Page 65 of 382 results (0.012 seconds)

CVSS: 9.0EPSS: 94%CPEs: 6EXPL: 0

Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal. Un desbordamiento de búfer en la región Stack de la memoria en la función rename_principal_2_svc en kadmind para MIT Kerberos versiones 1.5.3, 1.6.1, y otras versiones, permite a los usuarios autenticados remotos ejecutar código arbitrario por medio de una petición creada para renombrar un principal. • ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc http://docs.info.apple.com/article.html?artnum=306172 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=548 http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html http://osvdb.org/36595 http://secunia.com/advisories/25800 htt • CWE-787: Out-of-bounds Write •

CVSS: 5.0EPSS: 1%CPEs: 13EXPL: 0

Memory leak in the image message functionality in ekg before 1:1.7~rc2-1etch1 on Debian GNU/Linux Etch allows remote attackers to cause a denial of service. Fuga de memoria en la funcionalidad de mensaje de imagen en ekg anterior a 1:1.7~rc2-1etch1 en Debian GNU/Linux Etch permite a atacantes remotos provocar una denegación de servicio. • http://osvdb.org/45377 http://www.debian.org/security/2007/dsa-1318 http://www.securityfocus.com/bid/24600 https://exchange.xforce.ibmcloud.com/vulnerabilities/35134 •

CVSS: 5.0EPSS: 1%CPEs: 13EXPL: 0

ekg before 1:1.7~rc2-1etch1 on Debian GNU/Linux Etch allows remote attackers to cause a denial of service (NULL pointer dereference) via a vector related to the token OCR functionality. ekg anterior a 1:1.7~rc2-1etch1 en Debian GNU/Linux Etch permite a atacantes remotos provocar una denegación de servicio (referencia a puntero nulo) mediante un vector relacionado con la funcionalidad de testigo OCR. • http://osvdb.org/45378 http://www.debian.org/security/2007/dsa-1318 http://www.securityfocus.com/bid/24600 https://exchange.xforce.ibmcloud.com/vulnerabilities/35135 •

CVSS: 5.0EPSS: 1%CPEs: 13EXPL: 0

Memory leak in the token OCR functionality in ekg before 1:1.7~rc2-1etch1 on Debian GNU/Linux Etch allows remote attackers to cause a denial of service. Fuga de memoria en la funcionalidad de testigo OCR en ekg anterior a 1:1.7~rc2-1etch1 en Debian GNU/Linux Etch permite a atacantes remotos provocar una denegación de servicio. • http://osvdb.org/45379 http://www.debian.org/security/2007/dsa-1318 http://www.securityfocus.com/bid/24600 https://exchange.xforce.ibmcloud.com/vulnerabilities/35136 •

CVSS: 7.5EPSS: 12%CPEs: 5EXPL: 0

Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop. Net::DNS anterior a 0.60, un módulo de Perl, permite a atacantes remotos provocar una denegación de servicio (consumo de pila) mediante un paquete DNS comprimido y mal formado con punteros que hacen referencia a si mismos, lo cual provoca un bucle infinito. • ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc http://osvdb.org/37054 http://rt.cpan.org/Public/Bug/Display.html?id=27285 http://secunia.com/advisories/25829 http://secunia.com/advisories/26012 http://secunia.com/advisories/26014 http://secunia.com/advisories/26055 http://secunia.com/advisories/26075 http://secunia.com/advisories/26211 http://secunia.com/advisories/26231 http://secunia.com/advisories/26417 http://secunia.com/advisories/26543&# • CWE-674: Uncontrolled Recursion •