Page 5 of 23 results (0.004 seconds)

CVSS: 5.0EPSS: 95%CPEs: 5EXPL: 2

The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference. El controlador de canal SIP de Asterisk Open Source 1.4.x versiones anteriores a 1.4.17, Business Edition versiones anteriores a C.1.0-beta8, AsteriskNOW versiones anteriores a beta7, Appliance Developer Kit versiones anteriores a Asterisk 1.4 revision 95946, y Appliance s800i 1.0.x versiones anteriores a 1.0.3.4 permite a atacantes remotos provocar una denegación de servicio (cáida de demonio) mediante un mensaje BYE con una cabecera Also (tranfiere también), que dispara un referencia a puntero NULL. • https://www.exploit-db.com/exploits/30974 http://bugs.digium.com/view.php?id=11637 http://downloads.digium.com/pub/security/AST-2008-001.html http://secunia.com/advisories/28299 http://secunia.com/advisories/28312 http://securityreason.com/securityalert/3520 http://www.securityfocus.com/archive/1/485727/100/0/threaded http://www.securityfocus.com/bid/27110 http://www.securitytracker.com/id?1019152 http://www.vupen.com/english/advisories/2008/0019 https://exchange.xforce • CWE-399: Resource Management Errors •

CVSS: 4.3EPSS: 15%CPEs: 46EXPL: 0

Asterisk Open Source 1.2.x before 1.2.26 and 1.4.x before 1.4.16, and Business Edition B.x.x before B.2.3.6 and C.x.x before C.1.0-beta8, when using database-based registrations ("realtime") and host-based authentication, does not check the IP address when the username is correct and there is no password, which allows remote attackers to bypass authentication using a valid username. Asterisk Open Source 1.2.x anterior a 1.2.26 y 1.4.x anterior a 1.4.16, y Business Edition B.x.x anterior a B.2.3.6 y C.x.x anterior a C.1.0-beta8, cuando usa registros basados en base de datos (en tiempo real o "realtime") y autenticación basada en anfitrión (host-based), no comprueba la dirección IP cuando el nombre de usuario es correcto y no hay contraseña, lo cual permite a atacantes remotos evitar la autenticación usando un nombre de usuario válido. • http://downloads.digium.com/pub/security/AST-2007-027.html http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html http://secunia.com/advisories/28149 http://secunia.com/advisories/29242 http://secunia.com/advisories/29456 http://secunia.com/advisories/29782 http://security.gentoo.org/glsa/glsa-200804-13.xml http://securityreason.com/securityalert/3467 http://www.debian.org/security/2008/dsa-1525 http://www.osvdb.org/39519 http://www.securityfocus.com/arch • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Cross-site scripting (XSS) vulnerability in KnowledgeTree Open Source 3.4 and 3.4.1 allows remote attackers to inject arbitrary web script or HTML via the login field on the login page, and other unspecified vectors. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en KnowledgeTree Open Source 3.4 y 3.4.1 permite a atacantes remotos inyectar scripts web o HTML de su elección mediante el campo login en la página login, y otros vectores no especificados. • http://osvdb.org/36579 http://secunia.com/advisories/26333 http://sourceforge.net/forum/forum.php?forum_id=722865 http://sourceforge.net/project/shownotes.php?release_id=530698&group_id=107851 http://support.ktdms.com/browse/KTS-2178 http://www.securityfocus.com/bid/25231 http://www.vupen.com/english/advisories/2007/2812 •