Page 43 of 226 results (0.019 seconds)

CVSS: 4.7EPSS: 0%CPEs: 10EXPL: 1

Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer." Apache httpd versiones 1.3.37, 2.0.59 y 2.2.4 con el módulo Prefork MPM, permite a los usuarios locales causar una denegación de servicio por la modificación de las matrices worker_score y process_score para hacer referencia a un ID de proceso arbitrario, al que se envía una señal SIGUSR1 desde el proceso maestro, también se conoce como "SIGUSR1 killer". • ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc http://bugs.gentoo.org/show_bug.cgi?id=186219 http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245111 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588 http://httpd.apache.org/security/vulnerabilities_13.html http://httpd.apache.org/security/vulnerabilities_20.html http://httpd.apache.org/security/vulnerabilities_22.html http://lists.vmware.com/pipermail/security-announce/2009/000062.html& •

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

Integer underflow in the cpuset_tasks_read function in the Linux kernel before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem is mounted, allows local users to obtain kernel memory contents by using a large offset when reading the /dev/cpuset/tasks file. Desbordamiento inferior de entero en la función cpuset_tasks_read en el Kernel de Linux anterior a 2.6.20.13, y 2.6.21.x anterior a 2.6.21.4, cuando el sistema de archivos cpuset está montado, permite a usuarios locales obtener contenido de memoria local utilizando un desplazamiento (offset) largo cuando se lee el archivo /dev/cpuset/tasks. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.13 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=541 http://osvdb.org/37113 http://secunia.com/advisories/26133 http://secunia.com/advisories/26139 http://secunia.com/advisories/26620 http://secunia.com/advisories/26647 http://secunia.com/advisories/26760 http://secunia.com/advisories/27227 http://www.debian.org/security/ • CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 2%CPEs: 4EXPL: 0

The soap extension in PHP calls php_rand_r with an uninitialized seed variable, which has unknown impact and attack vectors, a related issue to the mcrypt_create_iv issue covered by CVE-2007-2727. La extensión soap en PHP llama a php_rand_r con una variable seed no inicializada, que presenta un impacto desconocido y vectores de ataque, un problema relacionado con el problema de mcrypt_create_iv cubierto por CVE-2007-2727. The soap extension in PHP calls php_rand_r with an uninitialized seed variable, which has unknown impact and attack vectors, a related issue to the mcrypt_create_iv issue covered by CVE-2007-2727. Note: The PHP team argue that this is not a valid security issue. • http://blog.php-security.org/archives/80-Watching-the-PHP-CVS.html http://osvdb.org/36086 http://secunia.com/advisories/25306 http://secunia.com/advisories/26102 http://secunia.com/advisories/26895 http://www.mandriva.com/security/advisories?name=MDKSA-2007:187 http://www.novell.com/linux/security/advisories/2007_15_sr.html http://www.ubuntu.com/usn/usn-485-1 http://www.vupen.com/english/advisories/2007/1839 •

CVSS: 4.9EPSS: 0%CPEs: 8EXPL: 0

MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables. MySQL anterior a 4.1.23, 5.0.x anterior a 5.0.42, y 5.1.x anterior a 5.1.18 no requiere el privilegio DROP para sentencias RENAME TABLE, lo cual permite a usuarios autenticados remotamente renombrar tablas de su elección. • http://bugs.mysql.com/bug.php?id=27515 http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html http://lists.mysql.com/announce/470 http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html http://osvdb.org/34766 http://secunia.com/advisories/25301 http://secunia.com/advisories/25946 http://secunia.com/advisories/26073 http://secunia.com/advisories/26430 http://secunia. •

CVSS: 7.2EPSS: 13%CPEs: 8EXPL: 0

Logic error in the SID/Name translation functionality in smbd in Samba 3.0.23d through 3.0.25pre2 allows local users to gain temporary privileges and execute SMB/CIFS protocol operations via unspecified vectors that cause the daemon to transition to the root user. Error lógico en la funcionalidad de traducción SID/Name en smbd en Samba 3.0.23d hasta 3.0.25pre2 permite a usuarios locales ganar privilegios de forma temporal y ejecutar operaciones del protocolo SMB/CIFS a través de vectores no especificados que provocan que el demonio transite al usuario root. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980 http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html http://osvdb.org/34698 http://secunia.com/advisories/25232 http://secunia.com/advisories/25241 http://secunia.com/advisories/25246 http://secunia.com/advisories/25251 http://secunia.com/advisories/25255 http://secunia.com/advisories/25256 http://secunia.com/advisories/25259 http://secunia.com/advisories/25270 http • CWE-269: Improper Privilege Management •