Show filters
228 Total Results
Displaying 211-220 of 228
Sort by:
Attacker Value
Unknown

CVE-2012-1185

Disclosure Date: June 05, 2012 (last updated November 08, 2023)
Multiple integer overflows in (1) magick/profile.c or (2) magick/property.c in ImageMagick 6.7.5 and earlier allow remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset value in the ResolutionUnit tag in the EXIF IFD0 of an image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0247.
Attacker Value
Unknown

CVE-2012-0944

Disclosure Date: June 04, 2012 (last updated October 04, 2023)
Aptdaemon 0.43 and earlier in Ubuntu 11.04, 11.10, and 12.04 LTS does not authenticate packages when the transaction is not simulated, which allows remote attackers to install arbitrary packages via a man-in-the-middle attack.
0
Attacker Value
Unknown

CVE-2012-0949

Disclosure Date: May 31, 2012 (last updated October 04, 2023)
The Apport hook in Update Manager as used by Ubuntu 12.04 LTS, 11.10, and 11.04 uploads certain system state archive files when reporting bugs to Launchpad, which allows remote attackers to read repository credentials by viewing a public bug report.
0
Attacker Value
Unknown

CVE-2012-1988

Disclosure Date: May 29, 2012 (last updated February 03, 2024)
Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys and file-creation permissions on the puppet master to execute arbitrary commands by creating a file whose full pathname contains shell metacharacters, then performing a filebucket request.
0
Attacker Value
Unknown

CVE-2012-0444

Disclosure Date: February 01, 2012 (last updated October 04, 2023)
Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize nsChildView data structures, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Ogg Vorbis file.
0
Attacker Value
Unknown

CVE-2011-4517

Disclosure Date: December 15, 2011 (last updated December 21, 2023)
The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.
0
Attacker Value
Unknown

CVE-2011-4516

Disclosure Date: December 15, 2011 (last updated December 21, 2023)
Heap-based buffer overflow in the jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted numrlvls value in a coding style default (COD) marker segment in a JPEG2000 file.
0
Attacker Value
Unknown

CVE-2011-4539

Disclosure Date: December 08, 2011 (last updated October 04, 2023)
dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.
0
Attacker Value
Unknown

CVE-2011-4405

Disclosure Date: November 29, 2011 (last updated October 04, 2023)
The cupshelpers scripts in system-config-printer in Ubuntu 11.04 and 11.10, as used by the automatic printer driver download service, uses an "insecure connection" for queries to the OpenPrinting database, which allows remote attackers to execute arbitrary code via a man-in-the-middle (MITM) attack that modifies packages or repositories.
0
Attacker Value
Unknown

CVE-2011-3150

Disclosure Date: November 29, 2011 (last updated October 04, 2023)
Software Center in Ubuntu 11.10, 11.04 10.10 does not properly validate server certificates, which allows remote attackers to execute arbitrary code or obtain sensitive information via a man-in-the-middle (MITM) attack.
0