Page 31 of 172 results (0.020 seconds)

CVSS: 5.0EPSS: 20%CPEs: 75EXPL: 1

Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888 http://marc.info/?l=bugtraq&m=109779465621929&w=2 http://secunia.com/advisories/12818 http://securitytracker.com/id?1011674 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1 http://sunsolve.sun.com/search/document.do? •

CVSS: 7.5EPSS: 7%CPEs: 74EXPL: 0

Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files. Múltiples vulnerabilidades en los decodificadores RLE (run length encoding) de libtiff 3.6.1 y anteriores, relacionadas con desbordamientos de enteros y de búfer, permite a atacantes remotos ejecutar código arbitrario mediante ficheros TIFF. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888 http://marc.info/?l=bugtraq&m=109778785107450&w=2 http://scary.beasts.org/security/CESA-2004-006.txt http://secunia.com/advisories/12818 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1 http://www.debian.org/security/2004/dsa-567 http://www.gentoo.org/security/en/glsa/glsa-200410-11.xml http://www.kb.cert& •

CVSS: 2.1EPSS: 0%CPEs: 51EXPL: 0

CUPS 1.1.20 and earlier records authentication information for a device URI in the error_log file, which allows local users to obtain user names and passwords. • http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html http://www.ciac.org/ciac/bulletins/p-002.shtml http://www.debian.org/security/2004/dsa-566 http://www.kb.cert.org/vuls/id/557062 http://www.mandriva.com/security/advisories?name=MDKSA-2004:116 http://www.redhat.com/support/errata/RHSA-2004-543.html http://www.securityfocus.com/bid/11324 https://exchange.xforce.ibmcloud.com/vulnerabilities/17593 https://oval.cisecurity.org/repository/search/definition/ov •

CVSS: 7.5EPSS: 3%CPEs: 86EXPL: 0

Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code. • http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml http://www.linuxcompatible.org/print42495.html http://www.mandriva.com/security/advisories?name=MDKSA-2005:054 http://www.monkey.org/openbsd/archive/ports/0407/msg00265.html http://www.securityfocus.com/bid/11347 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c.diff?r1=1.170&r2=1.171 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c?rev=1.171&content-type •

CVSS: 5.0EPSS: 0%CPEs: 28EXPL: 0

Safari in Mac OS X before 10.3.5, after sending form data using the POST method, may re-send the data to a GET method URL if that URL is redirected after the POST data and the user uses the forward or backward buttons, which may cause an information leak. Safari para Mac OS X anteriores a 10.3.5, despues de enviar datos de formualarios con el método POST, puede reenviar los datos a un método GET si esa URL es redirigida después de que los datos POST y el usuario utiliza los botones "Atrás" y "Adelante", lo que puede causar un filtrado de información. • http://lists.apple.com/mhonarc/security-announce/msg00056.html http://www.kb.cert.org/vuls/id/128414 https://exchange.xforce.ibmcloud.com/vulnerabilities/16944 •