Page 5 of 51 results (0.020 seconds)

CVSS: 10.0EPSS: 96%CPEs: 81EXPL: 14

15 Apr 2003 — Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code. Desbordamiento de búfer en la función call_trans2open en trans2.c de Samba 2.2.x anteriores a 2.2.8a, 2.0.10 y versiones anteriores 2.0.x, y Samba-TNG anteriores a de 0.3.2, permite a atacantes remotos ejecutar código arbitrario. • https://www.exploit-db.com/exploits/16880 •

CVSS: 10.0EPSS: 96%CPEs: 29EXPL: 3

18 Mar 2003 — Buffer overflow in the SMB/CIFS packet fragment re-assembly code for SMB daemon (smbd) in Samba before 2.2.8, and Samba-TNG before 0.3.1, allows remote attackers to execute arbitrary code. • https://www.exploit-db.com/exploits/9936 •

CVSS: 4.7EPSS: 0%CPEs: 22EXPL: 0

18 Mar 2003 — The code for writing reg files in Samba before 2.2.8 allows local users to overwrite arbitrary files via a race condition involving chown. • ftp://patches.sgi.com/support/free/security/advisories/20030302-01-I •

CVSS: 9.8EPSS: 7%CPEs: 21EXPL: 0

31 Dec 2002 — Samba before 2.2.5 does not properly terminate the enum_csc_policy data structure, which may allow remote attackers to execute arbitrary code via a buffer overflow attack. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:05.asc • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 2%CPEs: 8EXPL: 3

23 Jun 2001 — Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file. • https://www.exploit-db.com/exploits/20968 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

24 May 2001 — Samba before 2.2.0 allows local attackers to overwrite arbitrary files via a symlink attack using (1) a printer queue query, (2) the more command in smbclient, or (3) the mput command in smbclient. • https://www.exploit-db.com/exploits/20776 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 3

19 Dec 2000 — Samba Web Administration Tool (SWAT) in Samba 2.0.7 installs the cgi.log logging file with world readable permissions, which allows local users to read sensitive information such as user names and passwords. • https://www.exploit-db.com/exploits/20341 •

CVSS: 9.8EPSS: 3%CPEs: 1EXPL: 3

19 Dec 2000 — Samba Web Administration Tool (SWAT) in Samba 2.0.7 does not log login attempts in which the username is correct but the password is wrong, which allows remote attackers to conduct brute force password guessing attacks. • https://www.exploit-db.com/exploits/20340 •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

19 Dec 2000 — Samba Web Administration Tool (SWAT) in Samba 2.0.7 supplies a different error message when a valid username is provided versus an invalid name, which allows remote attackers to identify valid users on the server. • http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 4

19 Dec 2000 — Samba Web Administration Tool (SWAT) in Samba 2.0.7 allows local users to overwrite arbitrary files via a symlink attack on the cgi.log file. • https://www.exploit-db.com/exploits/20339 •