Page 30 of 203 results (0.022 seconds)

CVSS: 7.5EPSS: 1%CPEs: 13EXPL: 0

Multiple extfs backend scripts for GNOME virtual file system (VFS) before 1.0.1 may allow remote attackers to perform certain unauthorized actions via a gnome-vfs URI. • http://rpmfind.net/linux/RPM/suse/9.3/i386/suse/i586/gnome-vfs-1.0.5-816.2.i586.html http://www.redhat.com/support/errata/RHSA-2004-373.html https://bugzilla.fedora.us/show_bug.cgi?id=1944 https://exchange.xforce.ibmcloud.com/vulnerabilities/16897 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9854 https://access.redhat.com/security/cve/CVE-2004-0494 https://bugzilla.redhat.com/show_bug.cgi?id=1617212 •

CVSS: 2.1EPSS: 0%CPEs: 87EXPL: 1

Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory. • https://www.exploit-db.com/exploits/375 ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000879 http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:087 http://www.redhat.com/support/errata/RHSA-2004-413.html http://www.redhat.com/support/errata/RHSA-2004-418.html https://exchange.xforce.ibmcloud.com/vulnerabilities/16 •

CVSS: 10.0EPSS: 26%CPEs: 13EXPL: 3

Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX) 12.17.2 through 12.17.4 allow remote attackers to execute arbitrary code via certain WAV file header fields. Múltiples desbordamientos de búfer en Sound eXchange (SoX) anteriores a 12.17 permite a atacantes remotos ejecutar código arbitrario mediante ciertos campos de cabecera de ficheros WAV. • https://www.exploit-db.com/exploits/374 https://www.exploit-db.com/exploits/369 http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0014.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000855 http://lwn.net/Articles/95529 http://lwn.net/Articles/95530 http://seclists.org/fulldisclosure/2004/Jul/1227.html http://secunia.com/advisories/12175 http://www.debian.org/security/2004/dsa-565 http://www.gentoo.org/security/en/glsa/glsa-200407-23.xml h •

CVSS: 6.8EPSS: 93%CPEs: 38EXPL: 2

The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities. La función strip_tags en PHP 4.x hasta 4.3.7, y 5.x hasta 5.0.0RC3, no filtra caractéres null() dentro de nombreres de etiquetas cuanto se restringe la entrada a etiquetas permitidas, lo que permite que etiquetas peligrosas sean procesadas por navegadores como Internet Explorer y Safari, que ignoran caractéres nulos y facilita la explotación de vulnerabilidades de secuencias de comandos en sitios cruzados (XSS). • https://www.exploit-db.com/exploits/24280 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000847 http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023909.html http://marc.info/?l=bugtraq&m=108981780109154&w=2 http://marc.info/?l=bugtraq&m=108982983426031&w=2 http://marc.info/?l=bugtraq&m=109051444105182&w=2 http://marc.info/? •

CVSS: 5.0EPSS: 4%CPEs: 12EXPL: 1

The iSNS dissector for Ethereal 0.10.3 through 0.10.4 allows remote attackers to cause a denial of service (process abort) via an integer overflow. El diseccionador iSNS de Ehtereal 0.10.3 a 0.10.4 permite a atacanttes remotos causar una denegación de servicio (aborto del proceso) mediante un desbordamiento de enteros. • https://www.exploit-db.com/exploits/24259 http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916 http://secunia.com/advisories/12024 http://securitytracker.com/id?1010655 http://www.ethereal.com/appnotes/enpa-sa-00015.html http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml http://www.kb.cert.org/vuls/id/829422 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:067 http:&#x •