Page 3 of 12 results (0.012 seconds)

CVSS: 10.0EPSS: 89%CPEs: 9EXPL: 6

Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution. Netatalk, en versiones anteriores a la 3.1.12, es vulnerable a una escritura fuera de límites en dsi_opensess.c. Esto se debe a la falta de comprobación de límites de los datos controlados por el atacante. • https://www.exploit-db.com/exploits/46048 https://www.exploit-db.com/exploits/46034 https://www.exploit-db.com/exploits/46675 https://github.com/SachinThanushka/CVE-2018-1160 http://netatalk.sourceforge.net/3.1/ReleaseNotes3.1.12.html http://packetstormsecurity.com/files/152440/QNAP-Netatalk-Authentication-Bypass.html http://www.securityfocus.com/bid/106301 https://attachments.samba.org/attachment.cgi?id=14735 https://github.com/tenable/poc/tree/master/netatalk/cve_2018_1160 https:/ • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 1%CPEs: 32EXPL: 0

The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title. El demonio papd en Netatalk anterior a la versión 2.0.4-beta2, cuando se utilizan ciertas variables en un comando pipe para el archivo print, permite a los atacantes remotos ejecutar comandos arbitrarios mediante metacaracteres shell en una petición print, como se muestra utilizando un título creado. • http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html http://osvdb.org/50824 http://secunia.com/advisories/33227 http://secunia.com/advisories/33548 http://secunia.com/advisories/34484 http://sourceforge.net/project/shownotes.php?release_id=648189 http://www.debian.org/security/2009/dsa-1705 http://www.openwall.com/lists/oss-security/2009/01/13/3 http://www.securityfocus.com/bid/32925 https://www.redhat.com/archives/fedora-package-announce/2009-March/m • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •