Page 5 of 33 results (0.019 seconds)

CVSS: 7.2EPSS: 0%CPEs: 58EXPL: 1

Multiple buffer overflows in the RtConfigLoad function in rt-config.c for Atari800 before 1.3.4 allow local users to execute arbitrary code via large values in the configuration file. Múltiples desbordamientos de búfer en la función RtConfigLoad en Atari800 1.3.1 permite usuarios locales ejecutar código arbitrrio mediante valores grandes en el fichero de configuración. • http://cvs.sourceforge.net/viewcvs.py/atari800/atari800/DOC/ChangeLog?view=markup http://marc.info/?l=bugtraq&m=110142899319841&w=2 http://marc.info/?l=bugtraq&m=110149441815270&w=2 http://secunia.com/advisories/13670 http://www.debian.org/security/2004/dsa-609 http://www.osvdb.org/12610 http://www.securityfocus.com/bid/11756 •

CVSS: 7.6EPSS: 0%CPEs: 20EXPL: 0

Stack-based buffer overflow in pavuk 0.9pl28, 0.9pl27, and possibly other versions allows remote web sites to execute arbitrary code via a long HTTP Location header. Desbordamiento basado en la pila en pavuk 0.9pl28, 0.9pl27, y posiblemente otras versiones permite a sitios web remotos ejecutar código de su elección mediante una cabecera de localización HTTP larga. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023322.html http://security.gentoo.org/glsa/glsa-200406-22.xml http://www.debian.org/security/2004/dsa-527 http://www.securityfocus.com/bid/10633 https://exchange.xforce.ibmcloud.com/vulnerabilities/16551 •

CVSS: 4.3EPSS: 1%CPEs: 23EXPL: 0

Cross-site scripting (XSS) vulnerability in start_form() of CGI.pm allows remote attackers to insert web script via a URL that is fed into the form's action parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados en start_form() de CGI.pm permite a atacantes remotos insertar script web mediante una URL que es introducida en parámetro "action" del formulario. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000713 http://marc.info/?l=bugtraq&m=105880349328877&w=2 http://marc.info/?l=bugtraq&m=106018783704468&w=2 http://marc.info/?l=full-disclosure&m=105875211018698&w=2 http://secunia.com/advisories/13638 http://securitytracker.com/id? •

CVSS: 7.5EPSS: 31%CPEs: 9EXPL: 1

Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function. • https://www.exploit-db.com/exploits/20908 http://archives.neohapsis.com/archives/bugtraq/2001-06/0064.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000404 http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-024-01 http://www.ciac.org/ciac/bulletins/l-104.shtml http://www.debian.org/security/2001/dsa-063 http://www.linuxsecurity.com/advisories/other_advisory-1469.html http://www.redhat.com/support/errata/RHSA-2001-075.html http://www.securi •

CVSS: 10.0EPSS: 0%CPEs: 87EXPL: 3

Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function. • https://www.exploit-db.com/exploits/21018 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:49.telnetd.asc ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-012.txt.asc ftp://patches.sgi.com/support/free/security/advisories/20010801-01-P ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.10/CSSA-2001-SCO.10.txt http://archives.neohapsis.com/archives/hp/2001-q4/0014.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000413 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •