN-2003-0548. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000729 http://mail.gnome.org/archives/gnome-hackers/2003-August/msg00045.html http://www.redhat.com/support/errata/RHSA-2003-258.html http://www.redhat.com/support/errata/RHSA-2003-259.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A129 https://access.redhat.com/security/cve/CVE-2003-0549 https://bugzilla.redhat.com/show_bug.cgi?id=1617052 •

CVSS: 5.0EPSS: 2%CPEs: 13EXPL: 2

libICE in XFree86 allows remote attackers to cause a denial of service by specifying a large value which is not properly checked by the SKIP_STRING macro. • https://www.exploit-db.com/exploits/20023 http://archives.neohapsis.com/archives/bugtraq/2000-06/0170.html http://www.securityfocus.com/bid/1369 http://www.xfree86.org/security •

CVSS: 10.0EPSS: 7%CPEs: 4EXPL: 2

Buffer overflow in the XDMCP parsing code of GNOME gdm, KDE kdm, and wdm allows remote attackers to execute arbitrary commands or cause a denial of service via a long FORWARD_QUERY request. • https://www.exploit-db.com/exploits/19948 https://www.exploit-db.com/exploits/19947 ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-013.0.txt http://archives.neohapsis.com/archives/bugtraq/2000-05/0241.html http://archives.neohapsis.com/archives/bugtraq/2000-06/0025.html http://www.novell.com/linux/security/advisories/suse_security_announce_49.html http://www.securityfocus.com/bid/1233 http://www.securityfocus.com/bid/1279 http://www.securityfocus.com/bid/1370 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Error messages generated by gdm with the VerboseAuth setting allows an attacker to identify valid users on a system. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0990 •