Page 8 of 141 results (0.003 seconds)

CVSS: 10.0EPSS: 89%CPEs: 28EXPL: 4

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c. Desbordamiento de búfer en Sendmail 5.79 a la 8.12.7 que permite a atacantes remotos la ejecución arbitraria de código mediante ciertos campos de dirección formateados, relativos a comentarios de cabecera de emisor y receptor, procesados por la función crackaddr del fichero headers.c. • https://www.exploit-db.com/exploits/411 https://www.exploit-db.com/exploits/22313 https://www.exploit-db.com/exploits/22314 ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6 ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5 ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000571 http://frontal2. • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 0%CPEs: 91EXPL: 0

The dtterm terminal emulator allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. El emulador de terminal dtterm permite a atacantes modificar el título de la ventana mediante una cierta secuencia de carácter de escape, y a continuación insertarlo de nuevo en la linea de comandos del terminal del usuario, por ejemplo cuando el usuario ve un fichero conteniendo la secuencia maliciosa, lo que podría permitir al atacante ejecutar comandos arbitrarios. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html http://marc.info/?l=bugtraq&m=104612710031920&w=2 http://www.iss.net/security_center/static/11414.php http://www.securityfocus.com/advisories/6236 http://www.securityfocus.com/bid/6942 •

CVSS: 7.5EPSS: 1%CPEs: 6EXPL: 0

The FTP client for Solaris 2.6, 7, and 8 with the debug (-d) flag enabled displays the user password on the screen during login. • http://secunia.com/advisories/8186 http://sunsolve.sun.com/search/document.do?assetkey=1-26-51081-1 http://www.securityfocus.com/bid/6989 http://www.securitytracker.com/id?1006195 https://exchange.xforce.ibmcloud.com/vulnerabilities/11436 •

CVSS: 5.0EPSS: 10%CPEs: 9EXPL: 0

Unknown vulnerability in UDP RPC for Solaris 2.5.1 through 9 for SPARC, and 2.5.1 through 8 for x86, allows remote attackers to cause a denial of service (memory consumption) via certain arguments in RPC calls that cause large amounts of memory to be allocated. • http://secunia.com/advisories/8092 http://sunsolve.sun.com/search/document.do?assetkey=1-26-50626-1 http://www.securityfocus.com/bid/6883 http://www.securitytracker.com/id?1006131 https://exchange.xforce.ibmcloud.com/vulnerabilities/11368 •

CVSS: 1.2EPSS: 0%CPEs: 8EXPL: 0

Unknown vulnerability in mail for Solaris 2.6 through 9 allows local users to read the email of other users. • http://secunia.com/advisories/8058 http://sunsolve.sun.com/search/document.do?assetkey=1-26-50751-1 http://www.securityfocus.com/bid/6838 http://www.securitytracker.com/id?1006084 https://exchange.xforce.ibmcloud.com/vulnerabilities/11303 •