Page 5 of 75 results (0.006 seconds)

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 1

The secure script in LogWatch before 2.6-2 allows attackers to prevent LogWatch from detecting malicious activity via certain strings in the secure file that are later used as part of a regular expression, which causes the parser to crash, aka "logwatch log processing regular expression DoS." • https://www.exploit-db.com/exploits/25465 http://www.redhat.com/support/errata/RHSA-2005-364.html https://bugzilla.redhat.com/bugzilla-old/show_bug.cgi?id=137502 https://access.redhat.com/security/cve/CVE-2005-1061 https://bugzilla.redhat.com/show_bug.cgi?id=1617603 •

CVSS: 3.7EPSS: 0%CPEs: 104EXPL: 0

Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html http://rhn.redhat.com/errata/RHSA-2005-357.html http://secunia.com/advisories/18100 http://secunia.com/advisories/21253 http://secunia.com/advisories/22033 http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1 http://www& •

CVSS: 7.5EPSS: 2%CPEs: 27EXPL: 3

Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values. • http://marc.info/?l=bugtraq&m=111038641832400&w=2 http://marc.info/?l=bugtraq&m=111083125521813&w=2 http://security.gentoo.org/glsa/glsa-200503-16.xml http://security.lss.hr/en/index.php?page=details&ID=LSS-2005-03-04 http://www.ethereal.com/appnotes/enpa-sa-00018.html http://www.mandriva.com/security/advisories?name=MDKSA-2005:053 http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html http://www.redhat.com/support/errata/RHSA-2005-306.html& •

CVSS: 5.1EPSS: 5%CPEs: 27EXPL: 0

Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message. • http://secunia.com/advisories/14491 http://securitytracker.com/id?1013376 http://sylpheed.good-day.net/changelog-devel.html.en http://sylpheed.good-day.net/changelog.html.en http://www.gentoo.org/security/en/glsa/glsa-200503-26.xml http://www.redhat.com/support/errata/RHSA-2005-303.html https://access.redhat.com/security/cve/CVE-2005-0667 https://bugzilla.redhat.com/show_bug.cgi?id=1617556 •

CVSS: 7.5EPSS: 0%CPEs: 146EXPL: 0

The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities. El parche para corregir las vulnerabilidades de desbordamiento de entero en Xpdf 2.0 y 3.0 (CAN-2004-0888) es incompleto para arquitecturas de 64 bits en ciertas distribuciones de Linux como Red Hat, lo que podría dejar a los usuarios de Xpdf expuestos a las vulnerabilidades originales. • http://www.mandriva.com/security/advisories?name=MDKSA-2005:041 http://www.mandriva.com/security/advisories?name=MDKSA-2005:042 http://www.mandriva.com/security/advisories?name=MDKSA-2005:043 http://www.mandriva.com/security/advisories?name=MDKSA-2005:044 http://www.mandriva.com/security/advisories? •