Page 5 of 59 results (0.069 seconds)

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

The PHP package in Slackware 8.1, 9.0, and 9.1, when linked against a static library, includes /tmp in the search path, which allows local users to execute arbitrary code as the PHP user by inserting shared libraries into the appropriate path. El paquete PHP en Slackware 8.1, 9.0 y 9.1, cuando se enlaza con una librería estática, incluye /tmp en la ruta de búsqueda, lo que permite a usuarios locales ejecutar código de su elección como el usuario PHP insertando librerías compartidas en la ruta apropiada. • http://secunia.com/advisories/11760 http://www.securityfocus.com/bid/10461 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.419765 https://exchange.xforce.ibmcloud.com/vulnerabilities/16310 •

CVSS: 2.1EPSS: 0%CPEs: 28EXPL: 0

Multiple vulnerabilities in Midnight Commander (mc) before 4.6.0, with unknown impact, related to "Insecure temporary file and directory creations." Múltiples vulnerabilidades en Midnight Commander (mc) anteriores a 4.6.0, con impacto desconocido, relacionadas con "creación insegura de ficheros y directorios temporales." • http://security.gentoo.org/glsa/glsa-200405-21.xml http://www.debian.org/security/2004/dsa-497 http://www.mandriva.com/security/advisories?name=MDKSA-2004:039 http://www.novell.com/linux/security/advisories/2004_12_mc.html http://www.redhat.com/support/errata/RHSA-2004-172.html https://exchange.xforce.ibmcloud.com/vulnerabilities/16020 https://access.redhat.com/security/cve/CVE-2004-0231 https://bugzilla.redhat.com/show_bug.cgi?id=1617180 •

CVSS: 10.0EPSS: 0%CPEs: 28EXPL: 0

Multiple buffer overflows in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code. Múltiples desbordamientos de búfer en Midnight Commander (mc) anteriores a 4.6.0 pueden permitir a atacantes causar una denegación de servicio o ejecutar código arbitrario. • http://security.gentoo.org/glsa/glsa-200405-21.xml http://www.debian.org/security/2004/dsa-497 http://www.mandriva.com/security/advisories?name=MDKSA-2004:039 http://www.novell.com/linux/security/advisories/2004_12_mc.html http://www.redhat.com/support/errata/RHSA-2004-172.html https://exchange.xforce.ibmcloud.com/vulnerabilities/16016 https://access.redhat.com/security/cve/CVE-2004-0226 https://bugzilla.redhat.com/show_bug.cgi?id=1617179 •

CVSS: 5.0EPSS: 0%CPEs: 28EXPL: 0

Multiple format string vulnerabilities in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code. Mútiples vulnerabilidades de cadena de formato en Midnight Commander (mc) anteriores a 4.6.0 pueden permitir a atacantes causar una denegación de servicio o ejecutar código de su elección. • http://security.gentoo.org/glsa/glsa-200405-21.xml http://www.debian.org/security/2004/dsa-497 http://www.mandriva.com/security/advisories?name=MDKSA-2004:039 http://www.novell.com/linux/security/advisories/2004_12_mc.html http://www.redhat.com/support/errata/RHSA-2004-172.html https://exchange.xforce.ibmcloud.com/vulnerabilities/16021 https://access.redhat.com/security/cve/CVE-2004-0232 https://bugzilla.redhat.com/show_bug.cgi?id=1617181 •

CVSS: 7.2EPSS: 0%CPEs: 15EXPL: 2

Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option. Desbordamiento de enteros en la función ip_setsockopt en el kernel de Linux 2.4.22 a 2.4.25 y 2.6.1 a 2.6.3 permite a usuarios locales causar una denegación de servicio (caída) o ejecutar código arbitrario mediante la opción de socket MCAST_MSFILTER. • https://www.exploit-db.com/exploits/274 ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000852 http://marc.info/?l=bugtraq&m=108253171301153&w=2 http://www.isec.pl/vulnerabilities/isec-0015-msfilter.txt http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html http://www.mandriva.com/security/advisories?name=MDKSA-2004:037 http://www.novell.com/linux/security/advisories/2004_10_kernel.html •