CVE-2016-2372
- EPSS 1.22%
- Veröffentlicht 06.01.2017 21:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man-in-the-middle attacker can send an invalid ...
CVE-2016-2373
- EPSS 1.95%
- Veröffentlicht 06.01.2017 21:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious server or user can send an invalid mood to trigger...
CVE-2016-2374
- EPSS 2.78%
- Veröffentlicht 06.01.2017 21:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.
CVE-2016-2375
- EPSS 0.48%
- Veröffentlicht 06.01.2017 21:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
An exploitable out-of-bounds read exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT contact information sent from the server can result in memory disclosure.
CVE-2016-2376
- EPSS 6.85%
- Veröffentlicht 06.01.2017 21:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in arbitrary code execution. A malicious server or an attacker who intercepts the network...
CVE-2016-9949
- EPSS 9.81%
- Veröffentlicht 17.12.2016 03:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
CVE-2016-9950
- EPSS 0.73%
- Veröffentlicht 17.12.2016 03:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-...
CVE-2016-6313
- EPSS 3.18%
- Veröffentlicht 13.12.2016 20:59:04
- Zuletzt bearbeitet 12.04.2025 10:46:40
The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 46...
CVE-2016-9014
- EPSS 3.05%
- Veröffentlicht 09.12.2016 20:59:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOS...
CVE-2016-9013
- EPSS 1.85%
- Veröffentlicht 09.12.2016 20:59:05
- Zuletzt bearbeitet 12.04.2025 10:46:40
Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the da...