Show filters
37 Total Results
Displaying 31-37 of 37
Sort by:
Attacker Value
Unknown

CVE-2008-1677

Disclosure Date: May 12, 2008 (last updated October 04, 2023)
Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.
0
Attacker Value
Unknown

CVE-2008-0893

Disclosure Date: April 16, 2008 (last updated October 04, 2023)
Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, does not properly restrict access to CGI scripts, which allows remote attackers to perform administrative actions.
0
Attacker Value
Unknown

CVE-2008-0889

Disclosure Date: March 20, 2008 (last updated October 04, 2023)
Red Hat Directory Server 8.0, when running on Red Hat Enterprise Linux, uses insecure permissions for the redhat-idm-console script, which allows local users to execute arbitrary code by modifying the script.
0
Attacker Value
Unknown

CVE-2005-3653

Disclosure Date: December 31, 2005 (last updated February 22, 2025)
Heap-based buffer overflow in the iGateway service for various Computer Associates (CA) iTechnology products, in iTechnology iGateway before 4.0.051230, allows remote attackers to execute arbitrary code via an HTTP request with a negative Content-Length field.
0
Attacker Value
Unknown

CVE-2004-0112

Disclosure Date: November 23, 2004 (last updated February 22, 2025)
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
0
Attacker Value
Unknown

CVE-2004-0079

Disclosure Date: November 23, 2004 (last updated February 22, 2025)
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
Attacker Value
Unknown

CVE-2004-0081

Disclosure Date: November 23, 2004 (last updated February 22, 2025)
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
0