Vulnerability & Exploit Database

Displaying entries 1 - 10 of 20 in total

Results for: CVE-2008-0166 Back to search

SUSE Linux Security Advisory: SUSE-SR:2009:012 Vulnerability

  • Severity: 10
  • Published: April 23, 2009

Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, as used in Poppler and other products, when running on Mac OS X, has unspecified impact, related to "g*allocn."

SUSE Linux Security Advisory: SUSE-SR:2009:010 Vulnerability

  • Severity: 10
  • Published: April 16, 2009

Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.

USN-612-4: ssl-cert vulnerability Vulnerability

  • Severity: 8
  • Published: May 13, 2008

OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.

USN-612-3: OpenVPN vulnerability Vulnerability

  • Severity: 8
  • Published: May 13, 2008

OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.

USN-612-2: OpenSSH vulnerability Vulnerability

  • Severity: 8
  • Published: May 13, 2008

OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.

USN-612-1: OpenSSL vulnerability Vulnerability

  • Severity: 8
  • Published: May 13, 2008

OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.

Debian's OpenSSL Library Predictable Random Number Generator Vulnerability

  • Severity: 8
  • Published: May 13, 2008

A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system. This particularly affects...

RHSA-2007:0956: java-1.5.0-bea security update Vulnerability

  • Severity: 9
  • Published: August 17, 2007

Updated java-1.5.0-bea packages that correct several security issues are now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The BEA WebLogic JRockit 1.5.0_11 JRE and SDK contain BEA WebLogic JRockit Vi...

SUSE-SA:2007:045: Java security problems Vulnerability

  • Severity: 9
  • Published: July 18, 2007

Multiple unspecified vulnerabilities in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, and Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, allow attackers to develop Java applets or applications that are able to gain privileges, related to serialization in JRE.

RHSA-2008:0261: Red Hat Network Satellite Server security update Vulnerability

  • Severity: 10
  • Published: May 02, 2007

Red Hat Network Satellite Server version 5.0.2 is now available. This update includes fixes for a number of security issues in Red Hat Network Satellite Server components. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

During an internal security review, a cross-site scr...