CVE-2005-0206
- EPSS 6.53%
- Published 27.04.2005 04:00:00
- Last modified 03.04.2025 01:03:51
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
- EPSS 0.19%
- Published 27.01.2005 05:00:00
- Last modified 03.04.2025 01:03:51
ServerAdmin in Mac OS X 10.2.8 through 10.3.5 uses the same example self-signed certificate on each system, which allows remote attackers to decrypt sessions.
- EPSS 3.66%
- Published 27.01.2005 05:00:00
- Last modified 03.04.2025 01:03:51
Heap-based buffer overflow in Apple QuickTime on Mac OS 10.2.8 through 10.3.5 may allow remote attackers to execute arbitrary code via a certain BMP image.
- EPSS 0.3%
- Published 27.01.2005 05:00:00
- Last modified 03.04.2025 01:03:51
NetInfo Manager on Mac OS X 10.3.x through 10.3.5, after an initial root login, reports the root account as being disabled, even when it has not.
CVE-2004-0923
- EPSS 0.1%
- Published 27.01.2005 05:00:00
- Last modified 03.04.2025 01:03:51
CUPS 1.1.20 and earlier records authentication information for a device URI in the error_log file, which allows local users to obtain user names and passwords.
- EPSS 3.39%
- Published 27.01.2005 05:00:00
- Last modified 03.04.2025 01:03:51
Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by C...
- EPSS 4.44%
- Published 27.01.2005 05:00:00
- Last modified 03.04.2025 01:03:51
Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabili...
CVE-2004-1270
- EPSS 0.11%
- Published 10.01.2005 05:00:00
- Last modified 03.04.2025 01:03:51
lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to ...
- EPSS 8.64%
- Published 10.01.2005 05:00:00
- Last modified 03.04.2025 01:03:51
lppasswd in CUPS 1.1.22 does not remove the passwd.new file if it encounters a file-size resource limit while writing to passwd.new, which causes subsequent invocations of lppasswd to fail.
CVE-2004-1268
- EPSS 0.11%
- Published 10.01.2005 05:00:00
- Last modified 03.04.2025 01:03:51
lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows local users to corrupt the file by filling the associated file system and triggering the write errors.