Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Propack
(Sgi)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 54 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2004-08-06 | CVE-2004-0418 | serve_notify in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle empty data lines, which may allow remote attackers to perform an "out-of-bounds" write for a single byte to execute arbitrary code or modify critical program data. | Cvs, Linux, Openbsd, Openpkg, Propack | N/A | ||
2004-08-06 | CVE-2004-0417 | Integer overflow in the "Max-dotdot" CVS protocol command (serve_max_dotdot) for CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, may allow remote attackers to cause a server crash, which could cause temporary data to remain undeleted and consume disk space. | Cvs, Linux, Openbsd, Openpkg, Propack | N/A | ||
2004-08-06 | CVE-2004-0416 | Double free vulnerability for the error_prog_name string in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, may allow remote attackers to execute arbitrary code. | Cvs, Linux, Openbsd, Openpkg, Propack | N/A | ||
2004-08-06 | CVE-2004-0414 | CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle malformed "Entry" lines, which prevents a NULL terminator from being used and may lead to a denial of service (crash), modification of critical program data, or arbitrary code execution. | Cvs, Linux, Openbsd, Openpkg, Propack | N/A | ||
2004-08-18 | CVE-2004-0235 | Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes ("//absolute/path"). | Mailsweeper, F\-Secure_anti\-Virus, F\-Secure_for_firewalls, F\-Secure_internet_security, F\-Secure_personal_express, Internet_gatekeeper, Winrar, Fedora_core, Lha, Propack, Cgpmcafee, Lha, Winzip | N/A | ||
2004-08-18 | CVE-2004-0234 | Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive. | Mailsweeper, F\-Secure_anti\-Virus, F\-Secure_for_firewalls, F\-Secure_internet_security, F\-Secure_personal_express, Internet_gatekeeper, Winrar, Fedora_core, Lha, Propack, Cgpmcafee, Lha, Winzip | N/A | ||
2004-08-18 | CVE-2004-0233 | Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files. | Propack, Slackware_linux, Utempter | N/A | ||
2004-08-18 | CVE-2004-0232 | Multiple format string vulnerabilities in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code. | Linux, Midnight_commander, Propack, Slackware_linux | N/A | ||
2004-08-18 | CVE-2004-0231 | Multiple vulnerabilities in Midnight Commander (mc) before 4.6.0, with unknown impact, related to "Insecure temporary file and directory creations." | Linux, Midnight_commander, Propack, Slackware_linux | N/A | ||
2004-08-18 | CVE-2004-0226 | Multiple buffer overflows in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code. | Linux, Midnight_commander, Propack, Slackware_linux | N/A |