Page 7 of 160 results (0.012 seconds)

CVSS: 10.0EPSS: 1%CPEs: 9EXPL: 0

Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable. Vulnerabilidad de evaluación directa de código dinámico (eval injection) en (1) courier-imapd.indirect y (2) courier-pop3d.indirect en Courier-IMAP anterior a 4.0.6-r2, y 4.1.x anterior a 4.1.2-r1, en Gentoo Linux permite a atacantes remotos ejecutar comandos de su elección a través de la variable XMAILDIR, relacionada con la variable LOGINRUN. • http://bugs.gentoo.org/show_bug.cgi?id=168196 http://osvdb.org/35274 http://secunia.com/advisories/24963 http://security.gentoo.org/glsa/glsa-200704-18.xml http://www.securityfocus.com/bid/23589 https://exchange.xforce.ibmcloud.com/vulnerabilities/33805 •

CVSS: 2.1EPSS: 10%CPEs: 2EXPL: 0

Vixie Cron before 4.1-r10 on Gentoo Linux is installed with insecure permissions, which allows local users to cause a denial of service (cron failure) by creating hard links, which results in a failed st_nlink check in database.c. Vixie Cron anterior a 4.1-r10 en Gentoo Linux es instalado con permisos inseguros, lo cual permite a usuarios locales provocar una denegación de servicio (fallo de cron) creando enlaces duros (hard links), lo cual resulta en el fallo de la comprobación st_nlink en database.c. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html http://rhn.redhat.com/errata/RHSA-2007-0345.html http://secunia.com/advisories/24905 http://secunia.com/advisories/24995 http://secunia.com/advisories/25321 http://secunia.com/advisories/25723 http://secunia.com/advisories/26909 http://secunia.com/advisories/27706 http://secunia.com/advisories/27886 http://security.gentoo.org/glsa/glsa-200704-11.xml http://support.avaya.com/elmodocs2/security/ASA- •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

The Linux Security Auditing Tool (LSAT) allows local users to overwrite arbitrary files via a symlink attack on temporary files, as demonstrated using /tmp/lsat1.lsat. La herramienta Linux Security Auditing Tool (LSAT) permite a usuarios locales sobrescribir archivos de su elección mediante un ataque de enlace simbólico en archivos temporales, como se ha demostrado utilizando /tmp/lsat1.lsat. • http://bugs.gentoo.org/show_bug.cgi?id=159542 http://osvdb.org/34267 http://secunia.com/advisories/24526 http://security.gentoo.org/glsa/glsa-200703-20.xml http://www.securityfocus.com/bid/23014 https://exchange.xforce.ibmcloud.com/vulnerabilities/33057 •

CVSS: 8.5EPSS: 0%CPEs: 4EXPL: 0

ftpd, as used by Gentoo and Debian Linux, sets the gid to the effective uid instead of the effective group id before executing /bin/ls, which allows remote authenticated users to list arbitrary directories with the privileges of gid 0 and possibly enable additional attack vectors. ftpd, como se usa en Gentoo y Debian Linux, establece el valor gid como el uid efectivo en lugar del identificador de grupo efectivo antes de ejecutar /bin/ls, lo cual permite a usuarios remotos autenticados listar directorios de su elección con privilegios de gid 0 y posiblemente habilitar vectores de ataque adicionales. • http://bugs.debian.org/384454 http://bugs.gentoo.org/show_bug.cgi?id=155317 http://osvdb.org/34242 http://packages.qa.debian.org/l/linux-ftpd/news/20061125T181702Z.html http://securityreason.com/securityalert/2330 http://www.securityfocus.com/archive/1/460742/100/0/threaded •

CVSS: 7.2EPSS: 1%CPEs: 23EXPL: 2

Cross-site scripting (XSS) vulnerability in the wp_explain_nonce function in the nonce AYS functionality (wp-includes/functions.php) for WordPress 2.0 before 2.0.9 and 2.1 before 2.1.1 allows remote attackers to inject arbitrary web script or HTML via the file parameter to wp-admin/templates.php, and possibly other vectors involving the action variable. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la función wp_explain_nonce de la funcionalidad nonce AYS (wp-includes/functions.php) para WordPress 2.0 anterior a 2.0.9 y 2.1 anterior a 2.1.1 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante el parámetro file a wp-admin/templates.php, y posiblemente otros vectores que implican la variable action. • https://www.exploit-db.com/exploits/29598 http://downloads.securityfocus.com/vulnerabilities/exploits/22534.html http://osvdb.org/33766 http://secunia.com/advisories/24306 http://secunia.com/advisories/24566 http://trac.wordpress.org/changeset/4876 http://trac.wordpress.org/changeset/4877 http://trac.wordpress.org/ticket/3781 http://www.gentoo.org/security/en/glsa/glsa-200703-23.xml http://www.securityfocus.com/bid/22534 http://www.vupen.com/english/advisories/2007/0741 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •