Max CVSS | 10.0 | Min CVSS | 2.1 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2003-0693 | 10.0 |
A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CV
|
01-07-2024 - 11:15 | 22-09-2003 - 04:00 | |
CVE-2004-0642 | 7.5 |
Double free vulnerabilities in the error handling code for ASN.1 decoders in the (1) Key Distribution Center (KDC) library and (2) client library for MIT Kerberos 5 (krb5) 1.3.4 and earlier may allow remote attackers to execute arbitrary code.
|
02-02-2024 - 15:27 | 28-09-2004 - 04:00 | |
CVE-2004-0643 | 4.6 |
Double free vulnerability in the krb5_rd_cred function for MIT Kerberos 5 (krb5) 1.3.1 and earlier may allow local users to execute arbitrary code.
|
02-02-2021 - 18:08 | 28-09-2004 - 04:00 | |
CVE-2004-0644 | 5.0 |
The asn1buf_skiptail function in the ASN.1 decoder library for MIT Kerberos 5 (krb5) 1.2.2 through 1.3.4 allows remote attackers to cause a denial of service (infinite loop) via a certain BER encoding.
|
21-01-2020 - 15:45 | 28-09-2004 - 04:00 | |
CVE-2004-0894 | 7.2 |
LSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program.
|
30-04-2019 - 14:27 | 10-01-2005 - 05:00 | |
CVE-2004-1080 | 10.0 |
The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS re
|
30-04-2019 - 14:27 | 10-01-2005 - 05:00 | |
CVE-2004-0893 | 7.2 |
The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges,
|
30-04-2019 - 14:27 | 10-01-2005 - 05:00 | |
CVE-2004-0901 | 10.0 |
Microsoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site,
|
30-04-2019 - 14:27 | 10-01-2005 - 05:00 | |
CVE-2003-0609 | 7.2 |
Stack-based buffer overflow in the runtime linker, ld.so.1, on Solaris 2.6 through 9 allows local users to gain root privileges via a long LD_PRELOAD environment variable.
|
30-10-2018 - 16:26 | 27-08-2003 - 04:00 | |
CVE-2001-0797 | 10.0 |
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
|
30-10-2018 - 16:26 | 12-12-2001 - 05:00 | |
CVE-2001-0422 | 7.2 |
Buffer overflow in Xsun in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable.
|
30-10-2018 - 16:26 | 02-07-2001 - 04:00 | |
CVE-2003-0694 | 10.0 |
The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
|
30-10-2018 - 16:26 | 06-10-2003 - 04:00 | |
CVE-2004-0653 | 2.1 |
Solaris 9, when configured as a Kerberos client with patch 112908-12 or 115168-03 and using pam_krb5 as an "auth" module with the debug feature enabled, records passwords in plaintext, which could allow local users to gain other user's passwords by r
|
11-10-2017 - 01:29 | 06-08-2004 - 04:00 | |
CVE-2001-1328 | 7.5 |
Buffer overflow in ypbind daemon in Solaris 5.4 through 8 allows remote attackers to execute arbitrary code.
|
10-10-2017 - 01:30 | 22-06-2001 - 04:00 |