Page 5 of 23 results (0.020 seconds)

CVSS: 10.0EPSS: 13%CPEs: 14EXPL: 1

snmp_api.c in snmpd in Net-SNMP 5.2.x before 5.2.2, 5.1.x before 5.1.3, and 5.0.x before 5.0.10.2, when running in master agentx mode, allows remote attackers to cause a denial of service (crash) by causing a particular TCP disconnect, which triggers a free of an incorrect variable, a different vulnerability than CVE-2005-2177. • http://secunia.com/advisories/25114 http://secunia.com/advisories/25115 http://secunia.com/advisories/25411 http://sourceforge.net/tracker/index.php?func=detail&aid=1207023&group_id=12694&atid=112694 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102929-1 http://www.securityfocus.com/bid/23762 http://www.ubuntu.com/usn/USN-456-1 http://www.vupen.com/english/advisories/2007/1944 https://issues.rpath.com/browse/RPL-1334 https://oval.cisecurity.org/repository/sea • CWE-16: Configuration CWE-189: Numeric Errors •

CVSS: 4.6EPSS: 0%CPEs: 16EXPL: 0

Untrusted search path vulnerability in Net-SNMP 5.2.1.2 and earlier, on Gentoo Linux, installs certain Perl modules with an insecure DT_RPATH, which could allow local users to gain privileges. • http://www.gentoo.org/security/en/glsa/glsa-200509-05.xml •

CVSS: 5.0EPSS: 7%CPEs: 14EXPL: 0

Net-SNMP 5.0.x before 5.0.10.2, 5.2.x before 5.2.1.2, and 5.1.3, when net-snmp is using stream sockets such as TCP, allows remote attackers to cause a denial of service (daemon hang and CPU consumption) via a TCP packet of length 1, which triggers an infinite loop. • http://secunia.com/advisories/15930 http://secunia.com/advisories/16999 http://secunia.com/advisories/17007 http://secunia.com/advisories/17135 http://secunia.com/advisories/17217 http://secunia.com/advisories/17282 http://secunia.com/advisories/17343 http://secunia.com/advisories/18635 http://secunia.com/advisories/22875 http://secunia.com/advisories/23058 http://secunia.com/advisories/25373 http://secunia.com/advisories/25432 http://secunia.com/advisories/25787 http:/& • CWE-20: Improper Input Validation •