Page 8 of 70 results (0.016 seconds)

CVSS: 2.1EPSS: 0%CPEs: 34EXPL: 0

BEA WebLogic Express and WebLogic Server 7.0 and 7.0.0.1, stores passwords in plaintext when a keystore is used to store a private key or trust certificate authorities, which allows local users to gain access. • http://dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-25.jsp http://www.securityfocus.com/bid/6719 https://exchange.xforce.ibmcloud.com/vulnerabilities/11220 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Buffer overflow in rcp for AIX 4.3.3, 5.1 and 5.2 allows local users to gain privileges. • http://secunia.com/advisories/10276 http://securitytracker.com/id?1008258 http://www-1.ibm.com/support/search.wss?rs=0&q=IY48272&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY48747&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY49238&apar=only http://www.securityfocus.com/bid/9078 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Format string vulnerability in lpd in the bos.rte.printers fileset for AIX 4.3 through 5.2, with debug enabled, allows local users to cause a denial of service (crash) or gain root privileges. Vulnerabilidad de cadena de formato en lpd en el conjunto de ficheros bos.rte.printers de AIX 4.3 a 5.2, con depuración activada, permite a usuarios locales causar una denegación de servicio (caída) o ganar privilegios de root. • http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2003.1605.1 http://www-1.ibm.com/support/search.wss?rs=0&q=IY45250&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY45344&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY46256&apar=only •

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 0

Format string vulnerability in tsm for the bos.rte.security fileset on AIX 5.2 allows remote attackers to gain root privileges via login, and local users to gain privileges via login, su, or passwd, with a username that contains format string specifiers. Vulnerabilidad de cadena de formato en tsm del conjunto de ficheros bos.rte.security de AIZ 5.2 permite a atacantes remotos ganar privilegios de root mediante login, y a usuarios locales ganar privilegios mediante login, su o passwd, con un nombre de usuario que contenga especificadores de cadena de formato. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY47764&apar=only •

CVSS: 10.0EPSS: 5%CPEs: 163EXPL: 0

The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. La función de prescan en Sendmail 8.12.9 permite a atacantes remotos ejecutar código arbitrario mediante ataques de desbordamiento de búfer, como se demostró usando la función parseaddr en parseaddr.c. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000742 http://marc.info/?l=bugtraq&m=106381604923204&w=2 http://marc.info/?l=bugtraq&m=106382859407683&w=2 http://marc.info/?l=bugtraq&m=106383437615742&w=2 http://marc.info/? •