Page 5 of 26 results (0.015 seconds)

CVSS: 7.5EPSS: 0%CPEs: 146EXPL: 0

The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities. El parche para corregir las vulnerabilidades de desbordamiento de entero en Xpdf 2.0 y 3.0 (CAN-2004-0888) es incompleto para arquitecturas de 64 bits en ciertas distribuciones de Linux como Red Hat, lo que podría dejar a los usuarios de Xpdf expuestos a las vulnerabilidades originales. • http://www.mandriva.com/security/advisories?name=MDKSA-2005:041 http://www.mandriva.com/security/advisories?name=MDKSA-2005:042 http://www.mandriva.com/security/advisories?name=MDKSA-2005:043 http://www.mandriva.com/security/advisories?name=MDKSA-2005:044 http://www.mandriva.com/security/advisories? •

CVSS: 2.1EPSS: 0%CPEs: 7EXPL: 0

The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file. • http://marc.info/?l=bugtraq&m=110667936707597&w=2 http://secunia.com/advisories/14015 http://secunia.com/advisories/14050 http://securitytracker.com/id?1013007 http://www.debian.org/security/2005/dsa-658 http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:030 http://www.redhat.com/support/errata/RHSA-2005-072.html http://www.securityfocus.com/archive/1/426530/30/6600/threaded http://www.securityfocus •

CVSS: 6.2EPSS: 0%CPEs: 147EXPL: 4

Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor. Condición de carrera en las llamadas de funciones (1) load_elf_library y (2) binfmt_aout de uselib de los kernel de Linux 2.4 a 2.429-rc2 y 2.6 a 2.6.10 permite a usuarios locales ejecutar código de su elección manipulando el descriptor WMA. • https://www.exploit-db.com/exploits/778 https://www.exploit-db.com/exploits/744 https://www.exploit-db.com/exploits/895 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://isec.pl/vulnerabilities/isec-0021-uselib.txt http://marc.info/?l=bugtraq&m=110512575901427&w=2 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://www.debian.org/security •

CVSS: 10.0EPSS: 5%CPEs: 65EXPL: 0

The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results. El código de deserialización en PHP anteriores a 4.3.10 y PHP 5.x hasta 5.0.2 permite a atacantes remotos causar una denegación de servicio y ejecutar código de su elección mediante datos "no de confianza" a la función unserialize que pueden producir resultados de "revelación de información, liberación de memoria doble y referencia a índice de arrray negativo" • http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html http://marc.info/?l=bugtraq&m=110314318531298&w=2 http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html http://www.hardened-php.net/advisories/012004.txt http://www.mandriva.com/security/advisories?name=MDKSA-2004:151 http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html http://www.oracle.com/technetwork/topics/secur • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 13%CPEs: 65EXPL: 0

Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file. Desbordamiento de búfer en la función exif_read_data de PHP anteriores a 4.3.10 y PHP 5.x hasta 5.0.2 permite a atacantes remotos ejecutar código arbitrario mediante un nombre de sección largo en un fichero de imagen. • http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html http://www.mandriva.com/security/advisories?name=MDKSA-2004:151 http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html http://www.php.net/release_4_3_10.php http://www.redhat.com/support/errata/RHSA-2004-687.html http://www.redhat.com/support/errata/RHSA-2005-032.html http://www.securityfocus.com/advisories/9028 https://bugzilla.fedora.us/show_bug.cgi?id=2344 https://exchange.xforce.ibm •