Page 42 of 289 results (0.006 seconds)

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 0

SMB dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via malformed packets that cause Ethereal to dereference a NULL pointer. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-037.0.txt http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000505 http://marc.info/?l=bugtraq&m=102268626526119&w=2 http://www.debian.org/security/2002/dsa-130 http://www.ethereal.com/appnotes/enpa-sa-00004.html http://www.iss.net/security_center/static/9204.php http://www.redhat.com/support/errata/RHSA-2002-036.html http://www.redhat.com/support/errata/RHSA-2002-088.html http://www.securityfocus.com& • CWE-476: NULL Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

Sudo before 1.6.6 contains an off-by-one error that can result in a heap-based buffer overflow that may allow local users to gain root privileges via special characters in the -p (prompt) argument, which are not properly expanded. Desbordamiento del montón (heap) en sudo anteriores a 1.6.6 puede permitir a usuarios locales ganar privilegios de root mediante caractéres especiales en el argumento -p (prompt), que no son expandidos adecuadamente. • https://www.exploit-db.com/exploits/21420 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000475 http://marc.info/?l=bugtraq&m=101974610509912&w=2 http://marc.info/?l=bugtraq&m=101975443619600&w=2 http://marc.info/?l=bugtraq&m=101979472822196&w=2 http://marc.info/? • CWE-131: Incorrect Calculation of Buffer Size •

CVSS: 7.2EPSS: 0%CPEs: 28EXPL: 0

Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling." El desbordamiento del búfer en ncurses 5.0, y el paquete de compatibilidad ncurses4 basado en él, permite a usuarios locales la obtención de privilegios. • http://www.debian.org/security/2002/dsa-113 http://www.iss.net/security_center/static/8222.php http://www.redhat.com/support/errata/RHSA-2002-020.html http://www.securityfocus.com/bid/2116 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.2EPSS: 0%CPEs: 46EXPL: 2

Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice. Corrupción de memoria en el comando "at" permite que usuarios locales ejecuten código arbitrario haciendo uso de un tiempo de ejecución mal escrito (lo que provoca que at libere la misma memoria dos veces). • https://www.exploit-db.com/exploits/21229 http://marc.info/?l=bugtraq&m=101128661602088&w=2 http://marc.info/?l=bugtraq&m=101147632721031&w=2 http://online.securityfocus.com/advisories/3833 http://online.securityfocus.com/advisories/3969 http://www.debian.org/security/2002/dsa-102 http://www.novell.com/linux/security/advisories/2002_003_at_txt.html http://www.redhat.com/support/errata/RHSA-2002-015.html http://www.securityfocus.com/bid/3886 https://exchange.xforce. •

CVSS: 3.6EPSS: 0%CPEs: 8EXPL: 0

GNU Enscript 1.6.1 and earlier allows local users to overwrite arbitrary files of the Enscript user via a symlink attack on temporary files. Enscript 1.5.1 y anteriores permiten a usaurios locales sobreescribir ficheros arbitrarios del usuario Enscript mediante un ataque de enlaces simbólicos (symlink attack) en ficheros temporales. • http://www.debian.org/security/2002/dsa-105 http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-010.php3 http://www.redhat.com/support/errata/RHSA-2002-012.html http://www.securityfocus.com/advisories/3818 http://www.securityfocus.com/bid/3920 https://exchange.xforce.ibmcloud.com/vulnerabilities/7932 •