Page 568 of 2844 results (0.012 seconds)

CVSS: 7.5EPSS: 0%CPEs: 249EXPL: 0

Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array. Google V8 antes de v3.13.7.5, tal como se utiliza en Google Chrome antes de v23.0.1271.64, en plataformas de 64 bits de Linux, permite a atacantes remotos provocar una denegación de servicio o posiblemente tener un impacto no especificado a través de código JavaScript modificado que desencadena un acceso fuera de límites a una matriz. • http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html http://osvdb.org/87085 http://www.securityfocus.com/bid/56413 https://code.google.com/p/chromium/issues/detail?id=150729 https://exchange.xforce.ibmcloud.com/vulnerabilities/79867 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 0

Buffer overflow in glob function of glibc allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character. Desbordamiento de buffer en la función glob de glibc para Red Hat Linux 6.2 a 7.2, y otros sistemas operativos, permite a atacantes causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrarios mediante un patrón de glob que acaba en una llave "{" • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000447 http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-037-01 http://sources.redhat.com/ml/bug-glibc/2001-11/msg00109.html http://www.ciac.org/ciac/bulletins/m-029.shtml http://www.debian.org/security/2002/dsa-103 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-095.php3 http://www.linuxsecurity.com/advisories/other_advisory-1752.html http://www.redhat.com/support/errata/RHSA-2001-160&# •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

snmpd server in cmu-snmp SNMP package before 3.3-1 in Red Hat Linux 4.0 is configured to allow remote attackers to read and write sensitive information. • http://www.redhat.com/support/errata/rh40-errata-general.html#cmu-snmp https://exchange.xforce.ibmcloud.com/vulnerabilities/7251 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file. • http://marc.info/?l=bugtraq&m=88603844115233&w=2 http://www.debian.org/security/2003/dsa-308 http://www.iss.net/security_center/static/7241.php http://www.osvdb.org/3812 http://www.redhat.com/support/errata/rh50-errata-general.html#gzip http://www.securityfocus.com/bid/7845 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

automatic download option in ncftp 2.4.2 FTP client in Red Hat Linux 5.0 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the names of files that are to be downloaded. • http://marc.info/?l=bugtraq&m=89042322924057&w=2 http://www.iss.net/security_center/static/7240.php http://www.osvdb.org/6111 http://www.redhat.com/support/errata/rh50-errata-general.html#ncftp •