CVE-2004-0235
- EPSS 6.96%
- Veröffentlicht 18.08.2004 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes ("//absolute/...
- EPSS 8.48%
- Veröffentlicht 18.08.2004 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA...
CVE-2004-0587
- EPSS 0.05%
- Veröffentlicht 06.08.2004 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allows local users to cause a denial of service.
- EPSS 44.51%
- Veröffentlicht 06.08.2004 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX) 12.17.2 through 12.17.4 allow remote attackers to execute arbitrary code via certain WAV file header fields.
- EPSS 9.74%
- Veröffentlicht 06.08.2004 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and 3.0.1rc13, when compiled in environments that do not provide the vsnprintf function, uses C include files that define vsnprintf to use the less safe vsprintf function, which can lead to buffer overfl...
- EPSS 63.05%
- Veröffentlicht 06.08.2004 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Buffer overflow in the logging capability for the DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and 3.0.1rc13 allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via multiple hostname options in (1) DI...
CVE-2004-0595
- EPSS 54.88%
- Veröffentlicht 27.07.2004 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explore...