
CVE-2007-2030
https://notcve.org/view.php?id=CVE-2007-2030
16 Apr 2007 — lharc.c in lha does not securely create temporary files, which might allow local users to read or write files by creating a file before LHA is invoked. lharc.c en lha no crea archivos temporales de forma segura, lo cual podría permitir a usuarios locales leer o escribir archivos creando un archivo antes de que LHA sea invocado. • http://osvdb.org/37049 •

CVE-2007-1352 – Multiple font integer overflows (CVE-2007-1352)
https://notcve.org/view.php?id=CVE-2007-1352
06 Apr 2007 — Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow. Desbordamiento de entero en la función FontFileInitTable en X.Org libXfont versiones anteriores a 20070403 permite a usuarios remotos autenticados ejecutar código de su elección mediante una primera línea larga en el fichero fonts.dir, lo cual resulta en un desbordamiento de montón. • http://issues.foresightlinux.org/browse/FL-223 •

CVE-2007-0998 – HVM guest VNC server allows compromise of entire host OS by any VNC console user
https://notcve.org/view.php?id=CVE-2007-0998
20 Mar 2007 — The VNC server implementation in QEMU, as used by Xen and possibly other environments, allows local users of a guest operating system to read arbitrary files on the host operating system via unspecified vectors related to QEMU monitor mode, as demonstrated by mapping files to a CDROM device. NOTE: some of these details are obtained from third party information. La implementación del servidor VNC en QEMU, como es usada por Xen y posiblemente otros entornos, permite a usuarios locales de un sistema operativo ... • http://fedoranews.org/cms/node/2802 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2006-7151
https://notcve.org/view.php?id=CVE-2006-7151
07 Mar 2007 — Untrusted search path vulnerability in the libtool-ltdl library (libltdl.so) 1.5.22-2.3 in Fedora Core 5 might allow local users to execute arbitrary code via a malicious library in the (1) hwcap, (2) 0, and (3) nosegneg subdirectories. Vulnerabilidad de ruta de búsqueda no confiable en la biblioteca libtool-ltdl (libltdl.so) 1.5.22-2.3 en Fedora Core 5 podría permitir a usuarios locales ejecutar código de su elección mediante una biblioteca maliciosa en los subdirectorios (1) hwcap, (2) 0, y (3) nosegneg. • http://securityreason.com/securityalert/2378 •

CVE-2006-6235
https://notcve.org/view.php?id=CVE-2006-6235
07 Dec 2006 — A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory. Una vulnerabilidad de "escritura en pila" en GnuPG (gpg) 1.x anterior a la 1.4.6, 2.x anterior a la 2.0.2 y 1.9.0 hasta la 1.9.95 permite a atacantes ejecutar código de su elección mediante paquetes OpenPGP artesanales que provocan que GnuPG haga re... • ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc •

CVE-2006-5701 – Linux Kernel 2.6.x - SquashFS Double-Free Denial of Service
https://notcve.org/view.php?id=CVE-2006-5701
03 Nov 2006 — Double free vulnerability in squashfs module in the Linux kernel 2.6.x, as used in Fedora Core 5 and possibly other distributions, allows local users to cause a denial of service by mounting a crafted squashfs filesystem. Vulnerabilidad doble-libre en módulo squashfs en el kernel de Linux 2.6.x, tal y como se usa en Fedora Core 5 y posiblemente otras distribuciones, permite a un usuario local provocar denegación de servicio a través del montado manipualado del sistema de ficheros. • https://www.exploit-db.com/exploits/28895 •

CVE-2006-5170
https://notcve.org/view.php?id=CVE-2006-5170
04 Oct 2006 — pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver. pam_ldap en nss_ldap sobre Red Hat Enterprise Linux 4, Fedora Core 3 y anteriores, y posiblemente otras distribuciones no devuelven un... • http://bugzilla.padl.com/show_bug.cgi?id=291 • CWE-755: Improper Handling of Exceptional Conditions •

CVE-2006-0745 – X.Org X11 (X11R6.9.0/X11R7.0) - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2006-0745
21 Mar 2006 — X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile. • https://www.exploit-db.com/exploits/1596 •

CVE-2005-0109
https://notcve.org/view.php?id=CVE-2005-0109
05 Mar 2005 — Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt •

CVE-2005-0206
https://notcve.org/view.php?id=CVE-2005-0206
15 Feb 2005 — The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities. El parche para corregir las vulnerabilidades de desbordamiento de entero en Xpdf 2.0 y 3.0 (CAN-2004-0888) es incompleto para arquitecturas de 64 bits en ciertas distribuciones de Linux como Red Hat, lo que podría dejar a los usuarios de Xpdf expuestos a las vulnerabilida... • http://www.mandriva.com/security/advisories?name=MDKSA-2005:041 •