Page 3 of 39 results (0.005 seconds)

CVSS: 10.0EPSS: 10%CPEs: 23EXPL: 1

24 Nov 2004 — The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index increment error that leads to an out-of-bounds memory corruption. El procesador de argumentos de la orden PARTIAL de Cyrus IMAP Server 2.2.6 y anteriores permite a usuarios remotos autentificados ejecutar código de su elección mediante una cierta orden ("body[p") ... • https://packetstorm.news/files/id/36883 •

CVSS: 10.0EPSS: 10%CPEs: 23EXPL: 1

24 Nov 2004 — The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption. El procesador de argumentos de la orden FETCH de Cyrus IMAP Server 2.2.x a 2.2.8 permite a usuarios remotos autenticados ejecutar código de su elección mediante ciertos comandos como (1) "body[p", (2) "bina... • https://packetstorm.news/files/id/36883 •

CVSS: 10.0EPSS: 16%CPEs: 23EXPL: 1

24 Nov 2004 — Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015. Desbordamiento basado en la pila en Cyrus IMAP Server 2.2.4 a 2.2.8, con la opción imapmagicplus establecida, permite a atacantes remotos ejecuta código de su elección mediante un comando PROXY o LOGIN largo, una vulnerabilidad distinta de CAN-2004-1015. Cryus v2.... • https://packetstorm.news/files/id/36883 •

CVSS: 7.5EPSS: 3%CPEs: 124EXPL: 0

20 Nov 2004 — The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times. La función smb_recv_trans2 en el sistema de ficheros samba (smbfs) en los kernel de Linux 2.4 y 2.6 no maneja adecuadamente el reensamblaje de pa... • http://marc.info/?l=bugtraq&m=110072140811965&w=2 •

CVSS: 9.1EPSS: 19%CPEs: 124EXPL: 0

20 Nov 2004 — Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header siz... • http://marc.info/?l=bugtraq&m=110072140811965&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 51EXPL: 0

18 Nov 2004 — sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname. • http://lists.apple.com/archives/security-announce/2005/May/msg00001.html •

CVSS: 5.5EPSS: 0%CPEs: 206EXPL: 0

26 Oct 2004 — Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage. Ciertos controladores USB en el kernel de Linux 2.4 usa la función copy_to_user con structuras no inicializadas, lo que podría permitir a usuarios locales obtener información sensible leyendo memoria que no ha sido borrada desde el uso anterior. Several local and remote vulnerabilities ... • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127921 •

CVSS: 9.8EPSS: 17%CPEs: 74EXPL: 0

26 Oct 2004 — Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files. Múltiples vulnerabilidades en los decodificadores RLE (run length encoding) de libtiff 3.6.1 y anteriores, relacionadas con desbordamientos de enteros y de búfer, permite a atacantes remotos ejecutar código arbitrario mediante ficheros TIFF. Several problems have been discovered in libtiff, the Ta... • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888 •

CVSS: 7.5EPSS: 11%CPEs: 75EXPL: 1

26 Oct 2004 — Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls. Several problems have been discovered in libtiff, the Tag Image File Format library for processing TIFF graphics files. An attacker could prepare a specially crafted TIFF graphic that would cause the client to execute arbitrary code or crash. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888 •

CVSS: 7.8EPSS: 0%CPEs: 99EXPL: 0

21 Oct 2004 — Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities. Debian Security Advisory 707-1. Multiple issues with MySQL, including: incorrect privilege handling (users get illegitimate access to databases named similarly to those they have legitimate access to), arbitrary command execution for any user that h... • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947 •