Page 4 of 92 results (0.018 seconds)

CVSS: 5.0EPSS: 6%CPEs: 11EXPL: 0

Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client. • http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1070 http://www.debian.org/security/2006/dsa-1082 http://www.novell.com/linux/security/advisories/2005_18_kernel.html http://www.redhat.com/support/errata/RHSA-2005-283.html http://www.redhat.com/support/errata/RHSA-2005-284.h •

CVSS: 2.1EPSS: 0%CPEs: 183EXPL: 0

Unknown vulnerability in Linux kernel 2.4.x, 2.5.x, and 2.6.x allows NFS clients to cause a denial of service via O_DIRECT. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000930 http://www.redhat.com/support/errata/RHSA-2005-366.html http://www.securityfocus.com/advisories/7880 http://www.securityfocus.com/bid/12330 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11001 https://access.redhat.com/security/cve/CVE-2005-0207 https://bugzilla.redhat.com/show_bug.cgi?id=1617494 •

CVSS: 7.5EPSS: 0%CPEs: 56EXPL: 0

xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command. • http://bugs.gentoo.org/show_bug.cgi?id=79762 http://secunia.com/advisories/14459 http://secunia.com/advisories/14462 http://security.gentoo.org/glsa/glsa-200503-05.xml http://support.avaya.com/elmodocs2/security/ASA-2005-134_RHSA-2005-332.pdf http://www.debian.org/security/2005/dsa-695 http://www.osvdb.org/14365 http://www.redhat.com/support/errata/RHSA-2005-332.html http://www.securityfocus.com/archive/1/433935/30/5010/threaded http://www.securityfocus.com/bi •

CVSS: 7.5EPSS: 1%CPEs: 56EXPL: 0

Multiple vulnerabilities in xli before 1.17 may allow remote attackers to execute arbitrary code via "buffer management errors" from certain image properties, some of which may be related to integer overflows in PPM files. • http://bugs.gentoo.org/show_bug.cgi?id=79762 http://secunia.com/advisories/14459 http://security.gentoo.org/glsa/glsa-200503-05.xml http://www.debian.org/security/2005/dsa-695 •

CVSS: 7.5EPSS: 1%CPEs: 82EXPL: 0

scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.5/SCOSA-2006.5.txt ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.57/SCOSA-2005.57.txt ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U http://bugs.gentoo.org/show_bug.cgi?id=83598 http://bugs.gentoo.org/show_bug.cgi?id=83655 http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html http://secunia.c •