Page 7 of 150 results (0.007 seconds)

CVSS: 7.2EPSS: 0%CPEs: 32EXPL: 0

Buffer overflow in playmidi before 2.4 allows local users to execute arbitrary code. Desbordamiento de búfer en playmidi anteriores a 2.4 permite a usuarios locales ejecutar código de su elección. • http://secunia.com/advisories/13828 http://secunia.com/advisories/13890 http://secunia.com/advisories/13898 http://securitytracker.com/id?1012957 http://www.debian.org/security/2005/dsa-641 http://www.mandriva.com/security/advisories?name=MDKSA-2005:010 http://www.osvdb.org/13049 http://www.securityfocus.com/bid/12274 https://exchange.xforce.ibmcloud.com/vulnerabilities/18933 •

CVSS: 6.2EPSS: 0%CPEs: 147EXPL: 4

Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor. Condición de carrera en las llamadas de funciones (1) load_elf_library y (2) binfmt_aout de uselib de los kernel de Linux 2.4 a 2.429-rc2 y 2.6 a 2.6.10 permite a usuarios locales ejecutar código de su elección manipulando el descriptor WMA. • https://www.exploit-db.com/exploits/778 https://www.exploit-db.com/exploits/744 https://www.exploit-db.com/exploits/895 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://isec.pl/vulnerabilities/isec-0021-uselib.txt http://marc.info/?l=bugtraq&m=110512575901427&w=2 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://www.debian.org/security •

CVSS: 2.1EPSS: 0%CPEs: 11EXPL: 0

Off-by-one error in passwd 0.68 and earlier, when using the --stdin option, causes passwd to use the first 78 characters of a password instead of the first 79, which results in a small reduction of the search space required for brute force attacks. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120060 http://www.mandriva.com/security/advisories?name=MDKSA-2004:045 http://www.securityfocus.com/bid/10370 https://exchange.xforce.ibmcloud.com/vulnerabilities/16178 •

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 0

passwd 0.68 does not check the return code for the pam_start function, which has unknown impact and attack vectors that may prevent "safe and proper operation" of PAM. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120060 http://www.mandriva.com/security/advisories?name=MDKSA-2004:045 http://www.securityfocus.com/bid/10370 https://exchange.xforce.ibmcloud.com/vulnerabilities/16179 •

CVSS: 2.1EPSS: 0%CPEs: 11EXPL: 0

Memory leak in passwd 0.68 allows local users to cause a denial of service (memory consumption) via a large number of failed read attempts from the password buffer. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120060 http://www.mandriva.com/security/advisories?name=MDKSA-2004:045 http://www.securityfocus.com/bid/10370 https://exchange.xforce.ibmcloud.com/vulnerabilities/16180 •