Page 5 of 62 results (0.006 seconds)

CVSS: 10.0EPSS: 2%CPEs: 7EXPL: 0

Multiple heap-based buffer overflows in imlib 1.9.14 and earlier, which is used by gkrellm and several window managers, allow remote attackers to cause a denial of service (application crash) and execute arbitrary code via certain image files. Múltiples desbordamientos de búfer basados en el montón en imlib 1.9.14 y anteriores, que es usado en gkrellm y varios gestores de ventas, permite a atacantes remotos causar una denegación de servicio (caída de aplicación) y ejecutar código de su elección mediante ciertos ficheros de imágenes. • http://www.mandriva.com/security/advisories?name=MDKSA-2005:007 http://www.redhat.com/support/errata/RHSA-2004-651.html http://www.securityfocus.com/bid/11830 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10786 https://access.redhat.com/security/cve/CVE-2004-1025 https://bugzilla.redhat.com/show_bug.cgi?id=1617354 •

CVSS: 5.0EPSS: 0%CPEs: 61EXPL: 0

Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files. • http://marc.info/?l=bugtraq&m=110356286722875&w=2 http://secunia.com/advisories/13586 http://www.gentoo.org/security/en/glsa/glsa-200501-16.xml http://www.heise.de/security/dienste/browsercheck/tests/java.shtml http://www.kb.cert.org/vuls/id/420222 http://www.kde.org/info/security/advisory-20041220-1.txt http://www.mandriva.com/security/advisories?name=MDKSA-2004:154 http://www.redhat.com/support/errata/RHSA-2005-065.html https://exchange.xforce.ibmcloud.com/vulnera •

CVSS: 2.1EPSS: 0%CPEs: 104EXPL: 2

Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow. • https://www.exploit-db.com/exploits/690 http://secunia.com/advisories/17826 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1070 http://www.debian.org/security/2006/dsa-1082 http://www.guninski.com/where_do_you_want_billg_to_go_today_2 •

CVSS: 10.0EPSS: 5%CPEs: 7EXPL: 0

Multiple integer overflows in the image handler for imlib 1.9.14 and earlier, which is used by gkrellm and several window managers, allow remote attackers to cause a denial of service (application crash) and execute arbitrary code via certain image files. Múltiples desbordamientos de búfer en el manejador de imágenes de imlib 1.9.14 y anteriores, que es usado en gkrellm y varios gestores de ventanas, permite a atacantes remotos causar una denegación de servicio (caída de aplicación) y ejecutar código arbitrario mediante ciertos ficheros de imágenes. • http://www.debian.org/security/2005/dsa-628 http://www.gentoo.org/security/en/glsa/glsa-200412-03.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:007 http://www.redhat.com/support/errata/RHSA-2004-651.html http://www.securityfocus.com/bid/11830 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10771 https://access.redhat.com/security/cve/CVE-2004-1026 https://bugzilla.redhat.com/show_bug.cgi?id=1617355 •

CVSS: 10.0EPSS: 10%CPEs: 23EXPL: 0

Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015. Desbordamiento basado en la pila en Cyrus IMAP Server 2.2.4 a 2.2.8, con la opción imapmagicplus establecida, permite a atacantes remotos ejecuta código de su elección mediante un comando PROXY o LOGIN largo, una vulnerabilidad distinta de CAN-2004-1015. • http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143 http://asg.web.cmu.edu/cyrus/download/imapd/changes.html http://marc.info/?l=bugtraq&m=110123023521619&w=2 http://secunia.com/advisories/13274 http://security.e-matters.de/advisories/152004.html http://security.gentoo.org/glsa/glsa-200411-34.xml http://www.mandriva.com/security/advisories?name=MDKSA-2004:139 https://exchange.xforce.ibmcloud.com/vulnerabilities/18198 •