Количество 61 652
Количество 61 652
CVE-2003-0078
CVE-2003-0072
CVE-2003-0071
CVE-2003-0066
CVE-2003-0063
CVE-2003-0048
PuTTY 0.53b and earlier does not clear logon credentials from memory, including plaintext passwords, which could allow attackers with access to memory to steal the SSH credentials.
CVE-2003-0020
CVE-2003-0018
CVE-2003-0015
CVE-2003-0014
CVE-2003-0001
CVE-2002-2443
schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
CVE-2002-2439
operator new[] sometimes returns pointers to heap blocks which are too small. When a new array is allocated, the C++ run-time has to calculate its size. The product may exceed the maximum value which can be stored in a machine register. This error is ignored, and the truncated value is used for the heap allocation. This may lead to heap overflows and therefore security bugs. (See http://cert.uni-stuttgart.de/advisories/calloc.php for further references.)
CVE-2002-2438
firewalls might let some TCP flags combinations pass (e.g. all with RST flag set) and the OS (e.g. Linux) stack would in turn accept a TCP session it might not have accepted otherwise.
CVE-2002-1581
CVE-2002-1341
CVE-2002-1165
CVE-2002-1157
CVE-2002-0843
CVE-2002-0840
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVSS2: 5 | 12% Средний | больше 22 лет назад | ||
CVSS2: 5 | 1% Низкий | больше 22 лет назад | ||
CVSS2: 2.1 | 0% Низкий | больше 22 лет назад | ||
CVSS2: 7.5 | 1% Низкий | больше 22 лет назад | ||
CVSS3: 7.3 | 1% Низкий | больше 22 лет назад | ||
CVE-2003-0048 PuTTY 0.53b and earlier does not clear logon credentials from memory, including plaintext passwords, which could allow attackers with access to memory to steal the SSH credentials. | CVSS2: 4.6 | 0% Низкий | почти 23 года назад | |
CVSS2: 5 | 20% Средний | больше 22 лет назад | ||
CVSS2: 3.6 | 0% Низкий | почти 23 года назад | ||
CVSS2: 7.5 | 63% Средний | почти 23 года назад | ||
CVSS2: 4.6 | 0% Низкий | почти 23 года назад | ||
CVSS2: 5 | 4% Низкий | почти 23 года назад | ||
CVE-2002-2443 schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103. | CVSS2: 5 | 15% Средний | больше 12 лет назад | |
CVE-2002-2439 operator new[] sometimes returns pointers to heap blocks which are too small. When a new array is allocated, the C++ run-time has to calculate its size. The product may exceed the maximum value which can be stored in a machine register. This error is ignored, and the truncated value is used for the heap allocation. This may lead to heap overflows and therefore security bugs. (See http://cert.uni-stuttgart.de/advisories/calloc.php for further references.) | CVSS3: 7.8 | 0% Низкий | около 6 лет назад | |
CVE-2002-2438 firewalls might let some TCP flags combinations pass (e.g. all with RST flag set) and the OS (e.g. Linux) stack would in turn accept a TCP session it might not have accepted otherwise. | CVSS3: 7.5 | 5% Низкий | больше 4 лет назад | |
CVSS2: 5 | 10% Низкий | почти 21 год назад | ||
CVSS2: 6.8 | 3% Низкий | почти 23 года назад | ||
CVSS2: 4.6 | 3% Низкий | около 23 лет назад | ||
CVSS2: 7.5 | 3% Низкий | около 23 лет назад | ||
CVSS2: 7.5 | 4% Низкий | около 23 лет назад | ||
CVSS2: 6.8 | 92% Критический | около 23 лет назад |
Уязвимостей на страницу