Show filters
228 Total Results
Displaying 211-220 of 228
Sort by:
Attacker Value
Unknown
CVE-2012-1185
Disclosure Date: June 05, 2012 (last updated November 08, 2023)
Multiple integer overflows in (1) magick/profile.c or (2) magick/property.c in ImageMagick 6.7.5 and earlier allow remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset value in the ResolutionUnit tag in the EXIF IFD0 of an image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0247.
0
Attacker Value
Unknown
CVE-2012-0944
Disclosure Date: June 04, 2012 (last updated October 04, 2023)
Aptdaemon 0.43 and earlier in Ubuntu 11.04, 11.10, and 12.04 LTS does not authenticate packages when the transaction is not simulated, which allows remote attackers to install arbitrary packages via a man-in-the-middle attack.
0
Attacker Value
Unknown
CVE-2012-0949
Disclosure Date: May 31, 2012 (last updated October 04, 2023)
The Apport hook in Update Manager as used by Ubuntu 12.04 LTS, 11.10, and 11.04 uploads certain system state archive files when reporting bugs to Launchpad, which allows remote attackers to read repository credentials by viewing a public bug report.
0
Attacker Value
Unknown
CVE-2012-1988
Disclosure Date: May 29, 2012 (last updated February 03, 2024)
Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys and file-creation permissions on the puppet master to execute arbitrary commands by creating a file whose full pathname contains shell metacharacters, then performing a filebucket request.
0
Attacker Value
Unknown
CVE-2012-0444
Disclosure Date: February 01, 2012 (last updated October 04, 2023)
Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize nsChildView data structures, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Ogg Vorbis file.
0
Attacker Value
Unknown
CVE-2011-4517
Disclosure Date: December 15, 2011 (last updated December 21, 2023)
The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.
0
Attacker Value
Unknown
CVE-2011-4516
Disclosure Date: December 15, 2011 (last updated December 21, 2023)
Heap-based buffer overflow in the jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted numrlvls value in a coding style default (COD) marker segment in a JPEG2000 file.
0
Attacker Value
Unknown
CVE-2011-4539
Disclosure Date: December 08, 2011 (last updated October 04, 2023)
dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.
0
Attacker Value
Unknown
CVE-2011-4405
Disclosure Date: November 29, 2011 (last updated October 04, 2023)
The cupshelpers scripts in system-config-printer in Ubuntu 11.04 and 11.10, as used by the automatic printer driver download service, uses an "insecure connection" for queries to the OpenPrinting database, which allows remote attackers to execute arbitrary code via a man-in-the-middle (MITM) attack that modifies packages or repositories.
0
Attacker Value
Unknown
CVE-2011-3150
Disclosure Date: November 29, 2011 (last updated October 04, 2023)
Software Center in Ubuntu 11.10, 11.04 10.10 does not properly validate server certificates, which allows remote attackers to execute arbitrary code or obtain sensitive information via a man-in-the-middle (MITM) attack.
0