Page 4 of 24 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 61EXPL: 0

Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files. • http://marc.info/?l=bugtraq&m=110356286722875&w=2 http://secunia.com/advisories/13586 http://www.gentoo.org/security/en/glsa/glsa-200501-16.xml http://www.heise.de/security/dienste/browsercheck/tests/java.shtml http://www.kb.cert.org/vuls/id/420222 http://www.kde.org/info/security/advisory-20041220-1.txt http://www.mandriva.com/security/advisories?name=MDKSA-2004:154 http://www.redhat.com/support/errata/RHSA-2005-065.html https://exchange.xforce.ibmcloud.com/vulnera •

CVSS: 7.2EPSS: 0%CPEs: 58EXPL: 1

Multiple buffer overflows in the RtConfigLoad function in rt-config.c for Atari800 before 1.3.4 allow local users to execute arbitrary code via large values in the configuration file. Múltiples desbordamientos de búfer en la función RtConfigLoad en Atari800 1.3.1 permite usuarios locales ejecutar código arbitrrio mediante valores grandes en el fichero de configuración. • http://cvs.sourceforge.net/viewcvs.py/atari800/atari800/DOC/ChangeLog?view=markup http://marc.info/?l=bugtraq&m=110142899319841&w=2 http://marc.info/?l=bugtraq&m=110149441815270&w=2 http://secunia.com/advisories/13670 http://www.debian.org/security/2004/dsa-609 http://www.osvdb.org/12610 http://www.securityfocus.com/bid/11756 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in Eterm 0.9.2 allows local users to gain privileges via a long ETERMPATH environment variable. Desbordamiento de búfer en Eterm 0.9.2 permite a usuarios locales ganar privilegios mediante una variable de entorno ETERMPATH larga. • http://marc.info/?l=bugtraq&m=105427580626001&w=2 http://www.debian.org/security/2003/dsa-309 http://www.securityfocus.com/bid/7708 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

gPS before 1.1.0 does not properly follow the rgpsp connection source acceptation policy as specified in the rgpsp.conf file, which could allow unauthorized remote attackers to connect to rgpsp. gPS anterior a 1.1.0 no sigue correctamente la política rgpsp de aceptación de fuente de conexión tal y como se especifica en el fichero rgpsp.conf, lo que podría permitir a atacantes remotos no autorizados a conectarse a rgpsp • http://gps.seul.org/changelog.html http://www.debian.org/security/2003/dsa-307 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Multiple buffer overflows in gPS before 1.0.0 allow attackers to cause a denial of service and possibly execute arbitrary code. Múltiples desbordamientos de búfer en gPS anterior a la 1.0.0 permiten que atacantes remotos provoquen una denegación de servicio y posiblemente ejecuten código arbitrario. • http://gps.seul.org/changelog.html http://www.debian.org/security/2003/dsa-307 •