Page 4 of 20 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Multiple buffer overflows in gPS before 1.0.0 allow attackers to cause a denial of service and possibly execute arbitrary code. Múltiples desbordamientos de búfer en gPS anterior a la 1.0.0 permiten que atacantes remotos provoquen una denegación de servicio y posiblemente ejecuten código arbitrario. • http://gps.seul.org/changelog.html http://www.debian.org/security/2003/dsa-307 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in gPS before 0.10.2 may allow local users to cause a denial of service (SIGSEGV) in rgpsp via long command lines. Desbordamiento de búfer en gPS anterior a la 0.10.2 permite que usuarios locales provoquen una denegación de servicio (generando señal SIGSEGV) en rgpsp por medio de una línea de comandos muy larga. • http://gps.seul.org/changelog.html http://www.debian.org/security/2003/dsa-307 •

CVSS: 7.5EPSS: 31%CPEs: 9EXPL: 1

Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function. • https://www.exploit-db.com/exploits/20908 http://archives.neohapsis.com/archives/bugtraq/2001-06/0064.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000404 http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-024-01 http://www.ciac.org/ciac/bulletins/l-104.shtml http://www.debian.org/security/2001/dsa-063 http://www.linuxsecurity.com/advisories/other_advisory-1469.html http://www.redhat.com/support/errata/RHSA-2001-075.html http://www.securi •

CVSS: 3.6EPSS: 0%CPEs: 2EXPL: 0

Vulnerability in exuberant-ctags before 3.2.4-0.1 insecurely creates temporary files. • http://www.osvdb.org/5642 https://exchange.xforce.ibmcloud.com/vulnerabilities/6388 https://www.debian.org/security/2001/dsa-046 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Buffer overflow in (1) wrapping and (2) unwrapping functions of slrn news reader before 0.9.7.0 allows remote attackers to execute arbitrary commands via a long message header. • http://archives.neohapsis.com/archives/freebsd/2001-04/0610.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000383 http://marc.info/?l=bugtraq&m=98471253131191&w=2 http://www.debian.org/security/2001/dsa-040 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-028.php3 http://www.redhat.com/support/errata/RHSA-2001-028.html http://www.securityfocus.com/bid/2493 https://exchange.xforce.ibmcloud.com/vulnerabilities/6213 •