Page 53 of 275 results (0.013 seconds)

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 0

Memory leak in the Red Hat Content Accelerator kernel patch in Red Hat Enterprise Linux (RHEL) 4 and 5 allows local users to cause a denial of service (memory consumption) via a large number of open requests involving O_ATOMICLOOKUP. Una pérdida de memoria en el parche del kernel de Red Hat Content Accelerator en Red Hat Enterprise Linux (RHEL) versiones 4 y 5, permite a usuarios locales causar una denegación de servicio (consumo de memoria) por medio de un gran número de peticiones abiertas que involucran a O_ATOMICLOOKUP. • http://osvdb.org/44153 http://secunia.com/advisories/27824 http://secunia.com/advisories/28162 http://www.redhat.com/support/errata/RHSA-2007-0993.html http://www.redhat.com/support/errata/RHSA-2007-1104.html http://www.securityfocus.com/bid/26657 http://www.securitytracker.com/id?1019017 https://bugzilla.redhat.com/show_bug.cgi?id=315051 https://exchange.xforce.ibmcloud.com/vulnerabilities/38823 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef • CWE-399: Resource Management Errors •

CVSS: 1.9EPSS: 0%CPEs: 4EXPL: 0

Algorithmic complexity vulnerability in the MCS translation daemon in mcstrans 0.2.3 allows local users to cause a denial of service (temporary daemon outage) via a large range of compartments in sensitivity labels. Vulnerabilidad de complejidad algorítmica en el demonio de traducción MCS en el mcstrans 0.2.3 permite a usuarios locales provocar una denegación de servicio (apagón temporal del demonio) a través de un rango largo de compartimientos en las etiquetas sensibles. • http://osvdb.org/39244 http://secunia.com/advisories/27589 http://www.securityfocus.com/bid/26371 https://bugzilla.redhat.com/attachment.cgi?id=193951 https://bugzilla.redhat.com/show_bug.cgi?id=288201 https://exchange.xforce.ibmcloud.com/vulnerabilities/38357 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10350 https://rhn.redhat.com/errata/RHSA-2007-0542.html https://access.redhat.com/security/cve/CVE-2007-4570 • CWE-20: Improper Input Validation •

CVSS: 3.3EPSS: 0%CPEs: 4EXPL: 0

CoolKey 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files in the /tmp/.pk11ipc1/ directory. CoolKey 1.1.0 permite a usuarios locales sobrescribir archivos de su elección mediante un ataque de enlace simbólico (symlink attack)sobre archivos temporales en el directorio /tmp/.pk11ipc1/. • http://osvdb.org/40435 http://secunia.com/advisories/27591 http://www.redhat.com/support/errata/RHSA-2007-0631.html http://www.securityfocus.com/bid/26369 https://bugzilla.redhat.com/show_bug.cgi?id=251774 https://exchange.xforce.ibmcloud.com/vulnerabilities/38330 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11413 https://access.redhat.com/security/cve/CVE-2007-4129 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.5EPSS: 3%CPEs: 51EXPL: 0

Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression. Desbordamiento de búfer en el soporte opcode polimórfico del Motor de Expresiones Regulares (regcomp.c) en Perl 5.8 permite a atacantes dependientes de contexto ejecutar código de su elección cambiando de byte a caracteres Unicode (UTF) en una expresión regular. • ftp://aix.software.ibm.com/aix/efixes/security/README http://docs.info.apple.com/article.html?artnum=307179 http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html http://lists.vmware.com/pipermail/security-announce/2008/000002.html http://marc.info/?l=bugtraq&m=120352263023774&w=2 http://secunia.com/advisories/27479 http://secunia.com/advisories/27515 http://secunia.com/advisories/27531 http://secunia.com/advisories/27546 http://secunia.com/advisories/27548 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.7EPSS: 0%CPEs: 4EXPL: 0

Unspecified vulnerability in the "stack unwinder fixes" in kernel in Red Hat Enterprise Linux 5, when running on AMD64 and Intel 64, allows local users to cause a denial of service via unknown vectors. Una vulnerabilidad no especificada en las "stack unwinder fixes" en el kernel de Red Hat Enterprise Linux versión 5, cuando es ejecutado en AMD64 e Intel 64, permite a usuarios locales causar una denegación de servicio por medio de vectores desconocidos. • http://osvdb.org/45489 http://secunia.com/advisories/27322 http://securitytracker.com/id?1018844 http://www.redhat.com/support/errata/RHSA-2007-0940.html http://www.securityfocus.com/bid/26158 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10681 https://access.redhat.com/security/cve/CVE-2007-4574 https://bugzilla.redhat.com/show_bug.cgi?id=298141 •