4 results (0.006 seconds)

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Agnitum Outpost Firewall Pro 3.51.759.6511 (462), as used in (1) Lavasoft Personal Firewall 1.0.543.5722 (433) and (2) Novell BorderManager Novell Client Firewall 2.0, does not properly restrict user activities in application windows that run in a LocalSystem context, which allows local users to gain privileges and execute commands (a) via the "open folder" option when no instance of explorer.exe is running, possibly related to the ShellExecute API function; or (b) by overwriting a batch file through the "Save Configuration As" option. NOTE: this might be a vulnerability in Microsoft Windows and explorer.exe instead of the firewall. Agnitum Outpost Firewall Pro 3.51.759.6511 (462), tal y como se usa en (1) Lavasoft Personal Firewall 1.0.543.5722 (433) y (2) Novell BorderManager Novell Client Firewall 2.0, no restringe de forma adecuada las actividades de usuario para ganar privilegios y ejecutar comandos (a)a través de la opción "abrir carpeta" cuando una instancia de explorer.exe está funcionando, posiblemente relacionado con la función API ShellExecute, o (b) a través de la re-escritura de un fichero de proceso por lotes a través de la opción "Guardar configuración como". NOTA: esto podría estar relacionado con la vulnerabilidad en Microsoft Windows y la instnacia explorer.exe del firewall. • http://secunia.com/advisories/21088 http://secunia.com/advisories/21089 http://www.ben.goulding.com.au/secad.html http://www.osvdb.org/27349 http://www.securityfocus.com/archive/1/440426/100/0/threaded http://www.securityfocus.com/bid/19018 http://www.securityfocus.com/bid/19024 http://www.vupen.com/english/advisories/2006/2851 http://www.vupen.com/english/advisories/2006/2852 http://www.vupen.com/english/advisories/2007/0144 https://secure-support.novell.com/K • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Novell Client Firewall (NCF) 2.0, as based on the Agnitum Outpost Firewall, allows local users to execute arbitrary code with SYSTEM privileges by opening the NCF tray icon and using the Help functionality to launch programs with SYSTEM privileges. • http://secunia.com/advisories/11014 http://securitytracker.com/id?1008755 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10090585.htm http://www.ciac.org/ciac/bulletins/o-090.shtml http://www.osvdb.org/4120 http://www.securityfocus.com/bid/9441 https://exchange.xforce.ibmcloud.com/vulnerabilities/15367 •

CVSS: 5.0EPSS: 0%CPEs: 252EXPL: 0

OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool. OpenSSL 0.9.6 anteriores a la 0.9.6d no manejan adecuadamente los tipos de mensajes desconocidos, lo que permite a atacantes remotos causar una denegación de servicios (por bucle infinito), como se demuestra utilizando la herramienta de testeo Codenomicon TLS. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834 http://fedoranews.org/updates/FEDORA-2004-095.shtml http://marc.info/?l=bugtraq&m=107955049331965&w=2 http://marc.info/?l=bugtraq&m=108403850228012&w=2 http://rhn.redhat.com/errata/RHSA-2004-119.html http://secunia.com/advisories/11139 http://security.gen •

CVSS: 7.5EPSS: 0%CPEs: 252EXPL: 0

The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference. La función do_change_cipher_spec en OpenSSL 0.9.6c hasta 0.9.6.k y 0.9.7a hasta 0.9.7c permite que atacantes remotos provoquen una denegación de servicio (caída) mediante una hábil unión SSL/TLS que provoca un puntero nulo. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834 http://docs.info.apple.com/article.html?artnum=61798 http://fedoranews.org/updates/FEDORA-2004-095.shtml http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html http&# • CWE-476: NULL Pointer Dereference •