Количество 57 175
Количество 57 175

CVE-2003-0127

CVE-2003-0108

CVE-2003-0102

CVE-2003-0078

CVE-2003-0072

CVE-2003-0071

CVE-2003-0066

CVE-2003-0063

CVE-2003-0048
PuTTY 0.53b and earlier does not clear logon credentials from memory, including plaintext passwords, which could allow attackers with access to memory to steal the SSH credentials.

CVE-2003-0020

CVE-2003-0018

CVE-2003-0015

CVE-2003-0014

CVE-2003-0001

CVE-2002-2443
schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.

CVE-2002-2439
operator new[] sometimes returns pointers to heap blocks which are too small. When a new array is allocated, the C++ run-time has to calculate its size. The product may exceed the maximum value which can be stored in a machine register. This error is ignored, and the truncated value is used for the heap allocation. This may lead to heap overflows and therefore security bugs. (See http://cert.uni-stuttgart.de/advisories/calloc.php for further references.)

CVE-2002-2438
firewalls might let some TCP flags combinations pass (e.g. all with RST flag set) and the OS (e.g. Linux) stack would in turn accept a TCP session it might not have accepted otherwise.

CVE-2002-1581

CVE-2002-1341

CVE-2002-1165
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVSS2: 7.2 | 1% Низкий | около 22 лет назад | |
![]() | CVSS2: 5 | 17% Средний | больше 22 лет назад | |
![]() | CVSS2: 4.6 | 8% Низкий | больше 22 лет назад | |
![]() | CVSS2: 5 | 7% Низкий | больше 22 лет назад | |
![]() | CVSS2: 5 | 1% Низкий | около 22 лет назад | |
![]() | CVSS2: 2.1 | 0% Низкий | больше 22 лет назад | |
![]() | CVSS2: 7.5 | 1% Низкий | больше 22 лет назад | |
![]() | CVSS3: 7.3 | 1% Низкий | больше 22 лет назад | |
![]() | CVE-2003-0048 PuTTY 0.53b and earlier does not clear logon credentials from memory, including plaintext passwords, which could allow attackers with access to memory to steal the SSH credentials. | CVSS2: 4.6 | 0% Низкий | больше 22 лет назад |
![]() | CVSS2: 5 | 19% Средний | больше 22 лет назад | |
![]() | CVSS2: 3.6 | 0% Низкий | больше 22 лет назад | |
![]() | CVSS2: 7.5 | 63% Средний | больше 22 лет назад | |
![]() | CVSS2: 4.6 | 0% Низкий | больше 22 лет назад | |
![]() | CVSS2: 5 | 2% Низкий | больше 22 лет назад | |
![]() | CVE-2002-2443 schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103. | CVSS2: 5 | 24% Средний | около 12 лет назад |
![]() | CVE-2002-2439 operator new[] sometimes returns pointers to heap blocks which are too small. When a new array is allocated, the C++ run-time has to calculate its size. The product may exceed the maximum value which can be stored in a machine register. This error is ignored, and the truncated value is used for the heap allocation. This may lead to heap overflows and therefore security bugs. (See http://cert.uni-stuttgart.de/advisories/calloc.php for further references.) | CVSS3: 7.8 | 0% Низкий | больше 5 лет назад |
![]() | CVE-2002-2438 firewalls might let some TCP flags combinations pass (e.g. all with RST flag set) and the OS (e.g. Linux) stack would in turn accept a TCP session it might not have accepted otherwise. | CVSS3: 7.5 | 5% Низкий | около 4 лет назад |
![]() | CVSS2: 5 | 10% Низкий | больше 20 лет назад | |
![]() | CVSS2: 6.8 | 2% Низкий | больше 22 лет назад | |
![]() | CVSS2: 4.6 | 3% Низкий | больше 22 лет назад |
Уязвимостей на страницу