Page 33 of 289 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 1

Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length). Desbordamiento de búfer en la función mysql_real_connect de MySQL 4.x anteriores a 3.0.21 y 3.x anteriores a 3.23.49 permite a servidores DNS remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante una respuesta DNS con un un tamaño de dirección largo (h_length). • http://bugs.mysql.com/bug.php?id=4017 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892 http://lists.mysql.com/internals/14726 http://marc.info/?l=bugtraq&m=110140517515735&w=2 http://secunia.com/advisories/12305 http://www.ciac.org/ciac/bulletins/p-018.shtml http://www.debian.org/security/2004/dsa-562 http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml http://www.redhat.com/support/errata/RHSA-2004-597.html http://www.redhat.com& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 3

MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities. MySQL 4 anteriores a 4.0.21 y 3.x anteriores a 3.23.49 comprueban los derechos CREATE/INSERT de la tabla original en lugar de los de la tabla de destino en una operación ALTER TABLE RANAME, lo que podría permitir a atacantes realizar actividades no permitidas. • https://www.exploit-db.com/exploits/24669 http://bugs.mysql.com/bug.php?id=3270 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892 http://lists.mysql.com/internals/13073 http://secunia.com/advisories/12783 http://securitytracker.com/id?1011606 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1 http://www.ciac.org/ciac/bulletins/p-018.shtml http://www.debian.org/security/2004/dsa-562 http://www.gentoo.org/security/en/glsa/glsa-200 •

CVSS: 2.6EPSS: 0%CPEs: 4EXPL: 1

MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs. MySQL 4 anteriores a 4.0.21 y 3.x anteriores a 3.23.49 permiten a atacantes causar una denegación de servicio (caída o cuelgue) mediante múltiples hilos de ejecución que alterán simultaneamente UNIONes de tablas MERGE. • http://bugs.mysql.com/2408 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892 http://lists.mysql.com/internals/16168 http://lists.mysql.com/internals/16173 http://lists.mysql.com/internals/16174 http://marc.info/?l=bugtraq&m=110140517515735&w=2 http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15 http://secunia.com/advisories/12783 http://securitytracker.com/id?1011606 http://sunsolve.sun.com/search/document.do?assetkey=1-26- •

CVSS: 2.1EPSS: 0%CPEs: 15EXPL: 0

Roaring Penguin pppoe (rp-ppoe), if installed or configured to run setuid root contrary to its design, allows local users to overwrite arbitrary files. NOTE: the developer has publicly disputed the claim that this is a vulnerability because pppoe "is NOT designed to run setuid-root." Therefore this identifier applies *only* to those configurations and installations under which pppoe is run setuid root despite the developer's warnings. Roaring Penguin pppoe, cuando se ejecuta con setuid root, no libera privilegios adecuadamente, lo que permite a usuarios locales sobreescribir ficheros arbitrarios. • http://marc.info/?l=bugtraq&m=110247119200510&w=2 http://marc.info/?l=bugtraq&m=110253341209450&w=2 http://www.debian.org/security/2004/dsa-557 http://www.fedoralegacy.org/updates/FC1/2005-11-14-FLSA_2005_152794__Updated_rp_pppoe_package_fixes_security_issue.html http://www.securityfocus.com/bid/11315 https://exchange.xforce.ibmcloud.com/vulnerabilities/17576 •

CVSS: 7.5EPSS: 0%CPEs: 12EXPL: 0

Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages. Sendmail anteriores a 8.12.3 sobre Debina GNU/Linux, cuando se usa sasl y sasl-bin, utiliza un script de configuración de Sendmail con un nombre y contraseña fijos, lo que podría permitir a atacantes remotos usar Sendmail como un relé de correo abierto y enviar mensajes de spam. • http://secunia.com/advisories/12667 http://www.debian.org/security/2004/dsa-554 http://www.securityfocus.com/bid/11262 https://exchange.xforce.ibmcloud.com/vulnerabilities/17531 •