Page 7 of 37 results (0.012 seconds)

CVSS: 7.5EPSS: 96%CPEs: 48EXPL: 2

Kaspersky 3.x to 4.x allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. • https://www.exploit-db.com/exploits/629 http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true http://www.kb.cert.org/vuls/id/968818 http://www.securityfocus.com/bid/11448 https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 •

CVSS: 2.1EPSS: 0%CPEs: 26EXPL: 0

The der_chop script in the openssl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136302 http://secunia.com/advisories/12973 http://www.debian.org/security/2004/dsa-603 http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml http://www.redhat.com/support/errata/RHSA-2005-476.html http://www.securityfocus.com/bid/11293 http://www.trustix.org/errata/2004/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A106 •

CVSS: 2.1EPSS: 0%CPEs: 13EXPL: 0

The netatalk package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files. • http://www.gentoo.org/security/en/glsa/glsa-200410-25.xml http://www.trustix.org/errata/2004/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 •

CVSS: 2.1EPSS: 0%CPEs: 16EXPL: 0

The make_oidjoins_check script in PostgreSQL 7.4.5 and earlier allows local users to overwrite files via a symlink attack on temporary files. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136300 http://marc.info/?l=bugtraq&m=109910073808903&w=2 http://security.gentoo.org/glsa/glsa-200410-16.xml http://www.debian.org/security/2004/dsa-577 http://www.mandriva.com/security/advisories?name=MDKSA-2004:149 http://www.redhat.com/support/errata/RHSA-2004-489.html http://www.securityfocus.com/bid/11295 http://www.trustix.org/errata/2004/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 https:/ •

CVSS: 7.2EPSS: 0%CPEs: 22EXPL: 0

Format string vulnerability in Speedtouch USB driver before 1.3.1 allows local users to execute arbitrary code via (1) modem_run, (2) pppoa2, or (3) pppoa3. Vulnerabilidad de cadena de formato en Speedtouch USB driver anteriores a 1.3.1 permite a usuarios locales ejecutar código de su elección mediante modem_run pppoa2, o pppoa3 • http://sourceforge.net/project/showfiles.php?group_id=32758&package_id=28264&release_id=271734 http://speedtouch.sourceforge.net/index.php?/news.en.html http://www.mail-archive.com/speedtouch%40ml.free.fr/msg06688.html https://exchange.xforce.ibmcloud.com/vulnerabilities/17792 •