Логотип exploitDog
source:"ubuntu"
Консоль
Логотип exploitDog

exploitDog

source:"ubuntu"

Количество 63 686

Количество 63 686

ubuntu логотип

CVE-2006-3464

больше 19 лет назад

TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to pass numeric range checks and possibly execute code, and trigger assert errors, via large offset values in a TIFF directory that lead to an integer overflow and other unspecified vectors involving "unchecked arithmetic operations".

CVSS2: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2006-3463

больше 19 лет назад

The EstimateStripByteCounts function in TIFF library (libtiff) before 3.8.2 uses a 16-bit unsigned short when iterating over an unsigned 32-bit value, which allows context-dependent attackers to cause a denial of service via a large td_nstrips value, which triggers an infinite loop.

CVSS2: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2006-3462

больше 19 лет назад

Heap-based buffer overflow in the NeXT RLE decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors involving decoding large RLE images.

CVSS2: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2006-3461

больше 19 лет назад

Heap-based buffer overflow in the PixarLog decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors.

CVSS2: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2006-3460

больше 19 лет назад

Heap-based buffer overflow in the JPEG decoder in the TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an encoded JPEG stream that is longer than the scan line size (TiffScanLineSize).

CVSS2: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2006-3459

больше 19 лет назад

Multiple stack-based buffer overflows in the TIFF library (libtiff) before 3.8.2, as used in Adobe Reader 9.3.0 and other products, allow context-dependent attackers to execute arbitrary code or cause a denial of service via unspecified vectors, including a large tdir_count value in the TIFFFetchShortPair function in tif_dirread.c.

CVSS2: 7.5
EPSS: Средний
ubuntu логотип

CVE-2006-3458

больше 19 лет назад

Zope 2.7.0 to 2.7.8, 2.8.0 to 2.8.7, and 2.9.0 to 2.9.3 (Zope2) does not disable the "raw" command when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows local users to read arbitrary files.

CVSS2: 2.1
EPSS: Низкий
ubuntu логотип

CVE-2006-3419

больше 19 лет назад

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.

CVSS2: 5
EPSS: Низкий
ubuntu логотип

CVE-2006-3418

больше 19 лет назад

Tor before 0.1.1.20 does not validate that a server descriptor's fingerprint line matches its identity key, which allows remote attackers to spoof the fingerprint line, which might be trusted by users or other applications.

CVSS2: 5
EPSS: Низкий
ubuntu логотип

CVE-2006-3417

больше 19 лет назад

Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy "entry guard" (is_guard) systems by directory authorities.

CVSS2: 6.4
EPSS: Низкий
ubuntu логотип

CVE-2006-3415

больше 19 лет назад

Tor before 0.1.1.20 uses improper logic to validate the "OR" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors.

CVSS2: 6.4
EPSS: Низкий
ubuntu логотип

CVE-2006-3414

больше 19 лет назад

Tor before 0.1.1.20 supports server descriptors that contain hostnames instead of IP addresses, which allows remote attackers to arbitrarily group users by providing preferential address resolution.

CVSS2: 5
EPSS: Низкий
ubuntu логотип

CVE-2006-3413

больше 19 лет назад

The privoxy configuration file in Tor before 0.1.1.20, when run on Apple OS X, logs all data via the "logfile", which allows attackers to obtain potentially sensitive information.

CVSS2: 5
EPSS: Низкий
ubuntu логотип

CVE-2006-3412

больше 19 лет назад

Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers.

CVSS2: 6.4
EPSS: Низкий
ubuntu логотип

CVE-2006-3411

больше 19 лет назад

TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys.

CVSS2: 6.4
EPSS: Низкий
ubuntu логотип

CVE-2006-3410

больше 19 лет назад

Tor before 0.1.1.20 creates "internal circuits" primarily consisting of nodes with "useful exit nodes," which allows remote attackers to conduct unspecified statistical attacks.

CVSS2: 5
EPSS: Низкий
ubuntu логотип

CVE-2006-3409

больше 19 лет назад

Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists.

