Page 46 of 275 results (0.011 seconds)

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 2

Buffer overflow in KON kon2 0.3.9b and earlier allows local users to execute arbitrary code via a long -Coding command line argument. Desbordamiento de búfer en KON kon2 0.3.9b y anteriores permite que usuarios locales ejecuten código arbitrario mediante un argumento largo -Coding de la línea de comandos. • https://www.exploit-db.com/exploits/22719 https://www.exploit-db.com/exploits/22720 http://marc.info/?l=bugtraq&m=105474080512376&w=2 http://marc.info/?l=bugtraq&m=105577912106710&w=2 http://www.mandriva.com/security/advisories?name=MDKSA-2003:064 http://www.redhat.com/support/errata/RHSA-2003-047.html http://www.redhat.com/support/errata/RHSA-2003-050.html https://access.redhat.com/security/cve/CVE-2002-1155 https://bugzilla.redhat.com/show_bug.cgi?id=1616848 •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

Unknown vulnerability in GNU Ghostscript before 7.07 allows attackers to execute arbitrary commands, even when -dSAFER is enabled, via a PostScript file that causes the commands to be executed from a malicious print job. Vulnerabilidad desconocida en GNU Ghostscript anterior a la 7.07 permite que atacantes remotos ejecuten comandos arbitrarios, incluso cuando -dSAFER está habilitado, mediante un fichero PostScript dañino. • http://marc.info/?l=bugtraq&m=105465818929172&w=2 http://www.mandriva.com/security/advisories?name=MDKSA-2003:065 http://www.redhat.com/support/errata/RHSA-2003-181.html http://www.redhat.com/support/errata/RHSA-2003-182.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A133 https://access.redhat.com/security/cve/CVE-2003-0354 https://bugzilla.redhat.com/show_bug.cgi?id=1617019 •

CVSS: 5.0EPSS: 3%CPEs: 5EXPL: 0

Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops"). Vulnerabilidad desconocida en la capa TTY del kernel de Linux 2.4 permite que atacantes causen una denegación de servicio ("kernel oops"). • http://www.debian.org/security/2003/dsa-311 http://www.debian.org/security/2003/dsa-312 http://www.debian.org/security/2003/dsa-332 http://www.debian.org/security/2003/dsa-336 http://www.debian.org/security/2004/dsa-442 http://www.mandriva.com/security/advisories?name=MDKSA-2003:066 http://www.mandriva.com/security/advisories?name=MDKSA-2003:074 http://www.redhat.com/support/errata/RHSA-2003-187.html http://www.redhat.com/support/errata/RHSA-2003-195.html http& •

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. El código mxcsr en el kernel de Linux 2.4 permite que atacantes modifiquen el estado de los registros de la CPU mediante una dirección mal construida. • http://www.debian.org/security/2003/dsa-311 http://www.debian.org/security/2003/dsa-312 http://www.debian.org/security/2003/dsa-332 http://www.debian.org/security/2003/dsa-336 http://www.debian.org/security/2004/dsa-442 http://www.mandriva.com/security/advisories?name=MDKSA-2003:066 http://www.mandriva.com/security/advisories?name=MDKSA-2003:074 http://www.redhat.com/support/errata/RHSA-2003-187.html http://www.redhat.com/support/errata/RHSA-2003-195.html http& •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

Konqueror Embedded and KDE 2.2.2 and earlier does not validate the Common Name (CN) field for X.509 Certificates, which could allow remote attackers to spoof certificates via a man-in-the-middle attack. Konqueror Embedded y KDE 2.2.2 y anteriores no validan el campo Common Name (CN) en certificados X.509, lo que permitiría que atacantes remotos falsifiquen certificados mediante un ataque "man-in-the-middle". • http://lists.grok.org.uk/pipermail/full-disclosure/2003-May/004983.html http://www.debian.org/security/2003/dsa-361 http://www.kde.org/info/security/advisory-20030602-1.txt http://www.redhat.com/support/errata/RHSA-2003-192.html http://www.redhat.com/support/errata/RHSA-2003-193.html http://www.securityfocus.com/archive/1/320707 http://www.securityfocus.com/bid/7520 http://www.turbolinux.com/security/TLSA-2003-36.txt https://access.redhat.com/security/cve/CVE-2003 •