Page 36 of 185 results (0.006 seconds)

CVSS: 5.0EPSS: 0%CPEs: 51EXPL: 0

ServerAdmin in Mac OS X 10.2.8 through 10.3.5 uses the same example self-signed certificate on each system, which allows remote attackers to decrypt sessions. • http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html http://www.securityfocus.com/bid/11322 •

CVSS: 5.0EPSS: 11%CPEs: 75EXPL: 1

Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888 http://marc.info/?l=bugtraq&m=109779465621929&w=2 http://secunia.com/advisories/12818 http://securitytracker.com/id?1011674 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1 http://sunsolve.sun.com/search/document.do? •

CVSS: 7.5EPSS: 6%CPEs: 74EXPL: 0

Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files. Múltiples vulnerabilidades en los decodificadores RLE (run length encoding) de libtiff 3.6.1 y anteriores, relacionadas con desbordamientos de enteros y de búfer, permite a atacantes remotos ejecutar código arbitrario mediante ficheros TIFF. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888 http://marc.info/?l=bugtraq&m=109778785107450&w=2 http://scary.beasts.org/security/CESA-2004-006.txt http://secunia.com/advisories/12818 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1 http://www.debian.org/security/2004/dsa-567 http://www.gentoo.org/security/en/glsa/glsa-200410-11.xml http://www.kb.cert& •

CVSS: 2.1EPSS: 0%CPEs: 51EXPL: 0

CUPS 1.1.20 and earlier records authentication information for a device URI in the error_log file, which allows local users to obtain user names and passwords. • http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html http://www.ciac.org/ciac/bulletins/p-002.shtml http://www.debian.org/security/2004/dsa-566 http://www.kb.cert.org/vuls/id/557062 http://www.mandriva.com/security/advisories?name=MDKSA-2004:116 http://www.redhat.com/support/errata/RHSA-2004-543.html http://www.securityfocus.com/bid/11324 https://exchange.xforce.ibmcloud.com/vulnerabilities/17593 https://oval.cisecurity.org/repository/search/definition/ov •

CVSS: 7.5EPSS: 3%CPEs: 86EXPL: 0

Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code. • http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml http://www.linuxcompatible.org/print42495.html http://www.mandriva.com/security/advisories?name=MDKSA-2005:054 http://www.monkey.org/openbsd/archive/ports/0407/msg00265.html http://www.securityfocus.com/bid/11347 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c.diff?r1=1.170&r2=1.171 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c?rev=1.171&content-type •