CVE-2007-3915
https://notcve.org/view.php?id=CVE-2007-3915
Mondo 2.24 has insecure handling of temporary files. Mondo versión 2.24, presenta un manejo no seguro de archivos temporales. • https://security-tracker.debian.org/tracker/CVE-2007-3915 • CWE-668: Exposure of Resource to Wrong Sphere •
CVE-2013-4854 – ISC BIND rdata Denial Of Service Vulnerability
https://notcve.org/view.php?id=CVE-2013-4854
The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013. La implementación RFC en rdata.c en ISC BIND 9.7.x y 9.8.x anterior a 9.8.5-P2, 9.8.6b1, 9.9.x anterior a 9.9.3-P2, y 9.9.4b1, y DNSco BIND 9.9.3-S1 anterior a 9.9.3-S1-P1 y 9.9.4-S1b1, permite a atacantes remotos provocar una denegación de servicio (fallo de aserción y salida de demonio) a través de una petición con una sección RDATA manipulada que se maneja adecuadamente durante la contrucción de mensaje de log. Ha sido explotada "in the wild" en Julio de 2013. This vulnerability allows remote attackers to cause a denial of service condition on vulnerable installations of ISC BIND. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of an rdata section with a length that is less than four. • http://archives.neohapsis.com/archives/bugtraq/2013-08/0030.html http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html http://linux.oracle.com/errata/ELSA-2014-1244 http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113108.html http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113251.html http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00018.html http://rhn. •
CVE-2011-2162
https://notcve.org/view.php?id=CVE-2011-2162
Multiple unspecified vulnerabilities in FFmpeg 0.4.x through 0.6.x, as used in MPlayer 1.0 and other products, in Mandriva Linux 2009.0, 2010.0, and 2010.1; Corporate Server 4.0 (aka CS4.0); and Mandriva Enterprise Server 5 (aka MES5) have unknown impact and attack vectors, related to issues "originally discovered by Google Chrome developers." Múltiples vulnerabilidades no especificadas en FFmpeg v0.4.x hasta v0.6.x, tal como se utiliza en MPlayer v1.0 y otros productos, en Mandriva Linux v2009.0, v2010.0 y v2010.1; Corporate Server v4.0 (también conocido como CS4.0), y Mandriva Enterprise Server 5 (también conocido como MES5) tienen un impacto y vectores de ataque desconocidos, en relación a las cuestiones "originalmente descubiertas por los desarrolladores de Google Chrome". • http://www.mandriva.com/security/advisories?name=MDVSA-2011:059 http://www.mandriva.com/security/advisories?name=MDVSA-2011:060 http://www.mandriva.com/security/advisories?name=MDVSA-2011:061 http://www.mandriva.com/security/advisories?name=MDVSA-2011:062 http://www.mandriva.com/security/advisories? •
CVE-2010-2529
https://notcve.org/view.php?id=CVE-2010-2529
Unspecified vulnerability in ping.c in iputils 20020927, 20070202, 20071127, and 20100214 on Mandriva Linux allows remote attackers to cause a denial of service (hang) via a crafted echo response. Vulnerabilidad no especificada en ping.c en iputils 20020927, 20070202, 20071127 y 20100214 en Mandriva Linux permite a atacantes remotos provocar una denegación de servicio (cuelgue) mediante una respuesta echo manipulada. • http://www.mandriva.com/security/advisories?name=MDVSA-2010:138 http://www.securityfocus.com/bid/41911 http://www.vupen.com/english/advisories/2010/1890 •
CVE-2009-0912
https://notcve.org/view.php?id=CVE-2009-0912
perl-MDK-Common 1.1.11 and 1.1.24, 1.2.9 through 1.2.14, and possibly other versions, in Mandriva Linux does not properly handle strings when writing them to configuration files, which allows attackers to gain privileges via "special characters" in unspecified vectors. perl-MDK-Common v1.1.11 y v1.1.24, v1.2.9 hasta v1.2.14, y posiblemente otras versiones, en Mandriva Linux no maneja correctamente las cadenas de caracteres cuando las añade a ficheros de configuración, permitiendo a atacantes remotos obtener privilegios mediante "caracteres especiales" en vectores no especificados. • http://www.mandriva.com/security/advisories?name=MDVSA-2009:072 http://www.securityfocus.com/bid/34089 http://www.vupen.com/english/advisories/2009/0688 https://exchange.xforce.ibmcloud.com/vulnerabilities/49220 • CWE-20: Improper Input Validation •