CVE-2004-1145
https://notcve.org/view.php?id=CVE-2004-1145
Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files. • http://marc.info/?l=bugtraq&m=110356286722875&w=2 http://secunia.com/advisories/13586 http://www.gentoo.org/security/en/glsa/glsa-200501-16.xml http://www.heise.de/security/dienste/browsercheck/tests/java.shtml http://www.kb.cert.org/vuls/id/420222 http://www.kde.org/info/security/advisory-20041220-1.txt http://www.mandriva.com/security/advisories?name=MDKSA-2004:154 http://www.redhat.com/support/errata/RHSA-2005-065.html https://exchange.xforce.ibmcloud.com/vulnera •
CVE-2004-1076
https://notcve.org/view.php?id=CVE-2004-1076
Multiple buffer overflows in the RtConfigLoad function in rt-config.c for Atari800 before 1.3.4 allow local users to execute arbitrary code via large values in the configuration file. Múltiples desbordamientos de búfer en la función RtConfigLoad en Atari800 1.3.1 permite usuarios locales ejecutar código arbitrrio mediante valores grandes en el fichero de configuración. • http://cvs.sourceforge.net/viewcvs.py/atari800/atari800/DOC/ChangeLog?view=markup http://marc.info/?l=bugtraq&m=110142899319841&w=2 http://marc.info/?l=bugtraq&m=110149441815270&w=2 http://secunia.com/advisories/13670 http://www.debian.org/security/2004/dsa-609 http://www.osvdb.org/12610 http://www.securityfocus.com/bid/11756 •
CVE-2003-0382
https://notcve.org/view.php?id=CVE-2003-0382
Buffer overflow in Eterm 0.9.2 allows local users to gain privileges via a long ETERMPATH environment variable. Desbordamiento de búfer en Eterm 0.9.2 permite a usuarios locales ganar privilegios mediante una variable de entorno ETERMPATH larga. • http://marc.info/?l=bugtraq&m=105427580626001&w=2 http://www.debian.org/security/2003/dsa-309 http://www.securityfocus.com/bid/7708 •
CVE-2003-0361
https://notcve.org/view.php?id=CVE-2003-0361
gPS before 1.1.0 does not properly follow the rgpsp connection source acceptation policy as specified in the rgpsp.conf file, which could allow unauthorized remote attackers to connect to rgpsp. gPS anterior a 1.1.0 no sigue correctamente la política rgpsp de aceptación de fuente de conexión tal y como se especifica en el fichero rgpsp.conf, lo que podría permitir a atacantes remotos no autorizados a conectarse a rgpsp • http://gps.seul.org/changelog.html http://www.debian.org/security/2003/dsa-307 •
CVE-2003-0360
https://notcve.org/view.php?id=CVE-2003-0360
Multiple buffer overflows in gPS before 1.0.0 allow attackers to cause a denial of service and possibly execute arbitrary code. Múltiples desbordamientos de búfer en gPS anterior a la 1.0.0 permiten que atacantes remotos provoquen una denegación de servicio y posiblemente ejecuten código arbitrario. • http://gps.seul.org/changelog.html http://www.debian.org/security/2003/dsa-307 •