Page 4 of 21 results (0.008 seconds)

CVSS: 7.5EPSS: 35%CPEs: 31EXPL: 0

Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail. Desbordamiento de búfer en el montón en rsync anteriores a 2.5.7, cuando se ejecuta en modo servidor, permite a atacantes remotos ejecutar código arbitrario y posiblemente escapar del confinamiento chroot. • ftp://patches.sgi.com/support/free/security/advisories/20031202-01-U http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000794 http://marc.info/?l=bugtraq&m=107055681311602&w=2 http://marc.info/?l=bugtraq&m=107055684711629&w=2 http://marc.info/?l=bugtraq&m=107055702911867&w=2 http://marc.info/? •

CVSS: 7.5EPSS: 9%CPEs: 13EXPL: 0

CVS server before 1.11.10 may allow attackers to cause the CVS server to create directories and files in the file system root directory via malformed module requests. Vulnerabilidad desconocida en servidores CVS anteriores a 1.11.10 puede permitir a atacantes causar que el servidor CVS cree directorios y ficheros en el directorio raíz del sistema de ficheros. • ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc http://ccvs.cvshome.org/servlets/NewsItemView?newsID=84&JServSessionIdservlets=8u3x1myav1 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000808 http://marc.info/?l=bugtraq&m=107168035515554&w=2 http://marc.info/?l=bugtraq&m=107540163908129&w=2 http://secunia.com/advisories/10601 http://www.debian.org/security/2004/dsa-422 http&# •

CVSS: 5.0EPSS: 5%CPEs: 2EXPL: 2

CUPS before 1.1.19 allows remote attackers to cause a denial of service via a partial printing request to the IPP port (631), which does not time out. CUPS anterior a la 1.1.19 permite que atacantes remotos causen una denegación de servicio por media de una petición parcial de impresión al puerto IPP (631), que nunca finalizará. • https://www.exploit-db.com/exploits/22619 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000678 http://marc.info/?l=bugtraq&m=105427288724449&w=2 http://www.debian.org/security/2003/dsa-317 http://www.mandriva.com/security/advisories?name=MDKSA-2003:062 http://www.novell.com/linux/security/advisories/2003_028.html http://www.redhat.com/support/errata/RHSA-2003-171.html http://www.securityfocus.com/bid/7637 http://www.turbolinux.com/security/TLSA-2003-33. •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

rc.M in Slackware 9.0 calls quotacheck with the -M option, which causes the filesystem to be remounted and possibly reset security-relevant mount flags such as nosuid, nodev, and noexec. • http://marc.info/?l=bugtraq&m=105361968110719&w=2 •

CVSS: 4.6EPSS: 0%CPEs: 15EXPL: 5

Buffer overflow in efstools in Bonobo, when installed setuid, allows local users to execute arbitrary code via long command line arguments. • https://www.exploit-db.com/exploits/21583 https://www.exploit-db.com/exploits/21584 https://www.exploit-db.com/exploits/21585 http://online.securityfocus.com/archive/1/279676 http://www.iss.net/security_center/static/9451.php http://www.securiteam.com/exploits/5AP0E0K8AO.html http://www.securityfocus.com/bid/5125 •