Filtered by vendor Pedro Lineu Orso
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-7250 | 1 Pedro Lineu Orso | 1 Sarg | 2024-02-04 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in Squid Analysis Report Generator (Sarg) 2.2.4 allows remote attackers to inject arbitrary web script or HTML via a JavaScript onload event in the User-Agent header, which is not properly handled when displaying the Squid proxy log. NOTE: this issue exists because of an incomplete fix for CVE-2008-1168. | |||||
CVE-2008-7249 | 1 Pedro Lineu Orso | 1 Sarg | 2024-02-04 | 9.3 HIGH | N/A |
Buffer overflow in Squid Analysis Report Generator (Sarg) 2.2.3.1, and probably later, allows user-assisted remote attackers to execute arbitrary code via a long HTTP request method in a crafted access.log file, a different vulnerability than CVE-2008-1167. | |||||
CVE-2006-6684 | 1 Pedro Lineu Orso | 1 Chetcpasswd | 2024-02-04 | 7.5 HIGH | N/A |
Heap-based buffer overflow in Pedro Lineu Orso chetcpasswd before 2.4 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long X-Forwarded-For HTTP header. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. | |||||
CVE-2006-6683 | 1 Pedro Lineu Orso | 1 Chetcpasswd | 2024-02-04 | 7.8 HIGH | N/A |
Pedro Lineu Orso chetcpasswd 2.4.1 and earlier verifies and updates user accounts via custom code that processes /etc/shadow and does not follow the PAM configuration, which might allow remote attackers to bypass intended restrictions implemented through PAM. | |||||
CVE-2006-6685 | 1 Pedro Lineu Orso | 1 Chetcpasswd | 2024-02-04 | 7.2 HIGH | N/A |
Heap-based buffer overflow in Pedro Lineu Orso chetcpasswd 2.3.3 allows local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long REMOTE_ADDR environment variable. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. |