Page 6 of 28 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 25EXPL: 1

Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code. Vulnerabilidad en el formateado de cadenas en stunnel anterior a la 3.22 cuando se usa en modo cliente para smtp, pop o nntp permite que servidores remotos maliciosos ejecuten código arbitrario. • https://www.exploit-db.com/exploits/21192 http://marc.info/?l=stunnel-users&m=100869449828705&w=2 http://online.securityfocus.com/archive/1/247427 http://online.securityfocus.com/archive/1/248149 http://stunnel.mirt.net/news.html http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-004.php3 http://www.redhat.com/support/errata/RHSA-2002-002.html http://www.securityfocus.com/bid/3748 https://exchange.xforce.ibmcloud.com/vulnerabilities/7741 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

The default PAM files included with passwd in Mandrake Linux 8.1 do not support MD5 passwords, which could result in a lower level of password security than intended. • http://www.iss.net/security_center/static/7706.php http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-091.php3 http://www.securityfocus.com/bid/3683 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Packaging error for expect 8.3.3 in Mandrake Linux 8.1 causes expect to search for its libraries in the /home/snailtalk directory before other directories, which could allow a local user to gain root privileges. • http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-087.php3?dis=8.1 https://exchange.xforce.ibmcloud.com/vulnerabilities/7604 •