Page 4 of 44 results (0.024 seconds)

CVSS: 10.0EPSS: 97%CPEs: 81EXPL: 14

Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code. Desbordamiento de búfer en la función call_trans2open en trans2.c de Samba 2.2.x anteriores a 2.2.8a, 2.0.10 y versiones anteriores 2.0.x, y Samba-TNG anteriores a de 0.3.2, permite a atacantes remotos ejecutar código arbitrario. • https://www.exploit-db.com/exploits/16880 https://www.exploit-db.com/exploits/55 https://www.exploit-db.com/exploits/7 https://www.exploit-db.com/exploits/16861 https://www.exploit-db.com/exploits/10 https://www.exploit-db.com/exploits/16876 https://www.exploit-db.com/exploits/9924 https://www.exploit-db.com/exploits/16330 https://www.exploit-db.com/exploits/22469 https://www.exploit-db.com/exploits/22471 https://www.exploit-db.com/exploits/22470 https: •

CVSS: 10.0EPSS: 17%CPEs: 111EXPL: 2

The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337. • https://www.exploit-db.com/exploits/24 https://www.exploit-db.com/exploits/22442 ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000614 http://lists.apple.com/mhonarc/secur •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 4

Multiple buffer overflows in HP Tru64 UNIX 5.x allow local users to execute arbitrary code via (1) a long -contextDir argument to dtaction, (2) a long -p argument to dtprintinfo, (3) a long -customization argument to dxterm, or (4) a long DISPLAY environment variable to dtterm. • http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtaction.txt http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtprintinfo.txt http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtterm.txt http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dxterm.txt http://www.kb.cert.org/vuls/id/202939 http://www.kb.cert.org/vuls/id/600699 http://www.kb.cert.org/vuls/id/836275 http:/&#x •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

Unknown vulnerability in inetd in HP Tru64 Unix 4.0f through 5.1a allows remote attackers to cause a denial of service via unknown attack vectors. • http://online.securityfocus.com/advisories/4288 http://www.iss.net/security_center/static/9614.php http://www.securityfocus.com/bid/5242 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in libc in Compaq Tru64 4.0F, 5.0, 5.1 and 5.1A allows attackers to execute arbitrary code via long (1) LANG and (2) LOCPATH environment variables. • http://cert.uni-stuttgart.de/archive/bugtraq/2002/04/msg00219.html http://ftp.support.compaq.com/patches/.new/html/SSRT-541.shtml http://www.iss.net/security_center/static/8863.php http://www.lac.co.jp/security/english/snsadv_e/51_e.html http://www.securityfocus.com/bid/4544 •