Page 4 of 57 results (0.020 seconds)

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

libuser 0.51.7 allows attackers to cause a denial of service (crash or disk consumption) via unknown attack vectors, related to read failures and other bugs. • http://securitytracker.com/id?1010187 http://www.mandriva.com/security/advisories?name=MDKSA-2004:044 http://www.redhat.com/support/errata/RHSA-2005-770.html http://www.securityfocus.com/bid/10368 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120168 https://exchange.xforce.ibmcloud.com/vulnerabilities/16188 https://access.redhat.com/security/cve/CVE-2004-2392 https://bugzilla.redhat.com/show_bug.cgi?id=1617424 •

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 0

passwd 0.68 does not check the return code for the pam_start function, which has unknown impact and attack vectors that may prevent "safe and proper operation" of PAM. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120060 http://www.mandriva.com/security/advisories?name=MDKSA-2004:045 http://www.securityfocus.com/bid/10370 https://exchange.xforce.ibmcloud.com/vulnerabilities/16179 •

CVSS: 2.1EPSS: 0%CPEs: 11EXPL: 0

Off-by-one error in passwd 0.68 and earlier, when using the --stdin option, causes passwd to use the first 78 characters of a password instead of the first 79, which results in a small reduction of the search space required for brute force attacks. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120060 http://www.mandriva.com/security/advisories?name=MDKSA-2004:045 http://www.securityfocus.com/bid/10370 https://exchange.xforce.ibmcloud.com/vulnerabilities/16178 •

CVSS: 10.0EPSS: 4%CPEs: 78EXPL: 0

Heap-based buffer overflow in the pnm_get_chunk function for xine 0.99.2, and other packages such as MPlayer that use the same code, allows remote attackers to execute arbitrary code via long PNA_TAG values, a different vulnerability than CVE-2004-1188. • http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21 http://www.idefense.com/application/poi/display?id=176&type=vulnerabilities http://www.mandriva.com/security/advisories?name=MDKSA-2005:011 http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff https://exchange.xforce.ibmcloud.com/vulnerabilities/18640 •

CVSS: 10.0EPSS: 0%CPEs: 78EXPL: 0

The pnm_get_chunk function in xine 0.99.2 and earlier, and other packages such as MPlayer that use the same code, does not properly verify that the chunk size is less than the PREAMBLE_SIZE, which causes a read operation with a negative length that leads to a buffer overflow via (1) RMF_TAG, (2) DATA_TAG, (3) PROP_TAG, (4) MDPR_TAG, and (5) CONT_TAG values, a different vulnerability than CVE-2004-1187. • http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21 http://www.idefense.com/application/poi/display?id=177&type=vulnerabilities http://www.mandriva.com/security/advisories?name=MDKSA-2005:011 http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff https://exchange.xforce.ibmcloud.com/vulnerabilities/18638 •