Page 40 of 230 results (0.005 seconds)

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 0

Buffer overflow in the DNS resolver code used in libc, glibc, and libbind, as derived from ISC BIND, allows remote malicious DNS servers to cause a denial of service and possibly execute arbitrary code via the stub resolvers. • ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA2002-006.txt.asc ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.39 ftp://ftp.caldera.com/pub/updates/UnixWare/CSSA-2002-SCO.37 ftp://patches.sgi.com/support/free/security/advisories/20020701-01-I http://archives.neohapsis.com/archives/aix/2002-q3/0001.html http://archives.neohapsis.com/archives/linux/engarde/2002-q3/0002.html http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0000.html http://di •

CVSS: 5.0EPSS: 11%CPEs: 6EXPL: 0

ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype. • ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.24.1/CSSA-2002-SCO.24.1.txt http://archives.neohapsis.com/archives/hp/2002-q3/0022.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000494 http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:038 http://www.cert.org/advisories/CA-2002-15.html http://www.isc.org/index.pl?/sw/bind/bind-security.php http://www.iss.net/security_center/static/9250.php http://www.kb.cert.org/vuls&# •

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 2

Format string vulnerabilities in (1) inews or (2) rnews for INN 2.2.3 and earlier allow local users and remote malicious NNTP servers to gain privileges via format string specifiers in NTTP responses. • https://www.exploit-db.com/exploits/21375 http://archives.neohapsis.com/archives/bugtraq/2002-04/0140.html http://www.iss.net/security_center/static/8834.php http://www.securityfocus.com/bid/4501 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

dnskeygen in BIND 8.2.4 and earlier, and dnssec-keygen in BIND 9.1.2 and earlier, set insecure permissions for a HMAC-MD5 shared secret key file used for DNS Transactional Signatures (TSIG), which allows attackers to obtain the keys and perform dynamic DNS updates. • http://www.osvdb.org/5609 http://xforce.iss.net/alerts/advise78.php https://exchange.xforce.ibmcloud.com/vulnerabilities/6694 • CWE-276: Incorrect Default Permissions •

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 7

Buffer overflow in innfeed for ISC InterNetNews (INN) before 2.3.0 allows local users in the "news" group to gain privileges via a long -c command line argument. • https://www.exploit-db.com/exploits/20777 https://www.exploit-db.com/exploits/20778 https://github.com/alt3kx/CVE-2001-1442 http://archives.neohapsis.com/archives/bugtraq/2001-04/0311.html http://securitytracker.com/id?1001353 http://www.kb.cert.org/vuls/id/943536 http://www.securityfocus.com/archive/1/178011 http://www.securityfocus.com/bid/2620 https://exchange.xforce.ibmcloud.com/vulnerabilities/6398 •