Page 4 of 24 results (0.004 seconds)

CVSS: 7.5EPSS: 2%CPEs: 15EXPL: 0

Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message. • ftp://patches.sgi.com/support/free/security/advisories/20011104-01-I http://www.cert.org/advisories/CA-2001-25.html http://www.kb.cert.org/vuls/id/206723 http://www.securityfocus.com/bid/3290 https://exchange.xforce.ibmcloud.com/vulnerabilities/7088 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 43%CPEs: 1EXPL: 1

Network Associates PGP Keyserver 7.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via exceptional BER encodings (possibly buffer overflows), as demonstrated by the PROTOS LDAPv3 test suite. • https://www.exploit-db.com/exploits/16823 http://ciac.llnl.gov/ciac/bulletins/l-116.shtml http://www.cert.org/advisories/CA-2001-18.html http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/ldapv3 http://www.kb.cert.org/vuls/id/765256 http://www.kb.cert.org/vuls/id/JPLA-4WESNK http://www.securityfocus.com/bid/3046 https://exchange.xforce.ibmcloud.com/vulnerabilities/6900 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 1

ASCII Armor parser in Windows PGP 7.0.3 and earlier allows attackers to create files in arbitrary locations via a malformed ASCII armored file. • https://www.exploit-db.com/exploits/20738 http://www.atstake.com/research/advisories/2001/a040901-1.txt http://www.osvdb.org/1782 http://www.securityfocus.com/bid/2556 https://exchange.xforce.ibmcloud.com/vulnerabilities/6643 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

The OpenPGP PGP standard allows an attacker to determine the private signature key via a cryptanalytic attack in which the attacker alters the encrypted private key file and captures a single message signed with the signature key. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2001-017.0.txt http://archives.neohapsis.com/archives/bugtraq/2001-03/0252.html http://archives.neohapsis.com/archives/bugtraq/2001-03/0274.html http://archives.neohapsis.com/archives/bugtraq/2001-03/0311.html http://www.osvdb.org/11966 http://www.redhat.com/support/errata/RHSA-2001-063.html http://www.securityfocus.com/bid/2673 https://exchange.xforce.ibmcloud.com/vulnerabilities/6558 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

The split key mechanism used by PGP 7.0 allows a key share holder to obtain access to the entire key by setting the "Cache passphrase while logged on" option and capturing the passphrases of other share holders as they authenticate. • http://marc.info/?l=bugtraq&m=98691775527457&w=2 •