Page 4 of 22 results (0.006 seconds)

CVSS: 5.0EPSS: 0%CPEs: 28EXPL: 0

Multiple format string vulnerabilities in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code. Mútiples vulnerabilidades de cadena de formato en Midnight Commander (mc) anteriores a 4.6.0 pueden permitir a atacantes causar una denegación de servicio o ejecutar código de su elección. • http://security.gentoo.org/glsa/glsa-200405-21.xml http://www.debian.org/security/2004/dsa-497 http://www.mandriva.com/security/advisories?name=MDKSA-2004:039 http://www.novell.com/linux/security/advisories/2004_12_mc.html http://www.redhat.com/support/errata/RHSA-2004-172.html https://exchange.xforce.ibmcloud.com/vulnerabilities/16021 https://access.redhat.com/security/cve/CVE-2004-0232 https://bugzilla.redhat.com/show_bug.cgi?id=1617181 •

CVSS: 7.5EPSS: 13%CPEs: 3EXPL: 0

Stack-based buffer overflow in vfs_s_resolve_symlink of vfs/direntry.c for Midnight Commander (mc) 4.6.0 and earlier, and possibly later versions, allows remote attackers to execute arbitrary code during symlink conversion. Desbordamiento de búfer basado en la pila en vfs_s_resolve_symlink de vfs/direntry.c en Midnight Commander (mc) 4.6.0 y anteriores, y posiblemente otras versiones permite a atacantes remotos ejecutar código arbitrario durante una conversión de enlaces simbólicos (symlink). • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-014.0.txt ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc http://archive.cert.uni-stuttgart.de/bugtraq/2003/09/msg00309.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000833 http://fedoranews.org/updates/FEDORA-2004-058.shtml http://marc.info/?l=bugtraq&m=108118433222764&w=2 http://rhn.redhat.com/errata&#x •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in mcedit in Midnight Commander 4.5.1 allows local users to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted text file. • http://www.kb.cert.org/vuls/id/203203 https://exchange.xforce.ibmcloud.com/vulnerabilities/10630 •

CVSS: 4.6EPSS: 0%CPEs: 12EXPL: 0

Midnight Commander (mc) 4.5.51 and earlier does not properly process malformed directory names when a user opens a directory, which allows other local users to gain privileges by creating directories that contain special characters followed by the commands to be executed. • http://archives.neohapsis.com/archives/bugtraq/2000-11/0373.html http://www.debian.org/security/2001/dsa-036 http://www.novell.com/linux/security/advisories/2001_011_mc.html http://www.securityfocus.com/bid/2016 https://exchange.xforce.ibmcloud.com/vulnerabilities/5929 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

cons.saver in Midnight Commander (mc) 4.5.42 and earlier does not properly verify if an output file descriptor is a TTY, which allows local users to corrupt files by creating a symbolic link to the target file, calling mc, and specifying that link as a TTY argument. • http://archives.neohapsis.com/archives/bugtraq/2000-11/0192.html http://www.debian.org/security/2000/20001125 http://www.linux-mandrake.com/en/security/MDKSA-2000-078.php3 http://www.securityfocus.com/bid/1945 https://exchange.xforce.ibmcloud.com/vulnerabilities/5519 •