Multiple stack-based buffer overflows in the error handling routines of the minires library, as used in the NSUPDATE capability for ISC DHCPD 3.0 through 3.0.1RC10, allow remote attackers to execute arbitrary code via a DHCP message containing a long hostname.
Max CVSS
7.5
EPSS Score
13.47%
Published
2003-01-17
Updated
2017-07-11
dhcpcd DHCP client daemon 1.3.22 and earlier allows local users to execute arbitrary code via shell metacharacters that are fed from a dhcpd .info script into a .exe script.
Max CVSS
7.2
EPSS Score
0.06%
Published
2003-01-17
Updated
2017-10-10
Buffer overflows in the (1) TZ and (2) SET TIME ZONE enivronment variables for PostgreSQL 7.2.1 and earlier allow local users to cause a denial of service and possibly execute arbitrary code.
Max CVSS
4.6
EPSS Score
0.04%
Published
2003-01-17
Updated
2016-10-18
Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and earlier allow attackers to cause a denial of service and possibly execute arbitrary code, possibly as a result of an integer overflow.
Max CVSS
6.5
EPSS Score
0.31%
Published
2003-01-17
Updated
2008-09-10
Heap-based buffer overflow in the repeat() function for PostgreSQL before 7.2.2 allows attackers to execute arbitrary code by causing repeat() to generate a large string.
Max CVSS
7.5
EPSS Score
2.92%
Published
2003-01-17
Updated
2016-10-18
Buffer overflow in the date parser for PostgreSQL before 7.2.2 allows attackers to cause a denial of service and possibly execute arbitrary code via a long date string, aka a vulnerability "in handling long datetime input."
Max CVSS
4.6
EPSS Score
0.08%
Published
2003-01-17
Updated
2016-10-18
Vulnerability in the cash_words() function for PostgreSQL 7.2 and earlier allows local users to cause a denial of service and possibly execute arbitrary code via a large negative argument, possibly triggering an integer signedness error or buffer overflow.
Max CVSS
7.5
EPSS Score
0.04%
Published
2003-01-17
Updated
2017-07-11
Heap-based buffer overflow in the wordwrap function in PHP after 4.1.2 and before 4.3.0 may allow attackers to cause a denial of service or execute arbitrary code.
Max CVSS
7.5
EPSS Score
1.28%
Published
2003-01-17
Updated
2018-05-03
Buffer overflow in cnd-program for mgetty before 1.1.29 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a Caller ID string with a long CallerName argument.
Max CVSS
7.5
EPSS Score
6.83%
Published
2003-01-17
Updated
2017-10-10
Buffer overflow in traceroute-nanog (aka traceroute-ng) may allow local users to execute arbitrary code via a long hostname argument.
Max CVSS
4.6
EPSS Score
0.04%
Published
2003-01-02
Updated
2016-10-18
Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.
Max CVSS
7.2
EPSS Score
0.06%
Published
2003-01-02
Updated
2018-05-03
OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows remote or local attackers to execute arbitrary code when libldap reads the .ldaprc file within applications that are running with extra privileges.
Max CVSS
7.5
EPSS Score
0.23%
Published
2003-01-02
Updated
2008-09-10
Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests.
Max CVSS
7.5
EPSS Score
5.83%
Published
2003-01-02
Updated
2017-07-11
13 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!