Page 40 of 289 results (0.008 seconds)

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

The Sendmail 8.12.3 package in Debian GNU/Linux 3.0 does not securely create temporary files, which could allow local users to gain additional privileges via (1) expn, (2) checksendmail, or (3) doublebounce.pl. • http://bugs.debian.org/496408 http://dev.gentoo.org/~rbu/security/debiantemp/sendmail-base http://www.debian.org/security/2003/dsa-305 http://www.openwall.com/lists/oss-security/2008/10/30/2 https://bugs.gentoo.org/show_bug.cgi?id=235770 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

Unknown vulnerability in apcupsd before 3.8.6, and 3.10.x before 3.10.5, allows remote attackers to gain root privileges, possibly via format strings in a request to a slave server. Vulnerabilidad desconocida en apcupsd anteriores a 3.8.6, y 3.10.x anteriores a 3.10.5 permite a atacantes remotos ganar privilegios de root, posiblemente mediante cadenas de formato en una petición a un servidor esclavo. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-015.0.txt http://cvs.sourceforge.net/cgi-bin/viewcvs.cgi/apcupsd/apcupsd/src/apcnisd.c.diff?r1=1.5&r2=1.6 http://hsj.shadowpenguin.org/misc/apcupsd_exp.txt http://securitytracker.com/id?1006108 http://sourceforge.net/project/shownotes.php?release_id=137900 http://www.debian.org/security/2003/dsa-277 http://www.iss.net/security_center/static/11334.php http://www.mandriva.com/security/advisories?name=MDKSA-2003:018 h •

CVSS: 4.9EPSS: 0%CPEs: 77EXPL: 2

The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network. • ftp://patches.sgi.com/support/free/security/advisories/20020901-01-A http://online.securityfocus.com/archive/1/276968 http://secunia.com/advisories/18510 http://secunia.com/advisories/18562 http://secunia.com/advisories/18684 http://www.cs.ucsb.edu/~krishna/igmp_dos http://www.redhat.com/support/errata/RHSA-2006-0101.html http://www.redhat.com/support/errata/RHSA-2006-0140.html http://www.redhat.com/support/errata/RHSA-2006-0190.html http://www.redhat.com/support&# •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 1

Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check the return values of various file and socket operations, which could allow a remote attacker to cause a denial of service (resource exhaustion) by causing file descriptors to be assigned and not released, as demonstrated by fanta. Common Unix Printing System (CUPS) 1.1.14 a 1.1.17 no comprueba adecuadamente los valores de retorno de varias operaciones de ficheros y sockets, lo que podría permitir a un atacante remoto causar una denegación de servicio (consumición de recursos) haciendo que descriptores de ficheros sean asignados y no liberados, como ha sido demostrado por fanta. • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000702 http://marc.info/?l=bugtraq&m=104032149026670&w=2 http://www.debian.org/security/2003/dsa-232 http://www.idefense.com/advisory/12.19.02.txt http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001 http://www.novell.com/linux/security/advisories/2003_002_cups.html http://www.redhat.com/support/errata/RHSA-2002-295.html http:// • CWE-252: Unchecked Return Value •

CVSS: 5.0EPSS: 3%CPEs: 33EXPL: 0

Memory leak in ypdb_open in yp_db.c for ypserv before 2.5 in the NIS package 3.9 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of requests for a map that does not exist. Fuga de memoria en ypdb_open en yp_db.c en ypserv anteriores a 2.5 en el paquete NIS 3.9 y anteriores permite a atacantes remotos causar una denegación de servicio (consumición de memoria) mediante un número grande de peticiones de un mapa inexistente. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-054.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000539 http://marc.info/?l=bugtraq&m=103582692228894&w=2 http://online.securityfocus.com/advisories/4605 http://www.debian.org/security/2002/dsa-180 http://www.iss.net/security_center/static/10423.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-078.php http://www.redhat.com/support/errata/RHSA-2002-223.html http://www.redhat. •