7 results (0.005 seconds)

CVSS: 5.0EPSS: 3%CPEs: 6EXPL: 1

Preboot eXecution Environment (PXE) server allows remote attackers to cause a denial of service (crash) via certain DHCP packets from Voice-Over-IP (VOIP) phones. El servidor Preboot eXecution Environment (PXE) permite a atacantes remotos causar una denegación de servicio (caída) mediante ciertos paquetes DHCP (Dinamic Host Configuraion Protocol) de teléfonos Voz-sobre-IP (VOIP). • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-044.0.txt http://online.securityfocus.com/advisories/4449 http://www.iss.net/security_center/static/10003.php http://www.redhat.com/support/errata/RHSA-2002-162.html http://www.redhat.com/support/errata/RHSA-2002-165.html http://www.securityfocus.com/bid/5596 https://access.redhat.com/security/cve/CVE-2002-0835 https://bugzilla.redhat.com/show_bug.cgi?id=1616818 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

Vulnerability in the MIT-SHM extension of the X server on Linux (XFree86) 4.2.1 and earlier allows local users to read and write arbitrary shared memory, possibly to cause a denial of service or gain privileges. Vulnerabilidad en la extensión MIT-SHM del servidor X en Linux permite a usuarios locales leer y escribir arbitrariamente memoria compartida, y posiblemente causar una denegación de servicio o ganar privilegios. • ftp://patches.sgi.com/support/free/security/advisories/20021001-01-P ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.14/CSSA-2002-SCO.14.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000529 http://marc.info/?l=bugtraq&m=103547625009363&w=2 http://sunsolve.sun.com/search/document.do?assetkey=1-66-228529-1 http://sunsolve.sun.com/search/document.do?assetkey=1-77-1017429.1-1 http://www.debian.org/security/2003/dsa-380 http://www.linuxsecur •

CVSS: 7.2EPSS: 0%CPEs: 46EXPL: 2

Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice. Corrupción de memoria en el comando "at" permite que usuarios locales ejecuten código arbitrario haciendo uso de un tiempo de ejecución mal escrito (lo que provoca que at libere la misma memoria dos veces). • https://www.exploit-db.com/exploits/21229 http://marc.info/?l=bugtraq&m=101128661602088&w=2 http://marc.info/?l=bugtraq&m=101147632721031&w=2 http://online.securityfocus.com/advisories/3833 http://online.securityfocus.com/advisories/3969 http://www.debian.org/security/2002/dsa-102 http://www.novell.com/linux/security/advisories/2002_003_at_txt.html http://www.redhat.com/support/errata/RHSA-2002-015.html http://www.securityfocus.com/bid/3886 https://exchange.xforce. •

CVSS: 5.0EPSS: 0%CPEs: 14EXPL: 0

Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000432 http://www.caldera.com/support/security/advisories/CSSA-2001-038.0.txt http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-082.php3 http://www.linuxsecurity.com/advisories/other_advisory-1683.html http://www.novell.com/linux/security/advisories/2001_039_kernel2_txt.html http://www.redhat.com/support/errata/RHSA-2001-142.html https://exchange.xforce.ibmcloud.com/vulnerabilities/7461 https://access.redhat.com/security •

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 0

Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning. • http://archives.neohapsis.com/archives/bugtraq/2001-07/0362.html http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-031-01 http://www.calderasystems.com/support/security/advisories/CSSA-2001-029.0.txt http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-066.php3 http://www.redhat.com/support/errata/RHSA-2001-097.html http://www.securityfocus.com/archive/1/197727 https://exchange.xforce.ibmcloud.com/vulnerabilities/6862 •