CVSS2: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2006-3408

больше 19 лет назад

Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown vectors.

CVSS2: 5
EPSS: Низкий
ubuntu логотип

CVE-2006-3407

больше 19 лет назад

Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters.

CVSS2: 6.4
EPSS: Низкий
ubuntu логотип

CVE-2006-3404

больше 19 лет назад

Buffer overflow in the xcf_load_vector function in app/xcf/xcf-load.c for gimp before 2.2.12 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XCF file with a large num_axes value in the VECTORS property.

CVSS2: 5.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2006-3464

TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to pass numeric range checks and possibly execute code, and trigger assert errors, via large offset values in a TIFF directory that lead to an integer overflow and other unspecified vectors involving "unchecked arithmetic operations".

CVSS2: 7.5
1%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3463

The EstimateStripByteCounts function in TIFF library (libtiff) before 3.8.2 uses a 16-bit unsigned short when iterating over an unsigned 32-bit value, which allows context-dependent attackers to cause a denial of service via a large td_nstrips value, which triggers an infinite loop.

CVSS2: 7.8
4%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3462

Heap-based buffer overflow in the NeXT RLE decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors involving decoding large RLE images.

CVSS2: 7.5
2%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3461

Heap-based buffer overflow in the PixarLog decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors.

CVSS2: 7.5
4%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3460

Heap-based buffer overflow in the JPEG decoder in the TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an encoded JPEG stream that is longer than the scan line size (TiffScanLineSize).

CVSS2: 7.5
1%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3459

Multiple stack-based buffer overflows in the TIFF library (libtiff) before 3.8.2, as used in Adobe Reader 9.3.0 and other products, allow context-dependent attackers to execute arbitrary code or cause a denial of service via unspecified vectors, including a large tdir_count value in the TIFFFetchShortPair function in tif_dirread.c.

CVSS2: 7.5
68%
Средний
больше 19 лет назад
ubuntu логотип
CVE-2006-3458

Zope 2.7.0 to 2.7.8, 2.8.0 to 2.8.7, and 2.9.0 to 2.9.3 (Zope2) does not disable the "raw" command when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows local users to read arbitrary files.

CVSS2: 2.1
0%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3419

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.

CVSS2: 5
0%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3418

Tor before 0.1.1.20 does not validate that a server descriptor's fingerprint line matches its identity key, which allows remote attackers to spoof the fingerprint line, which might be trusted by users or other applications.

CVSS2: 5
0%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3417

Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy "entry guard" (is_guard) systems by directory authorities.

CVSS2: 6.4
0%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3415

Tor before 0.1.1.20 uses improper logic to validate the "OR" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors.

CVSS2: 6.4
0%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3414

Tor before 0.1.1.20 supports server descriptors that contain hostnames instead of IP addresses, which allows remote attackers to arbitrarily group users by providing preferential address resolution.

CVSS2: 5
0%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3413

The privoxy configuration file in Tor before 0.1.1.20, when run on Apple OS X, logs all data via the "logfile", which allows attackers to obtain potentially sensitive information.

CVSS2: 5
0%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3412

Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers.

CVSS2: 6.4
0%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3411

TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys.

CVSS2: 6.4
0%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3410

Tor before 0.1.1.20 creates "internal circuits" primarily consisting of nodes with "useful exit nodes," which allows remote attackers to conduct unspecified statistical attacks.

CVSS2: 5
1%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3409

Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists.

CVSS2: 7.5
5%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3408

Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown vectors.

CVSS2: 5
1%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3407

Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters.

CVSS2: 6.4
1%
Низкий
больше 19 лет назад
ubuntu логотип
CVE-2006-3404

Buffer overflow in the xcf_load_vector function in app/xcf/xcf-load.c for gimp before 2.2.12 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XCF file with a large num_axes value in the VECTORS property.

CVSS2: 5.1
2%
Низкий
больше 19 лет назад

Уязвимостей на страницу